#binaryninja 搜尋結果
New #BinaryNinja plugin: ReverserAI. It uses local large language models (LLMs) to derive semantically meaningful function names from decompiler output, demonstrating the potential of local LLMs to support reverse engineering on consumer hardware. Link: github.com/mrphrazer/reve…
The new version of my #BinaryNinja plugin Obfuscation Analysis (v1.2) adds recursive function inlining in the decompiler. It collapses call-heavy code into a single function; analysis, constant propagation, DCE and other analyses work across boundaries. github.com/mrphrazer/obfu…
Sneak peek preview at new #BinaryNinja visualization tool utilizing #KaitaiStruct declarative power to explore inner structures of intricate binary formats. Hurray to more vis tools and integrations!
Closing out the #Pwn2Own 2018 blog series with with the details behind our sandbox-to-root privilege escalation (CVE-2018-4193). Write a less-shady exploit, and we'll give you a free #BinaryNinja Commercial License! blog.ret2.io/2018/08/28/pwn…
#BinaryNinja team spotted their icon in my laptop dock - nothing escapes your eyes: my daily RE companion 🥷
New #BinaryNinja plugin: Obfuscation Analysis Simplifies arithmetic obfuscation (MBA) directly in the decompiler (see demo below). Also identifies functions with corrupted disassembly. Co-authored by @nicolodev; available in the plugin manager. github.com/mrphrazer/obfu…
Extracting Sandbox Profiles on iOS with @CellebriteLabs fork of SandBlaster by @TFP0Labs tfp0labs.com/blog/sandblast… #iOSSecurity #Sandboxing #BinaryNinja
Just built a prototype for #BinaryNinja to deobfuscate MBAs within the decompiler. Simplified expressions are attached as comments. It will be released soon, stay tuned!
Closed source @Solana programs used to be safe. We’ve changed that. Learn how to hack Solana programs with our open-source #BinaryNinja plugin 👇 osec.io/blog/tutorials…
More details: @nicolodev and I discuss the current state of MBA (de)obfuscation and their applications @reconmtl We’ll also introduce a new #BinaryNinja plugin for simplifying MBAs in the decompiler. Details: cfp.recon.cx/recon-2025/fea…
Happy to announce that @nicolodev and I will be giving a talk titled "Breaking Mixed Boolean-Arithmetic Obfuscation in Real-World Applications" at @reconmtl More information will follow in the coming days.
Exciting! @vector35's excellent #BinaryNinja ships with built-in BinExport in the latest dev version! Here's how to use it with #BinDiff: dev-docs.binary.ninja/guide/binexpor…
New heuristic in my #BinaryNinja plugin obfuscation_detection: Duplicate Subgraphs uses iterative context hashing to spot repeated multi-block code. We merge each block’s signature with its successors over multiple rounds for efficiency. Link: github.com/mrphrazer/obfu…
Why would we use genetic algorithms to construct an assembler??? Check out the latest #BinaryNinja blog post! binary.ninja/2018/06/19/fas…
Continuing with #BinaryNinja posters. This time - function. SSA form will be covered in different poster. Enjoy.
I wrote a blog post on the automation of tedious reverse engineering tasks. We use string decryption in malware as an example. synthesis.to/2021/06/30/aut… We script #BinaryNinja to clean up the decompilation of the Mirai botnet. Try it yourself: github.com/mrphrazer/mira…
New blog post and updated #binaryninja plugin: "Statistical Analysis to Detect Uncommon Code" We use statistics to identify obfuscation in an #Anticheat, a mobile DRM, a #Windows kernel module & malware. Link: synthesis.to/2023/01/26/unc… Code: github.com/mrphrazer/obfu…
The recording of our (CC @nicolodev) talk "Breaking Mixed Boolean-Arithmetic Obfuscation in Real-World Applications" at @reconmtl is now online! Recording: youtube.com/watch?v=QxSGWk… Slides: synthesis.to/presentations/… #BinaryNinja Plugin: github.com/mrphrazer/obfu…
Static pointer tracking is tricky. Just shipped some improvements to my #BinaryNinja plugin #Mole: it now tracks array and struct members more precisely. An example on how Mole does this: github.com/cyber-defence-… Binja's multiple ILs make precise analysis so much more powerful!
📚🦠Zero2Auto - Custom Sample - Stage 1 The first stage of the provided sample offers some interesting features that are excellent for reinforcing the content learnt so far in this course. #zero2auto #BinaryNinja #pestudio medium.com/@0x747863/zero…
- ساختار داده های پیچیده رو شناسایی و بازسازی میکنه. - نمایش گرافیکی قابل پیکربندی داره. - از دیکامپایلرهای #IDAPro , #Ghidra و #BinaryNinja پشتیبانی میکنه. - قابل اجرا روی #Windows، #Linux، و #macOS هستش.
The recording of our (CC @nicolodev) talk "Breaking Mixed Boolean-Arithmetic Obfuscation in Real-World Applications" at @reconmtl is now online! Recording: youtube.com/watch?v=QxSGWk… Slides: synthesis.to/presentations/… #BinaryNinja Plugin: github.com/mrphrazer/obfu…
The recording of our @defcon talk is now available. We shared our approach to reversing IoT and OT malware written in Go using a hybrid toolkit that blends AI with traditional analysis methods using #Radare2 , #Ghidra, and #BinaryNinja. youtu.be/TtPicirB6G4?si… #IoT #Reversing #AI
youtube.com
YouTube
DEF CON 33 - Go Malware Meets IoT - Challenges, Blind Spots, and...
The new version of my #BinaryNinja plugin Obfuscation Analysis (v1.2) adds recursive function inlining in the decompiler. It collapses call-heavy code into a single function; analysis, constant propagation, DCE and other analyses work across boundaries. github.com/mrphrazer/obfu…
Exciting! @vector35's excellent #BinaryNinja ships with built-in BinExport in the latest dev version! Here's how to use it with #BinDiff: dev-docs.binary.ninja/guide/binexpor…
New #BinaryNinja plugin: Obfuscation Analysis Simplifies arithmetic obfuscation (MBA) directly in the decompiler (see demo below). Also identifies functions with corrupted disassembly. Co-authored by @nicolodev; available in the plugin manager. github.com/mrphrazer/obfu…
Jordan Wiens (@psifertex) is one of the co-founders of @vector35, and developers of #BinaryNinja. Jordan shares the techniques he uses to break decompilers, and a framework to evaluate existing techniques according to various properties. More info: linkedin.com/posts/off-by-o…
More details: @nicolodev and I discuss the current state of MBA (de)obfuscation and their applications @reconmtl We’ll also introduce a new #BinaryNinja plugin for simplifying MBAs in the decompiler. Details: cfp.recon.cx/recon-2025/fea…
Happy to announce that @nicolodev and I will be giving a talk titled "Breaking Mixed Boolean-Arithmetic Obfuscation in Real-World Applications" at @reconmtl More information will follow in the coming days.
مهمان قسمت هفتم پادکست Behind the Binary آقای @psifertex ، یکی از هم بنیانگذاران Vector 35 و سازندگان #BinaryNinja هستش و در خصوص چشم انداز آینده #امنیت_سایبری، تاثیر #هوش_مصنوعی، توسعه ی Binary Ninja و شرکت در #CTF صحبت میکنن. اسپاتیفای : open.spotify.com/episode/6tMYu7…
Huge thanks to @vector35 for supporting the challenge and offering a #BinaryNinja license to the first-place winner. 🏅
ابزار #BinaryNinja یک ابزار #مهندسی_معکوس و آنالیز باینری هستش که امکان اسکریپت نویسی با #پایتون برای خودکارسازی فرایندهارو فراهم میکنه. اگه فرصت نکردید، برنامه ضبط میشه و بعدا هم از همون لینکها قابل دسترسه.
New heuristic in my #BinaryNinja plugin obfuscation_detection: Duplicate Subgraphs uses iterative context hashing to spot repeated multi-block code. We merge each block’s signature with its successors over multiple rounds for efficiency. Link: github.com/mrphrazer/obfu…
Learn how to record a Time Travel Debug (TTD) trace using Binary Ninja! Discover key steps to capture emulation and execution instructions in this insightful video. 🌐 #Debugging #BinaryNinja #USA link: ift.tt/q6dMNZA
Explore the power of time travel debugging with Microsoft’s TTD technology! 📽️ Step backward and forward through code execution using Binary Ninja’s seamless UI integration. #TimeTravelDebugging #BinaryNinja #USA link: ift.tt/rkfBEtN
Sneak peek preview at new #BinaryNinja visualization tool utilizing #KaitaiStruct declarative power to explore inner structures of intricate binary formats. Hurray to more vis tools and integrations!
New #BinaryNinja plugin: ReverserAI. It uses local large language models (LLMs) to derive semantically meaningful function names from decompiler output, demonstrating the potential of local LLMs to support reverse engineering on consumer hardware. Link: github.com/mrphrazer/reve…
Closing out the #Pwn2Own 2018 blog series with with the details behind our sandbox-to-root privilege escalation (CVE-2018-4193). Write a less-shady exploit, and we'll give you a free #BinaryNinja Commercial License! blog.ret2.io/2018/08/28/pwn…
New #BinaryNinja vis tool based on #KaitaiStruct looks better and better ;) It supports all 129 formats available at formats.kaitai.io
Closed source @Solana programs used to be safe. We’ve changed that. Learn how to hack Solana programs with our open-source #BinaryNinja plugin 👇 osec.io/blog/tutorials…
Just built a prototype for #BinaryNinja to deobfuscate MBAs within the decompiler. Simplified expressions are attached as comments. It will be released soon, stay tuned!
Why would we use genetic algorithms to construct an assembler??? Check out the latest #BinaryNinja blog post! binary.ninja/2018/06/19/fas…
New major release of my #BinaryNinja plugin obfuscation_detection: Additional to code detection heuristics to explore unknown binaries, it now also includes analysis helpers such as entropy computation to detect packed/encrypted code & data. Code: github.com/mrphrazer/obfu…
ripr is a #BinaryNinja plugin that makes rapid code reuse easy, this week it got a few new features: blog.ret2.io/2017/11/01/rip…
New blog post and updated #binaryninja plugin: "Statistical Analysis to Detect Uncommon Code" We use statistics to identify obfuscation in an #Anticheat, a mobile DRM, a #Windows kernel module & malware. Link: synthesis.to/2023/01/26/unc… Code: github.com/mrphrazer/obfu…
#BinaryNinja team spotted their icon in my laptop dock - nothing escapes your eyes: my daily RE companion 🥷
Something went wrong.
Something went wrong.
United States Trends
- 1. Brian Kelly 12.3K posts
- 2. #VERZUZ 50.3K posts
- 3. Yamamoto 54.6K posts
- 4. Birdman 13.4K posts
- 5. No Limit 33.2K posts
- 6. Mia X 597K posts
- 7. Cash Money 28.5K posts
- 8. Wayne 37.9K posts
- 9. Michigan 38.6K posts
- 10. Death Valley 4,354 posts
- 11. #GoBlue 3,524 posts
- 12. Texas A&M 11.7K posts
- 13. Salter 1,414 posts
- 14. Turk 592K posts
- 15. #HalloweenHavoc 48.5K posts
- 16. Aggies 4,567 posts
- 17. Jonas Brothers 6,664 posts
- 18. Tamar 8,167 posts
- 19. Jonathan Smith N/A
- 20. Baton Rouge 2,588 posts