#binaryanalysis risultati di ricerca

I often tell people IDA is like a turbocharged Notepad++ for binaries, and I reach for its type libraries whenever a blob of assembly needs context. reverselabs.dev/blog/ida-type-… #ReverseEngineering #IDAPro #BinaryAnalysis #TypeLibraries

carlosadrianosj's tweet image. I often tell people IDA is like a turbocharged Notepad++ for binaries, and I reach for its type libraries whenever a blob of assembly needs context.
 reverselabs.dev/blog/ida-type-…
#ReverseEngineering #IDAPro #BinaryAnalysis #TypeLibraries

🖥️ Fake Binary Bypass — START! Static Linux binary loaded. Mission: bypass restrictions, peek at hidden functions & variables, and uncover the real flag 🏴‍☠️ 900 pts, reverse-engineering in action ⚡ Target: echoctf.red/challenge/6 #CTF #HackerLife #BinaryAnalysis #EchoCTF


Fuzzable - Framework For Automating Fuzzable Target Discovery With Static Analysis bit.ly/3XB97Zf #BinaryAnalysis #Fuzzable

KitPloit's tweet image. Fuzzable - Framework For Automating Fuzzable Target Discovery With Static Analysis bit.ly/3XB97Zf #BinaryAnalysis #Fuzzable

🖥️ Fake Binary Bypass — DONE! Bypassed a static Linux binary, inspected hidden functions, and peeked at internal variables 🏴‍☠️ 900 pts, reverse-engineering flexed ⚡ Target: echoctf.red/challenge/6 #CTF #HackerLife #BinaryAnalysis #EchoCTF


Introducing Nova, a series of foundation models for binary/assembly code. We have also released fine-tuned models for binary code decompilation. #LLM #LLM4Code #BinaryAnalysis #Security @NanJiang719, Chengxiao Wang, Kevin Liu, @XiangzheX, Xiangyu Zhang, Petr Babkin.

Lin0Tan's tweet image. Introducing Nova, a series of foundation models for binary/assembly code. 
We have also released fine-tuned models  for binary code decompilation. #LLM #LLM4Code #BinaryAnalysis #Security @NanJiang719, Chengxiao Wang, Kevin Liu, @XiangzheX, Xiangyu Zhang, Petr Babkin.
Lin0Tan's tweet image. Introducing Nova, a series of foundation models for binary/assembly code. 
We have also released fine-tuned models  for binary code decompilation. #LLM #LLM4Code #BinaryAnalysis #Security @NanJiang719, Chengxiao Wang, Kevin Liu, @XiangzheX, Xiangyu Zhang, Petr Babkin.
Lin0Tan's tweet image. Introducing Nova, a series of foundation models for binary/assembly code. 
We have also released fine-tuned models  for binary code decompilation. #LLM #LLM4Code #BinaryAnalysis #Security @NanJiang719, Chengxiao Wang, Kevin Liu, @XiangzheX, Xiangyu Zhang, Petr Babkin.

This room has stuffed ton of things into my mind, Perhaps, I should take a breath and revisit it! #reverseengineering #reversing #binaryanalysis

realperumalj's tweet image. This room has stuffed ton of things into my mind, Perhaps, I should take a breath and revisit it!

#reverseengineering #reversing #binaryanalysis

The blog post keeps going, as I said it will take some time until I finish writing it, but I think you will really like the content :D #compiler #binaryanalysis #dalvik

Farenain's tweet image. The blog post keeps going, as I said it will take some time until I finish writing it, but I think you will really like the content :D #compiler #binaryanalysis #dalvik

Why is it called “optional” if it’s required to run? 🧠 Dive into the Windows PE Optional Header with us. Full video on YouTube! 🔗 #HackDefenderAcademy #PEfile #BinaryAnalysis #module0 #class2


Securing IoT products demands deep #BinaryAnalysis. Why? Because today’s IoT software is a tangled web of global supply chains, legacy code & opaque binaries. In our Security Short, Edwin makes it clear: to protect IoT products, you have to go deeper than the surface. #IoT


Precompiled binaries are a black box risk. Without source code, you’re left with vendor docs & guesswork. In our "Security Short", Edwin stresses that the only way to truly understand what’s inside precompiled binaries is through #BinaryAnalysis. Visibility matters.


@danning_x will present our paper ReSym (Distinguished paper award) at #CCS2024! github.com/lt-asset/resym Check it out if you are around. @acm_ccs @cerias @PurdueCS #binaryanalysis #llm #llm4code

🎉 Excited to announce that our paper "ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries" has won the Distinguished Paper Award at #CCS2024! I'll present tomorrow afternoon in 9-4 session at @acm_ccs. Hope to see you! #LLM #LLM4Code

danning_x's tweet image. 🎉 Excited to announce that our paper "ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries" has won the Distinguished Paper Award at #CCS2024! I'll present tomorrow afternoon in 9-4 session at @acm_ccs. Hope to see you! #LLM #LLM4Code
danning_x's tweet image. 🎉 Excited to announce that our paper "ReSym: Harnessing LLMs to Recover Variable and Data Structure Symbols from Stripped Binaries" has won the Distinguished Paper Award at #CCS2024! I'll present tomorrow afternoon in 9-4 session at @acm_ccs. Hope to see you! #LLM #LLM4Code


Fuzzable - Framework For Automating Fuzzable Target Discovery With Static Analysis bit.ly/3XB97Zf #BinaryAnalysis #Fuzzable

NaderZaveri's tweet image. Fuzzable - Framework For Automating Fuzzable Target Discovery With Static Analysis bit.ly/3XB97Zf #BinaryAnalysis #Fuzzable

🛠️ The Dump: The Dump window in OllyDbg is a built-in hex viewer displaying raw binary data in memory. It typically shows two views: hexadecimal and ASCII, allowing you to inspect the binary directly. #BinaryAnalysis #OllyDbg


🔍 Master binary analysis with 010 Editor! Learn hex searches, binary templates, & PE file analysis with hands-on labs. 💸 Pay what you can & start today! 👉 labs.cyber5w.com/courses/5dd828… #DFIR #BinaryAnalysis #DigitalForensics #010Editor #CyberSecurity #C5W

cyber5w's tweet image. 🔍 Master binary analysis with 010 Editor!
Learn hex searches, binary templates, & PE file analysis with hands-on labs.

💸 Pay what you can & start today!
👉 labs.cyber5w.com/courses/5dd828…

#DFIR #BinaryAnalysis #DigitalForensics #010Editor #CyberSecurity #C5W

radare2 – Reverse engineering framework rivaling IDA. 🌐 rada.re/n/ #RETools #BinaryAnalysis


What happens at the 𝙚𝙣𝙩𝙧𝙮 𝙥𝙤𝙞𝙣𝙩 stays at the 𝙚𝙣𝙩𝙧𝙮 𝙥𝙤𝙞𝙣𝙩... unless you analyze it 😉 🔗 academy.hack-defender.com 🔗𝙔𝙤𝙪𝙏𝙪𝙗𝙚 @hackder_official #ReverseEngineering #BinaryAnalysis #HackDefenderAcademy #TechTok #CyberTips #module0 #class2 #ida #infosec


Angr Founder: Luis Moreira & the Angr Team Binary analysis framework with symbolic execution, enabling deep vulnerability discovery & exploit development. angr.io #BinaryAnalysis #SymbolicExecution


数あるシステム開発の解析ツールの中で 本当に必要なツールは何でしょうか。 SCA? バイナリ解析?その違いは? 解析のツールの違いを さくっとおさらいできるブログ公開中です ↓↓↓↓ toyo.co.jp/ss/casestudy/d… #SoftwareCompositionAnalysis #バイナリ解析 #BinaryAnalysis #KarambaSecurity

toyo_software's tweet image. 数あるシステム開発の解析ツールの中で
本当に必要なツールは何でしょうか。
SCA? バイナリ解析?その違いは?

解析のツールの違いを
さくっとおさらいできるブログ公開中です
 ↓↓↓↓
toyo.co.jp/ss/casestudy/d…

#SoftwareCompositionAnalysis #バイナリ解析 
#BinaryAnalysis #KarambaSecurity

I often tell people IDA is like a turbocharged Notepad++ for binaries, and I reach for its type libraries whenever a blob of assembly needs context. reverselabs.dev/blog/ida-type-… #ReverseEngineering #IDAPro #BinaryAnalysis #TypeLibraries

carlosadrianosj's tweet image. I often tell people IDA is like a turbocharged Notepad++ for binaries, and I reach for its type libraries whenever a blob of assembly needs context.
 reverselabs.dev/blog/ida-type-…
#ReverseEngineering #IDAPro #BinaryAnalysis #TypeLibraries

Hi! ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on 8/12/2025 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


Hello! ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on 12 August 25 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


Hey! ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on August 12, 2025 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


Hey! ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on 8/12/2025 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


Hello! ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on 12 August 25 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on August 12, 25 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


Hello! ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on 8/12/2025 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


Hey! ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on August 12, 25 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


Hello! ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on August 12, 2025 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


Hi! ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on 8/12/2025 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


Hey! ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on 8/12/25 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on 12 August 2025 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


Hey! ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on 12 August 2025 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


Hi! ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on August 12, 25 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


Hello! ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on 8/12/25 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on August 12, 25 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


Hi! ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on 8/12/25 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


🚀 Just launched ShadowSeek at Black Hat Arsenal 2025! This new AI-powered binary security analysis platform is set to change how we find vulnerabilities in closed-source code. Try here: github.com/threatpointer/… #BinaryAnalysis #ReverseEngineering #LLM #Ghidra #SecurityResearch


Hi! ObjectSecurity's presentation video available "Unseen and Unsafe: Why ECU Cybersecurity Needs Binary-Level Truth" at GVSETS 2025 on August 12, 25 in Novi, MI. bit.ly/4lesTW9 #GVSETS #Army #binaryanalysis #binlens #objectsecurity #ObjectSecurity


Goblin - An Impish, Cross-Platform Binary Parsing Crate, Written In Rust j.mp/2DIl8Fp #BinaryAnalysis #CrossPlatform #Fuzzing

KitPloit's tweet image. Goblin - An Impish, Cross-Platform Binary Parsing Crate, Written In Rust j.mp/2DIl8Fp #BinaryAnalysis #CrossPlatform #Fuzzing

Angr - A Powerful And User-Friendly Binary Analysis Platform j.mp/2UgfvVq #Angr #BinaryAnalysis #CTF #Python #SymbolicExecution

KitPloit's tweet image. Angr - A Powerful And User-Friendly Binary Analysis Platform j.mp/2UgfvVq #Angr #BinaryAnalysis #CTF #Python #SymbolicExecution

Radare2 - UNIX-like Reverse Engineering Framework And Command-Line Toolset j.mp/3rO0vzN #BinaryAnalysis #Forensics

KitPloit's tweet image. Radare2 - UNIX-like Reverse Engineering Framework And Command-Line Toolset j.mp/3rO0vzN #BinaryAnalysis #Forensics

Detect It Easy - Program For Determining Types Of Files For Windows, Linux And MacOS j.mp/2YeTkUZ #BinaryAnalysis #Debugger #Mac

KitPloit's tweet image. Detect It Easy - Program For Determining Types Of Files For Windows, Linux And MacOS j.mp/2YeTkUZ #BinaryAnalysis #Debugger #Mac

IDA Free has been upgraded to the latest IDA version 7.7SP1! This light but powerful tool can quickly analyze the binary code samples and allow users to take a closer look at the results. Try it out for free hex-rays.com/ida-free/ #IDAFreeware #Binaryanalysis #HexRays

HexRaysSA's tweet image. IDA Free has been upgraded to the latest IDA version 7.7SP1! 
This light but powerful tool can quickly analyze the binary code samples and allow users to take a closer look at the results. 
Try it out for free hex-rays.com/ida-free/

#IDAFreeware #Binaryanalysis #HexRays

Introducing Nova, a series of foundation models for binary/assembly code. We have also released fine-tuned models for binary code decompilation. #LLM #LLM4Code #BinaryAnalysis #Security @NanJiang719, Chengxiao Wang, Kevin Liu, @XiangzheX, Xiangyu Zhang, Petr Babkin.

Lin0Tan's tweet image. Introducing Nova, a series of foundation models for binary/assembly code. 
We have also released fine-tuned models  for binary code decompilation. #LLM #LLM4Code #BinaryAnalysis #Security @NanJiang719, Chengxiao Wang, Kevin Liu, @XiangzheX, Xiangyu Zhang, Petr Babkin.
Lin0Tan's tweet image. Introducing Nova, a series of foundation models for binary/assembly code. 
We have also released fine-tuned models  for binary code decompilation. #LLM #LLM4Code #BinaryAnalysis #Security @NanJiang719, Chengxiao Wang, Kevin Liu, @XiangzheX, Xiangyu Zhang, Petr Babkin.
Lin0Tan's tweet image. Introducing Nova, a series of foundation models for binary/assembly code. 
We have also released fine-tuned models  for binary code decompilation. #LLM #LLM4Code #BinaryAnalysis #Security @NanJiang719, Chengxiao Wang, Kevin Liu, @XiangzheX, Xiangyu Zhang, Petr Babkin.

DECAF - Short for Dynamic Executable Code Analysis Framework j.mp/2nPu1bS #AnalysisFramework #BinaryAnalysis #CodeAnalysis

KitPloit's tweet image. DECAF - Short for Dynamic Executable Code Analysis Framework j.mp/2nPu1bS #AnalysisFramework #BinaryAnalysis #CodeAnalysis

RetDec - A Retargetable Machine-Code Decompiler Based On LLVM j.mp/355V575 #ARM64 #BinaryAnalysis #Debugging #Decompiler #RetDec

KitPloit's tweet image. RetDec - A Retargetable Machine-Code Decompiler Based On LLVM j.mp/355V575 #ARM64 #BinaryAnalysis #Debugging #Decompiler #RetDec

DrSemu - Malware Detection And Classification Tool Based On Dynamic Behavior j.mp/2V3rVDv #BinaryAnalysis #DetectMalware #DrSemu

KitPloit's tweet image. DrSemu - Malware Detection And Classification Tool Based On Dynamic Behavior j.mp/2V3rVDv #BinaryAnalysis #DetectMalware #DrSemu

Manticore - Symbolic Execution Tool For Analysis Of Binaries And Smart Contracts j.mp/2A0zheG #BinaryAnalysis #Blockchain #Linux

KitPloit's tweet image. Manticore - Symbolic Execution Tool For Analysis Of Binaries And Smart Contracts j.mp/2A0zheG #BinaryAnalysis #Blockchain #Linux

Loading...

Something went wrong.


Something went wrong.


United States Trends