JusticeRage Profile Banner
Ivan Kwiatkowski Profile
Ivan Kwiatkowski

@JusticeRage

Followers
11K
Following
3K
Media
290
Statuses
3K

Security @Meta. Maintainer of Manalyze, Gepetto, and writer. Trolling on a purely personal capacity.

London, UK
Joined April 2014
Don't wanna be here? Send us removal request.
@JusticeRage
Ivan Kwiatkowski
4 years
I've been working on this for 5 years, and it's finally out! I wrote a dark fantasy book (no computers involved), and it's the hardest thing I have ever done. I'm extremely proud of the final result. (But it's in French, for now.) https://t.co/EBRYfz6wXw
26
32
166
@JusticeRage
Ivan Kwiatkowski
5 hours
Interesting excerpt from a US roundtable on private sector-led cyber-offense ( https://t.co/zPOkZciZRN). The Chinese-ecosystem functions similarly. Personally, I'm always very wary of offloading state prerogatives to the private sector.
0
0
0
@ComplexCon
ComplexCon
15 hours
Visit Espolรฒn Tequila at Family Style for signature cocktails, including spicy (& not so spicy) โ€˜margs and palomas. Powered by @EspolonTequila
3
11
164
@JusticeRage
Ivan Kwiatkowski
14 days
The website is back up! This was a lot more work than I expected, as moving everything to a NFS share had unforeseen implications. Anyway, let's go for 10 more years!
0
1
0
@JusticeRage
Ivan Kwiatkowski
14 days
https://t.co/if3sKRTZjD is down tonight... because we've hit the hard drive limit! This is good news (sort of): there are now 200GB of samples analyzed on the website! I'll move the server tomorrow to another server with much more storage!
1
0
5
@craiu
Costin Raiu
22 days
@greglesnewich Thanks for the question! If just one, it would IDA Pro with Gepetto by @JusticeRage and OpenAI integration. That and code similarity.
1
2
6
@JusticeRage
Ivan Kwiatkowski
22 days
Gepetto 1.5.0 is out! This is the first stable release which includes agentic reversing / LLM tools. There are a ton of improvements so make sure to update if you haven't done so in a while!
1
2
20
@DarkWebInformer
Dark Web Informer
1 month
Quds News Network reports that a recent report revealed "that AppCloud, an Israeli application developed by IronSource, comes pre-installed on certain Samsung devices, particularly Galaxy A and Galaxy M models, and cannot be fully removed. The app automatically collects user
10
107
286
@JusticeRage
Ivan Kwiatkowski
2 months
Prompt if you want to try it out: Analyze this crackme, starting from the main function, and using all the tools at your disposal, try to figure out what is the expected password. Rename everything you can in the process. File:
crackmes.one
this is Nuclear CrackMe v2. still easy :) P.S.: plz, do not NOP this!
0
2
20
@JusticeRage
Ivan Kwiatkowski
2 months
Reverser friends, Gepetto has made huge leaps in the last weeks. I now consider it to be a decent IDA Pro agent. With zero interaction (gpt-5), it solved a crackme all on its own. I opened IDA, typed in the prompt, and it did everything.
9
63
354
@JusticeRage
Ivan Kwiatkowski
2 months
Right now, the only tools available are getting the current EA and a function's decompiled code. It's still bleeding edge, but try it out! https://t.co/lEelTim1FV
Tweet card summary image
github.com
IDA plugin which queries language models to speed up reverse-engineering - JusticeRage/Gepetto
1
2
3
@JusticeRage
Ivan Kwiatkowski
2 months
The plan for Gepetto has always been to go further in the agentic direction. I've started exposing the context of the RE session to the LLM. It may not look like much right now, but ~soon the model will create structures for you from the CLI and recast variables ๐Ÿคฏ
1
2
12
@JusticeRage
Ivan Kwiatkowski
3 months
YaraValidator update! Supports YARA up to v4.5.4. Supports YARA-X up to v1.5.0 https://t.co/9s0pQTxnZY
Tweet card summary image
yaravalidator.manalyzer.org
Compile your rules on all yara versions online to detect compatibility issues!
0
2
25
@thezdi
Trend Zero Day Initiative
3 months
Announcing #Pwn2Own Ireland for 2025! We return to the Emerald Isle with our new partner @Meta and a $1,000,000 WhatsApp bounty. Yes - one million dollars. Plus new USB attack vectors on phones and more. Check out the details at
Tweet card summary image
zerodayinitiative.com
If you just want to read the rules, you can find them here . Updated on 8/15 to clarify printer target models. Updated on 8/22 to clarify scoping for WhatsApp for Windows. Last year, we moved our...
0
64
201
@oct0xor
Boris Larin
3 months
Check out our analysis of the SharePoint ToolShell vulnerabilities: how the ITW exploit works, how it was patched, and why the initial patches could be easily bypassed
Tweet card summary image
securelist.com
Explaining the ToolShell vulnerabilities in SharePoint: how the POST request exploit works, why initial patches can be easily bypassed, and how to stay protected.
0
29
88
@kucher1n
Georgy Kucherin
4 months
A few weeks ago, I was responding to a cybersecurity incident - $500,000 have been stolen from a #blockchain developer. The infected operating system was freshly installed, and the victim was vigilant about cybersecurity. How could this happen? New supply chain attack? [1/6]
20
170
623
@passthesaltcon
Pass the SALT Conference
6 months
๐Ÿ“ฃ We are really happy and proud to announce the schedule of our 2025 edition! ๐Ÿ‘‰ Program: https://t.co/M6uLMMaIHI ๐Ÿ‘‰ Book your (free) seat here ๐ŸŽŸ๏ธ: https://t.co/eyqTRpcv9L ๐Ÿ“… July 1 to 3, 2025 ๐Ÿ“ Lille, FR TL;DR: check our program & book your seat! โœ… 1/2
1
11
12
@ArielJT
Ariel Jungheit
6 months
We published a new report, covering #Gamaredon's #PteroLNK malware, used in a recent campaign. The Russian APT group continues active operations against Ukrainian targets through April 2025 1/4
1
15
26
@JusticeRage
Ivan Kwiatkowski
7 months
Here is one of my favorite @ChatGPTapp tricks. When a website doesn't send you a calendar invite for an event, just paste the email or event details into ChatGPT and ask it to generate an ical file.
0
0
3
@DonnchaC
Donncha ร“ Cearbhaill
7 months
NEW: Last month two investigative journalists at @BIRNSrbija were targeted with NSO's Pegasus spyware. NSO Group says it spyware is sold only to "vetted government clients". This follows a pattern of hacking and surveillance by Serbian authorities They haven't gone away...
4
42
78