#binaryninja результаты поиска

Sneak peek preview at new #BinaryNinja visualization tool utilizing #KaitaiStruct declarative power to explore inner structures of intricate binary formats. Hurray to more vis tools and integrations!


Closing out the #Pwn2Own 2018 blog series with with the details behind our sandbox-to-root privilege escalation (CVE-2018-4193). Write a less-shady exploit, and we'll give you a free #BinaryNinja Commercial License! blog.ret2.io/2018/08/28/pwn…


The new version of my #BinaryNinja plugin Obfuscation Analysis (v1.2) adds recursive function inlining in the decompiler. It collapses call-heavy code into a single function; analysis, constant propagation, DCE and other analyses work across boundaries. github.com/mrphrazer/obfu…


New #BinaryNinja plugin: ReverserAI. It uses local large language models (LLMs) to derive semantically meaningful function names from decompiler output, demonstrating the potential of local LLMs to support reverse engineering on consumer hardware. Link: github.com/mrphrazer/reve…

mr_phrazer's tweet image. New #BinaryNinja plugin: ReverserAI. It uses local large language models (LLMs) to derive semantically meaningful function names from decompiler output, demonstrating the potential of local LLMs to support reverse engineering on consumer hardware.

Link:  github.com/mrphrazer/reve…

New major release of my #BinaryNinja plugin obfuscation_detection: Additional to code detection heuristics to explore unknown binaries, it now also includes analysis helpers such as entropy computation to detect packed/encrypted code & data. Code: github.com/mrphrazer/obfu…

mr_phrazer's tweet image. New major release of my #BinaryNinja plugin obfuscation_detection: Additional to code detection heuristics to explore unknown binaries, it now also includes analysis helpers such as entropy computation to detect packed/encrypted code & data.

Code: github.com/mrphrazer/obfu…

New version of my #binaryninja plugin to detect interesting code in binaries. I've added a new heuristic to detect simple XOR decryption loops. It can identify string decryption routines, code decryption stubs and cryptographic implementations. Code: github.com/mrphrazer/obfu…

mr_phrazer's tweet image. New version of my #binaryninja plugin to detect interesting code in binaries. I've added a new heuristic to detect simple XOR decryption loops. It can identify string decryption routines, code decryption stubs and cryptographic implementations.

Code: github.com/mrphrazer/obfu…

Just built a prototype for #BinaryNinja to deobfuscate MBAs within the decompiler. Simplified expressions are attached as comments. It will be released soon, stay tuned!

mr_phrazer's tweet image. Just built a prototype for #BinaryNinja to deobfuscate MBAs within the decompiler. Simplified expressions are attached as comments. It will be released soon, stay tuned!

Closed source @Solana programs used to be safe. We’ve changed that. Learn how to hack Solana programs with our open-source #BinaryNinja plugin 👇 osec.io/blog/tutorials…

osec_io's tweet image. Closed source @Solana programs used to be safe. We’ve changed that. 

Learn how to hack Solana programs with our open-source #BinaryNinja plugin 👇

osec.io/blog/tutorials…

🔴 we are live rn Join us as we build a custom archetectur plugin for #BinaryNinja … the first step to lifting our custom VM twitch.tv/oalabslive

herrcore's tweet image. 🔴 we are live rn

Join us as we build a custom archetectur plugin for #BinaryNinja … the first step to lifting our custom VM

twitch.tv/oalabslive

Why would we use genetic algorithms to construct an assembler??? Check out the latest #BinaryNinja blog post! binary.ninja/2018/06/19/fas…

vector35's tweet image. Why would we use genetic algorithms to construct an assembler??? Check out the latest #BinaryNinja blog post! binary.ninja/2018/06/19/fas…

Continuing with #BinaryNinja posters. This time - function. SSA form will be covered in different poster. Enjoy.

carste1n's tweet image. Continuing with #BinaryNinja posters. This time - function. SSA form will be covered in different poster. Enjoy.

I wrote a blog post on the automation of tedious reverse engineering tasks. We use string decryption in malware as an example. synthesis.to/2021/06/30/aut… We script #BinaryNinja to clean up the decompilation of the Mirai botnet. Try it yourself: github.com/mrphrazer/mira…


New blog post and updated #binaryninja plugin: "Statistical Analysis to Detect Uncommon Code" We use statistics to identify obfuscation in an #Anticheat, a mobile DRM, a #Windows kernel module & malware. Link: synthesis.to/2023/01/26/unc… Code: github.com/mrphrazer/obfu…

mr_phrazer's tweet image. New blog post and updated #binaryninja plugin: "Statistical Analysis to Detect Uncommon Code" We use statistics to identify obfuscation in an #Anticheat, a mobile DRM, a #Windows kernel module & malware.

Link: synthesis.to/2023/01/26/unc…

Code: github.com/mrphrazer/obfu…

Exciting! @vector35's excellent #BinaryNinja ships with built-in BinExport in the latest dev version! Here's how to use it with #BinDiff: dev-docs.binary.ninja/guide/binexpor…

AdmVonSchneider's tweet image. Exciting! @vector35's excellent #BinaryNinja ships with built-in BinExport in the latest dev version!
Here's how to use it with #BinDiff: dev-docs.binary.ninja/guide/binexpor…

New #BinaryNinja vis tool based on #KaitaiStruct looks better and better ;) It supports all 129 formats available at formats.kaitai.io


Interesting reading on reversing a custom Instruction Set Architecture (ISA) using Binary Ninja (37C3 CTF) Credits Thomas Imbert (@Synacktiv) synacktiv.com/en/publication… #cybersecurity #reverseengineering #binaryninja

0xor0ne's tweet image. Interesting reading on reversing a custom Instruction Set Architecture (ISA) using Binary Ninja (37C3 CTF)
Credits Thomas Imbert (@Synacktiv)

synacktiv.com/en/publication…

#cybersecurity #reverseengineering #binaryninja
0xor0ne's tweet image. Interesting reading on reversing a custom Instruction Set Architecture (ISA) using Binary Ninja (37C3 CTF)
Credits Thomas Imbert (@Synacktiv)

synacktiv.com/en/publication…

#cybersecurity #reverseengineering #binaryninja
0xor0ne's tweet image. Interesting reading on reversing a custom Instruction Set Architecture (ISA) using Binary Ninja (37C3 CTF)
Credits Thomas Imbert (@Synacktiv)

synacktiv.com/en/publication…

#cybersecurity #reverseengineering #binaryninja

The recording of our @defcon talk is now available. We shared our approach to reversing IoT and OT malware written in Go using a hybrid toolkit that blends AI with traditional analysis methods using #Radare2 , #Ghidra, and #BinaryNinja. youtu.be/TtPicirB6G4?si… #IoT #Reversing #AI

Asher_Davila's tweet card. DEF CON 33 - Go Malware Meets IoT - Challenges, Blind Spots, and...

youtube.com

YouTube

DEF CON 33 - Go Malware Meets IoT - Challenges, Blind Spots, and...


The new version of my #BinaryNinja plugin Obfuscation Analysis (v1.2) adds recursive function inlining in the decompiler. It collapses call-heavy code into a single function; analysis, constant propagation, DCE and other analyses work across boundaries. github.com/mrphrazer/obfu…


Exciting! @vector35's excellent #BinaryNinja ships with built-in BinExport in the latest dev version! Here's how to use it with #BinDiff: dev-docs.binary.ninja/guide/binexpor…

AdmVonSchneider's tweet image. Exciting! @vector35's excellent #BinaryNinja ships with built-in BinExport in the latest dev version!
Here's how to use it with #BinDiff: dev-docs.binary.ninja/guide/binexpor…

New #BinaryNinja plugin: Obfuscation Analysis Simplifies arithmetic obfuscation (MBA) directly in the decompiler (see demo below). Also identifies functions with corrupted disassembly. Co-authored by @nicolodev; available in the plugin manager. github.com/mrphrazer/obfu…


Jordan Wiens (@psifertex) is one of the co-founders of @vector35, and developers of #BinaryNinja. Jordan shares the techniques he uses to break decompilers, and a framework to evaluate existing techniques according to various properties. More info: linkedin.com/posts/off-by-o…

offbyoneconf's tweet image. Jordan Wiens (@psifertex) is one of the co-founders of @vector35, and developers of #BinaryNinja. 

Jordan shares the techniques he uses to break decompilers, and a framework to evaluate existing techniques according to various properties.

More info: linkedin.com/posts/off-by-o…

More details: @nicolodev and I discuss the current state of MBA (de)obfuscation and their applications @reconmtl We’ll also introduce a new #BinaryNinja plugin for simplifying MBAs in the decompiler. Details: cfp.recon.cx/recon-2025/fea…

mr_phrazer's tweet image. More details: @nicolodev and I discuss the current state of MBA (de)obfuscation and their applications @reconmtl We’ll also introduce a new #BinaryNinja plugin for simplifying MBAs in the decompiler.

Details: cfp.recon.cx/recon-2025/fea…

Happy to announce that @nicolodev and I will be giving a talk titled "Breaking Mixed Boolean-Arithmetic Obfuscation in Real-World Applications" at @reconmtl More information will follow in the coming days.



مهمان قسمت هفتم پادکست Behind the Binary آقای @psifertex ، یکی از هم بنیانگذاران Vector 35 و سازندگان #BinaryNinja هستش و در خصوص چشم انداز آینده #امنیت_سایبری، تاثیر #هوش_مصنوعی، توسعه ی Binary Ninja و شرکت در #CTF صحبت میکنن. اسپاتیفای : open.spotify.com/episode/6tMYu7…


Huge thanks to @vector35 for supporting the challenge and offering a #BinaryNinja license to the first-place winner. 🏅

eshard's tweet image. Huge thanks to @vector35 for supporting the challenge and offering a #BinaryNinja license to the first-place winner. 🏅

ابزار #BinaryNinja یک ابزار #مهندسی_معکوس و آنالیز باینری هستش که امکان اسکریپت نویسی با #پایتون برای خودکارسازی فرایندهارو فراهم میکنه. اگه فرصت نکردید، برنامه ضبط میشه و بعدا هم از همون لینکها قابل دسترسه.


New heuristic in my #BinaryNinja plugin obfuscation_detection: Duplicate Subgraphs uses iterative context hashing to spot repeated multi-block code. We merge each block’s signature with its successors over multiple rounds for efficiency. Link: github.com/mrphrazer/obfu…

mr_phrazer's tweet image. New heuristic in my #BinaryNinja plugin obfuscation_detection: 
Duplicate Subgraphs uses iterative context hashing to spot repeated multi-block code. We merge each block’s signature with its successors over multiple rounds for efficiency.

Link: github.com/mrphrazer/obfu…

Learn how to record a Time Travel Debug (TTD) trace using Binary Ninja! Discover key steps to capture emulation and execution instructions in this insightful video. 🌐 #Debugging #BinaryNinja #USA link: ift.tt/q6dMNZA

TweetThreatNews's tweet image. Learn how to record a Time Travel Debug (TTD) trace using Binary Ninja! Discover key steps to capture emulation and execution instructions in this insightful video. 🌐 #Debugging #BinaryNinja #USA

link: ift.tt/q6dMNZA

Explore the power of time travel debugging with Microsoft’s TTD technology! 📽️ Step backward and forward through code execution using Binary Ninja’s seamless UI integration. #TimeTravelDebugging #BinaryNinja #USA link: ift.tt/rkfBEtN

TweetThreatNews's tweet image. Explore the power of time travel debugging with Microsoft’s TTD technology! 📽️ Step backward and forward through code execution using Binary Ninja’s seamless UI integration. #TimeTravelDebugging #BinaryNinja #USA

link: ift.tt/rkfBEtN

Explore the final steps in using Binary Ninja with Time Travel Debug for enhanced reverse engineering. Learn about loading trace files, debugging configurations, and navigating execution paths. 🌍🔍🛠️ #BinaryNinja #TimeTravelDebug link: ift.tt/xDe7MXp

TweetThreatNews's tweet image. Explore the final steps in using Binary Ninja with Time Travel Debug for enhanced reverse engineering. Learn about loading trace files, debugging configurations, and navigating execution paths. 🌍🔍🛠️ #BinaryNinja #TimeTravelDebug

link: ift.tt/xDe7MXp

Extra credit: open a file in ImHex using a URL in a browser. #BinaryNinja has this functionality. It is super convenient for making blogs or reports. The RE reading your work can click a link and have their tool open to precisely the place you're talking about in the report.

MalwareUtkonos's tweet image. Extra credit: open a file in ImHex using a URL in a browser. #BinaryNinja has this functionality. It is super convenient for making blogs or reports. The RE reading your work can click a link and have their tool open to precisely the place you're talking about in the report.

capa v8.0.0 is out with support for #idapro 9.0 (and idalib), #binaryninja improvements, and updates for dynamic and BinExport backends. Now requires Python 3.10 or newer. github.com/mandiant/capa/…


Small QoL feature release to my Shellcoder #BinaryNinja plugin. Now every time you run it the architecture is automatically set based on the currently selected binary/database github.com/0xricksanchez/…


Sneak peek preview at new #BinaryNinja visualization tool utilizing #KaitaiStruct declarative power to explore inner structures of intricate binary formats. Hurray to more vis tools and integrations!


New #BinaryNinja plugin: ReverserAI. It uses local large language models (LLMs) to derive semantically meaningful function names from decompiler output, demonstrating the potential of local LLMs to support reverse engineering on consumer hardware. Link: github.com/mrphrazer/reve…

mr_phrazer's tweet image. New #BinaryNinja plugin: ReverserAI. It uses local large language models (LLMs) to derive semantically meaningful function names from decompiler output, demonstrating the potential of local LLMs to support reverse engineering on consumer hardware.

Link:  github.com/mrphrazer/reve…

Closing out the #Pwn2Own 2018 blog series with with the details behind our sandbox-to-root privilege escalation (CVE-2018-4193). Write a less-shady exploit, and we'll give you a free #BinaryNinja Commercial License! blog.ret2.io/2018/08/28/pwn…


New major release of my #BinaryNinja plugin obfuscation_detection: Additional to code detection heuristics to explore unknown binaries, it now also includes analysis helpers such as entropy computation to detect packed/encrypted code & data. Code: github.com/mrphrazer/obfu…

mr_phrazer's tweet image. New major release of my #BinaryNinja plugin obfuscation_detection: Additional to code detection heuristics to explore unknown binaries, it now also includes analysis helpers such as entropy computation to detect packed/encrypted code & data.

Code: github.com/mrphrazer/obfu…

ripr is a #BinaryNinja plugin that makes rapid code reuse easy, this week it got a few new features: blog.ret2.io/2017/11/01/rip…


New #BinaryNinja blog post: Automated Opaque Predicate Removal binary.ninja/2017/10/01/aut…


Cool #BinaryNinja plugin that adds support for exception handling. Looks amazing 🤩

PeterLaFosse's tweet image. Cool #BinaryNinja plugin that adds support for exception handling. Looks amazing 🤩

New version of my #binaryninja plugin to detect interesting code in binaries. I've added a new heuristic to detect simple XOR decryption loops. It can identify string decryption routines, code decryption stubs and cryptographic implementations. Code: github.com/mrphrazer/obfu…

mr_phrazer's tweet image. New version of my #binaryninja plugin to detect interesting code in binaries. I've added a new heuristic to detect simple XOR decryption loops. It can identify string decryption routines, code decryption stubs and cryptographic implementations.

Code: github.com/mrphrazer/obfu…

🔴 we are live rn Join us as we build a custom archetectur plugin for #BinaryNinja … the first step to lifting our custom VM twitch.tv/oalabslive

herrcore's tweet image. 🔴 we are live rn

Join us as we build a custom archetectur plugin for #BinaryNinja … the first step to lifting our custom VM

twitch.tv/oalabslive

New #BinaryNinja vis tool based on #KaitaiStruct looks better and better ;) It supports all 129 formats available at formats.kaitai.io


Why would we use genetic algorithms to construct an assembler??? Check out the latest #BinaryNinja blog post! binary.ninja/2018/06/19/fas…

vector35's tweet image. Why would we use genetic algorithms to construct an assembler??? Check out the latest #BinaryNinja blog post! binary.ninja/2018/06/19/fas…

Closed source @Solana programs used to be safe. We’ve changed that. Learn how to hack Solana programs with our open-source #BinaryNinja plugin 👇 osec.io/blog/tutorials…

osec_io's tweet image. Closed source @Solana programs used to be safe. We’ve changed that. 

Learn how to hack Solana programs with our open-source #BinaryNinja plugin 👇

osec.io/blog/tutorials…

Just built a prototype for #BinaryNinja to deobfuscate MBAs within the decompiler. Simplified expressions are attached as comments. It will be released soon, stay tuned!

mr_phrazer's tweet image. Just built a prototype for #BinaryNinja to deobfuscate MBAs within the decompiler. Simplified expressions are attached as comments. It will be released soon, stay tuned!

Continuing with #BinaryNinja posters. This time - function. SSA form will be covered in different poster. Enjoy.

carste1n's tweet image. Continuing with #BinaryNinja posters. This time - function. SSA form will be covered in different poster. Enjoy.

Interesting reading on reversing a custom Instruction Set Architecture (ISA) using Binary Ninja (37C3 CTF) Credits Thomas Imbert (@Synacktiv) synacktiv.com/en/publication… #cybersecurity #reverseengineering #binaryninja

0xor0ne's tweet image. Interesting reading on reversing a custom Instruction Set Architecture (ISA) using Binary Ninja (37C3 CTF)
Credits Thomas Imbert (@Synacktiv)

synacktiv.com/en/publication…

#cybersecurity #reverseengineering #binaryninja
0xor0ne's tweet image. Interesting reading on reversing a custom Instruction Set Architecture (ISA) using Binary Ninja (37C3 CTF)
Credits Thomas Imbert (@Synacktiv)

synacktiv.com/en/publication…

#cybersecurity #reverseengineering #binaryninja
0xor0ne's tweet image. Interesting reading on reversing a custom Instruction Set Architecture (ISA) using Binary Ninja (37C3 CTF)
Credits Thomas Imbert (@Synacktiv)

synacktiv.com/en/publication…

#cybersecurity #reverseengineering #binaryninja

Loading...

Something went wrong.


Something went wrong.


United States Trends