
Invoke RE
@InvokeReversing
Followers
2K
Following
166
Media
118
Statuses
259
Empowering you to take on today's toughest threats.
Joined January 2022
Learn how to reverse engineer malware: YouTube: Twitch: Mastodon: GitHub:
training.invokere.com
The introduction to Malware Binary Triage (IMBT) course provides a comprehensive overview of the malware binary triage process. This includes reverse engineering and malware analysis of real-world...
1
8
35
Huge congrats to @nhegde610 for completing the Binary Ninja Edition of the Introduction to Malware Binary Triage course!
0
3
7
We've uploaded our stream from July 28th where we triaged an Emotet infection chain with Renaud from @malcat4ever enjoy!
1
4
22
This marks the end to a very successful DEF CON 33. Thank you everyone for attending the Invoke RE meet up, attending the @MalwareVillage and engaging with us throughout the conference. We wish everyone safe travels and look forward to next year!
0
6
24
RT @MalwareVillage: That wraps up #MalwareVillage.@DEFCON 33! 🥳. Special thanks to all the organizers, sponsors, volunteers, speakers, work….
0
21
0
A reminder that we’ll be doing a meet up tomorrow at CASBAR lounge in SAHARA at 3PM! See you then!.
Mark your calendars! The Invoke RE DEF CON 33 Meet Up will be at the CASBAR lounge in SAHARA on Thursday, August 7th from 3-6PM. Whether you're a seasoned pro or just starting out, this is a great opportunity to meet your fellow malware researchers and reverse engineers! RSVP👇
0
1
7
RT @HexRaysSA: New to #malware analysis? Then you’ll definitely want to check out this deep dive into Babuk #ransomware using #IDAPro—the p….
0
53
0
We're live! Join us for a special live stream with Renaud Tabary from.@malcat4ever where we will explore and perform live malware triage with Malcat!
twitch.tv
We stream reverse engineering, software development and other fun things related to malware analysis.
0
2
6
The num2words Python PyPI packages v0.5.15 and v0.5.16 were compromised this morning and used to distribute the Scavenger malware. A detailed write up can be found here: big thanks to @johnk3r for raising this and @cyb3rjerry for his assistance.
invokere.com
Technical blog detailing the num2words v0.5.15 PyPI supply chain compromise used to distribute Scavenger malware
0
14
47
RT @johnk3r: 🛑 Heads-up: #num2words v0.5.15 (just dropped on PyPI) may be #compromised. Early signs probably link it to #Scavenger, the sa….
0
18
0
We’re very excited to be sponsoring the inaugural Malware Village at DEF CON 33! Having a dedicated space for this research area is important and we look forward to supporting it!.
Thank you @InvokeReversing for being a Bronze sponsor for @MalwareVillage @DEFCON 33! 🙏 . Interested in learning more about their company? Visit: . #MalwareVillage.#DC33
0
8
43
RT @MalwareVillage: Thank you @InvokeReversing for being a Bronze sponsor for @MalwareVillage @DEFCON 33! 🙏 . Interested in learning more a….
0
4
0
Join us on Tuesday, July 29th, at 14:00 EST for a special live stream with Renaud Tabary from.@malcat4ever.where we will explore and perform live malware triage with Malcat!
0
2
22
RT @vector35: Binary Ninja 5.1 is now released: . - New WARP function matching.- Pseudo Objective-C.- Binexport plu….
binary.ninja
Binary Ninja is a modern reverse engineering platform with a scriptable and extensible decompiler.
0
64
0
RT @virusbtn: Cedric Brisson (@cyb3rjerry), in collaboration with Invoke RE's Josh Reynolds (@JershMagersh), analysed the "Scavenger" malwa….
0
6
0
RT @herrcore: Using the UnpacMe byte-search IDA plugin we found some Scavenger related malware dating back to October 2024. At the time the….
0
20
0