InvokeReversing Profile Banner
Invoke RE Profile
Invoke RE

@InvokeReversing

Followers
2K
Following
150
Media
107
Statuses
230

Empowering you to take on today's toughest threats.

Joined January 2022
Don't wanna be here? Send us removal request.
@InvokeReversing
Invoke RE
1 year
Learn how to reverse engineer malware: YouTube: Twitch: Mastodon: GitHub:
1
8
32
@InvokeReversing
Invoke RE
3 days
Link to stream:
0
3
4
@InvokeReversing
Invoke RE
3 days
We've uploaded our Time Travel Debugging in Binary Ninja stream with Xusheng Li from @vector35 where we unpacked malware and analyzed anti-analysis capabilities with TTD traces. Enjoy!
Tweet media one
1
32
154
@InvokeReversing
Invoke RE
9 days
C’mon…
Tweet media one
1
3
27
@InvokeReversing
Invoke RE
12 days
Big thanks to @unpacme for their Yara search and @cybercentre_ca for AssemblyLine!.
0
0
3
@InvokeReversing
Invoke RE
12 days
Stream recording:
1
3
11
@InvokeReversing
Invoke RE
12 days
We've uploaded our beginner .NET malware analysis stream where we analyzed DCRat with dnSpy. Enjoy!
Tweet media one
2
42
250
@InvokeReversing
Invoke RE
15 days
Huge congrats to @n0t_8fr8d for completing the Binary Ninja Edition of the Introduction to Malware Binary Triage course!
Tweet media one
0
2
18
@InvokeReversing
Invoke RE
16 days
Thanks everyone for joining! Time Travel Debugging and malware analysis are a match made in heaven. We were able to unpack a malware sample from a TTD trace and find where anti-VM tricks caused it to exit in a few clicks. The recording will be up soon!.
1
2
9
@InvokeReversing
Invoke RE
16 days
Join us for a special stream today at 10AM EST with Xusheng Li from Vector35 where we will explore Time Travel Debugging with Binary Ninja!
1
2
15
@InvokeReversing
Invoke RE
20 days
Code changes for v0.3 discussed and implemented on stream:
0
1
1
@InvokeReversing
Invoke RE
20 days
Full stream recording:
1
1
3
@InvokeReversing
Invoke RE
20 days
We've uploaded our Binary Ninja MCP development stream where we added functionality to rename and read from global variables in Binary Ninja with Cursor. Check out this clip demoing these capabilities with a ransomware variant.
3
13
80
@InvokeReversing
Invoke RE
21 days
RT @luke92881: #TamperedChef.Another variant from recipelister/lookupkitchen. This one fork.exe from fast-forks[.]com .
0
5
0
@InvokeReversing
Invoke RE
25 days
RT @tonmoy0010: Been working on this Windows Registry forensics tool and thought it might help other analysts out there. Makes digging thro….
0
1
0
@InvokeReversing
Invoke RE
26 days
RT @struppigel: The @InvokeReversing community uncovered a malicious recipe app. It loads and executes encrypted scripts that are hidden v….
0
8
0
@InvokeReversing
Invoke RE
27 days
We had an awesome collaboration on the Invoke RE Discord server that looked at an interesting "RecipeLister" Adware campaign, check out the blog from Dingusxmcgee here:
4
13
52
@InvokeReversing
Invoke RE
28 days
Shout out to @unpacme for their fantastic Yara search and @x64dbg for debugging.
0
1
12
@InvokeReversing
Invoke RE
28 days
Stream recording link:
1
4
36
@InvokeReversing
Invoke RE
28 days
We've uploaded our beginner malware analysis stream where we analyzed a Babuk ransomware variant with IDA Pro. Enjoy!
Tweet media one
4
151
738
@InvokeReversing
Invoke RE
30 days
Thanks for joining all! It was super fun! Will hopefully be doing more .NET content soon.
0
0
0