
Josh Reynolds (jmag)
@JershMagersh
Followers
2K
Following
7K
Media
170
Statuses
4K
Malware analysis and reverse engineering. Sometimes I write code to do these things. Founder @InvokeReversing. Tweets are my own.
Joined June 2011
Looking forward to my first keynote! This won’t be another doom and gloom AI talk. It will be about my real world experiences with applications and pitfalls, with plenty of demos.
We are very excited to announce that our founder Joshua Reynolds will be a Keynote speaker at BSides Edmonton 2025!
1
3
29
RT @jconnerjones: I've decided to start a #blog!. I plan to use it to track my progress as I develop my #vulnerability #research skill set.….
0
2
0
RT @ESETresearch: #ESETResearch has discovered the first known AI-powered ransomware, which we named #PromptLock. The PromptLock malware us….
0
654
0
RT @infrawatch_app: Foreign-controlled proxy network "DSLRoot" has deployed hardware in 300+ U.S. homes across 20+ states-including militar….
infrawatch.app
Detailed analysis of DSLRoot, a residential proxy network deploying hardware across U.S. homes, operated by a Belarusian national. Includes technical overview, network footprint, and operator...
0
35
0
RT @InvokeReversing: We're live! Let's triage some obfuscated binaries with Binary Ninja and AssemblyLine!
twitch.tv
🔥Triaging Obfuscated Binaries with Binary Ninja🔥
0
4
0
RT @REverseConf: We know you don't need any extra reasons to attend RE//verse if you've talked to anyone who came last year, but here's a g….
0
5
0
RT @L0Psec: New RE Blog Post: RustyPages-Pt1. We RE a Rust dropper, that sets persistence and runs the downloaded….
the-sequence.com
Kandji researchers discovered a Rust-based macOS malware, RustyPages. This post analyzes the dropper component, including its evasion tactics, persistence setup, and IOCs.
0
34
0
RT @fr0gger_: 🤓 At BlackHat Arsenal I presented Proximity my MCP security scanner powered by NOVA. I am about to release the code on GitHub….
0
24
0
RT @patrickwardle: 🚨 The #OBTS v8 schedule just dropped: Three days of trainings followed by three days of talks m….
objectivebythesea.org
Conference Schedule of Trainings, Talks, and more!
0
12
0
RT @InvokeReversing: Huge congrats to @nhegde610 for completing the Binary Ninja Edition of the Introduction to Malware Binary Triage cours….
0
3
0
RT @yates82: Having a slight nostalgic trip. omg win 2000, a mini disc player. this machine on the right running slackware linux was where….
0
3
0
RT @chompie1337: Tomorrow 7 PM PDT! Livestream w me and @MalwareTechBlog. We’ll look at this month’s Patch Tuesday, dissect a bindiff, and….
twitch.tv
Cybersecurity, Tech, and General Discussions with Marcus Hutchins AKA MalwareTech. About Me: https://escapingtech.com/about/
0
54
0
RT @InvokeReversing: We've uploaded our stream from July 28th where we triaged an Emotet infection chain with Renaud from @malcat4ever enjo….
0
4
0
RT @InvokeReversing: For those who missed it, our founder Joshua Reynolds featured the Binja Lattice MCP server on Prompt||GTFO here: https….
0
9
0
RT @wunderwuzzi23: 💥 Remote Code Execution in GitHub Copilot (CVE-2025-53773) . 👉 Prompt injection exploit writes to Copilot config file an….
0
220
0
RT @patrickwardle: Just posted my @defcon slides (talk #2): "Binary Facades" . Mac malware may be compiled Mach-Os but can contain embedd….
speakerdeck.com
When confronted with malicious macOS binaries, analysts typically reach for a disassembler and immerse themselves in the complexities of low-level assem…
0
35
0
RT @InvokeReversing: This marks the end to a very successful DEF CON 33. Thank you everyone for attending the Invoke RE meet up, attending….
0
6
0
RT @jstrosch: 📣 As life slowly returns to normal after Black Hat and DEFCON, so too do live streams. Cerberus joins the live stream this….
0
12
0