Ivan Kwiatkowski
@JusticeRage
Followers
11K
Following
3K
Media
290
Statuses
3K
Security @Meta. Maintainer of Manalyze, Gepetto, and writer. Trolling on a purely personal capacity.
London, UK
Joined April 2014
I've been working on this for 5 years, and it's finally out! I wrote a dark fantasy book (no computers involved), and it's the hardest thing I have ever done. I'm extremely proud of the final result. (But it's in French, for now.) https://t.co/EBRYfz6wXw
26
32
166
Interesting excerpt from a US roundtable on private sector-led cyber-offense ( https://t.co/zPOkZciZRN). The Chinese-ecosystem functions similarly. Personally, I'm always very wary of offloading state prerogatives to the private sector.
0
0
0
Visit Espolรฒn Tequila at Family Style for signature cocktails, including spicy (& not so spicy) โmargs and palomas. Powered by @EspolonTequila
3
11
164
The website is back up! This was a lot more work than I expected, as moving everything to a NFS share had unforeseen implications. Anyway, let's go for 10 more years!
0
1
0
https://t.co/if3sKRTZjD is down tonight... because we've hit the hard drive limit! This is good news (sort of): there are now 200GB of samples analyzed on the website! I'll move the server tomorrow to another server with much more storage!
1
0
5
@greglesnewich Thanks for the question! If just one, it would IDA Pro with Gepetto by @JusticeRage and OpenAI integration. That and code similarity.
1
2
6
Gepetto 1.5.0 is out! This is the first stable release which includes agentic reversing / LLM tools. There are a ton of improvements so make sure to update if you haven't done so in a while!
1
2
20
Quds News Network reports that a recent report revealed "that AppCloud, an Israeli application developed by IronSource, comes pre-installed on certain Samsung devices, particularly Galaxy A and Galaxy M models, and cannot be fully removed. The app automatically collects user
10
107
286
Prompt if you want to try it out: Analyze this crackme, starting from the main function, and using all the tools at your disposal, try to figure out what is the expected password. Rename everything you can in the process. File:
crackmes.one
this is Nuclear CrackMe v2. still easy :) P.S.: plz, do not NOP this!
0
2
20
Reverser friends, Gepetto has made huge leaps in the last weeks. I now consider it to be a decent IDA Pro agent. With zero interaction (gpt-5), it solved a crackme all on its own. I opened IDA, typed in the prompt, and it did everything.
9
63
354
Right now, the only tools available are getting the current EA and a function's decompiled code. It's still bleeding edge, but try it out! https://t.co/lEelTim1FV
github.com
IDA plugin which queries language models to speed up reverse-engineering - JusticeRage/Gepetto
1
2
3
The plan for Gepetto has always been to go further in the agentic direction. I've started exposing the context of the RE session to the LLM. It may not look like much right now, but ~soon the model will create structures for you from the CLI and recast variables ๐คฏ
1
2
12
YaraValidator update! Supports YARA up to v4.5.4. Supports YARA-X up to v1.5.0 https://t.co/9s0pQTxnZY
yaravalidator.manalyzer.org
Compile your rules on all yara versions online to detect compatibility issues!
0
2
25
Announcing #Pwn2Own Ireland for 2025! We return to the Emerald Isle with our new partner @Meta and a $1,000,000 WhatsApp bounty. Yes - one million dollars. Plus new USB attack vectors on phones and more. Check out the details at
zerodayinitiative.com
If you just want to read the rules, you can find them here . Updated on 8/15 to clarify printer target models. Updated on 8/22 to clarify scoping for WhatsApp for Windows. Last year, we moved our...
0
64
201
Check out our analysis of the SharePoint ToolShell vulnerabilities: how the ITW exploit works, how it was patched, and why the initial patches could be easily bypassed
securelist.com
Explaining the ToolShell vulnerabilities in SharePoint: how the POST request exploit works, why initial patches can be easily bypassed, and how to stay protected.
0
29
88
A few weeks ago, I was responding to a cybersecurity incident - $500,000 have been stolen from a #blockchain developer. The infected operating system was freshly installed, and the victim was vigilant about cybersecurity. How could this happen? New supply chain attack? [1/6]
20
170
623
๐ฃ We are really happy and proud to announce the schedule of our 2025 edition! ๐ Program: https://t.co/M6uLMMaIHI ๐ Book your (free) seat here ๐๏ธ: https://t.co/eyqTRpcv9L ๐
July 1 to 3, 2025 ๐ Lille, FR TL;DR: check our program & book your seat! โ
1/2
1
11
12
We published a new report, covering #Gamaredon's #PteroLNK malware, used in a recent campaign. The Russian APT group continues active operations against Ukrainian targets through April 2025 1/4
1
15
26
Here is one of my favorite @ChatGPTapp tricks. When a website doesn't send you a calendar invite for an event, just paste the email or event details into ChatGPT and ask it to generate an ical file.
0
0
3
NEW: Last month two investigative journalists at @BIRNSrbija were targeted with NSO's Pegasus spyware. NSO Group says it spyware is sold only to "vetted government clients". This follows a pattern of hacking and surveillance by Serbian authorities They haven't gone away...
4
42
78