naci Profile
naci

@_nnaci

Followers
145
Following
141
Media
1
Statuses
40

https://t.co/bkPzBp0Dln

Joined July 2024
Don't wanna be here? Send us removal request.
@HexRaysSA
Hex-Rays SA
29 days
⬆️ Grow with us! #hiring Hex-Rays has a handful of open positions in our product, engineering and business development departments. We have offices in Belgium and Romania, with onsite and hybrid opps. Start the new year with a new adventure... ● Engineering - Back End
linkedin.com
Posted 4:17:25 PM. About Hex-Rays Hex-Rays is a small, highly specialized expert team behind industry-leading software…See this and similar jobs on LinkedIn.
1
10
40
@pmeerw
Peter Meerwald-Stadler
2 months
time for some paper links: DEBRA: A Real-World Benchmark For Evaluating Deobfuscation Methods https://t.co/ZFB2rxhnqM Advancing Code Obfuscation: Novel Opaque Predicate Techniques to Counter Dynamic Symbolic Execution
techscience.com
Code obfuscation is a crucial technique for protecting software against reverse engineering and security attacks. Among various obfuscation methods, opaque predicates, which are recognized as...
5
3
25
@CryptDeriveKey
estrellas
2 months
Lately I've been working in my very own binary lifter... As part of the documentation process, I decided to write a few words about my implementation of static recovery of a given function's control flow graph. Hope you enjoy it! https://t.co/4e1tBzWlYv
2
11
45
@_revng
rev.ng
2 months
For your enjoyment, the video of the talk has been published: https://t.co/LtUNFX6QZa 🤦‍♂️ No warning, no nothing. Published as a regular talk 🤷‍♂️
0
1
9
@_nnaci
naci
2 months
When Dragons Fight Back: Logic Assisted Reversal Program (L.A.R.P.) and Super Learning Optimized Program (S.L.O.P.) https://t.co/yKYXEewy0s
nac-l.github.io
Table Of Contents
0
1
4
@0xor0ne
0xor0ne
3 months
Devirtualizing VMProtect and Themida https://t.co/7paUl9Jzqk #infosec #reverseengineering
1
48
188
@_nnaci
naci
3 months
The future is past reheated
@momo5502
Maurice Heumann
3 months
Someone stole my blogpost and rephrazed it using AI: https://t.co/TVxqqrIkXk Like everything is almost identical to my post: https://t.co/cOb2dOBR1W This is honestly just sad. This is why so many people hate AI...
0
0
1
@_nnaci
naci
4 months
rofl
@dodo_sec
Dodo on Security 🇵🇸 🇺🇦
4 months
How did this AI slop get a talk at the main track @ DEFCON????????? https://t.co/uN5KrfiBg7
0
0
2
@_nnaci
naci
4 months
Misafirperverliğiniz için teşekkür ederim, TTMO Meetup'ta konuşmacı olmak benim için bir onurdu. Başta organizasyon ekibi olmak üzere emeği geçen herkese sevgiler.
@__TTMO__
Tersine Mühendisler Odası
4 months
TTMO Meetup 6'dan kareler... Sunumları için Celil Ünüver(@celilunuver), Utku Çorbacı(@rhotav), Yusuf İşlek(@_nnaci) ve Ahsen Tekdemir'e(@ahsentekd); güzel katılım için TTMO üyelerine çok teşekkürler. Sponsorlarımız: Forestall, Secrove ve Hexflow
0
0
16
@_nnaci
naci
4 months
Daveti için @__TTMO__'na teşekkür ederim. Mergen ve (VM bazlı) korumalar hakkında konuşacağım.
@__TTMO__
Tersine Mühendisler Odası
4 months
🔥 Tersine mühendisler, 6. toplantıya koşun! Yusuf İşlek, Ahsen Tekdemir, Celil Ünüver ve Utku Çorbacı ile, 16 Ağustos, İzmir'de. RT == MOV PC, 0x41414141414141
0
0
9
@BackEngineerLab
Back Engineering Labs
6 months
🚀 CodeDefender SDK now supports source-level macros! Obfuscate functions in Rust/C/C++ by tagging them with your pre-defined obfuscation profile. 🦀 #[codedefender("Profile1")] 💻 CODEDEFENDER("Profile1", ...) Docs + examples 👉 https://t.co/X98IMAioVw #infosec #rustlang
0
5
32
@x64dbg
x64dbg
6 months
We're excited to announce a major new release of x64dbg! The main new feature is support for bitfields, enums and anonymous types, which allows all types in the Windows SDK to be represented and displayed 🔥
11
262
1K
@momo5502
Maurice Heumann
6 months
I'm currently preparing my talk for #NN2025. I probably spent too much time on the first slide, but i kinda love it 😂
@NavajaNegra_AB
Navaja Negra Conference
6 months
📣 ¡CIERRA EL CFP! ⏱️ ¿Tienes algo potente que contar sobre ciberseguridad? 🔥 Navaja Negra 2025 te espera. 📍 Últimas horas para enviar tu paper. 🕛 Fecha límite: Hoy 22 de junio a las 23:59 (CEST) ✍️ Participa YA: https://t.co/pOrup28bEB #NN2025 #Conference
7
25
181
@_nnaci
naci
6 months
I explore existing error finding methods and recompiling binaries to detect errors.🔎 https://t.co/Ta2aFiMPei
nac-l.github.io
Table Of Contents
1
18
68
@pmeerw
Peter Meerwald-Stadler
7 months
here's how compilers compare against our dedicated GAMBA tool for deobfuscation ( https://t.co/XYVcLqH8AD)
1
1
2
@C5pider
5pider
7 months
Truly excited for the upcoming workshop. Covering modern ransomware evasion & detection and also implementing your own ransomware/decryptor for Windows, MacOS and Linux. See you soon! 👻
@rad9800
Rad
7 months
Looking forward to running the ransomware workshop at @x33fcon this week with @C5pider. Some teasers of what to expect, with some painstakingly crafted slides 🙃
7
38
330
@disconnect3d_pl
Disconnect3d
7 months
We released new Pwndbg: https://t.co/KVxi4ToLFi ! It brings new kernel commands for dumping heap allocator info, display of not taken branches (X marker) in disasm, better disasm for ARM/MIPS/LoongArch64, initial s390x support & more! Sponsor us at https://t.co/1KVYKgrpXn !
16
68
303
@HexRaysSA
Hex-Rays SA
7 months
👋 Please join us in welcoming @RolfRolles as Hex-Rays’ new Chief Scientist! Rolf brings decades of RE expertise, with standout work in obfuscation, decompilation, and software protection. At Hex-Rays, he’ll lead research into next-gen decompilation and automated program
0
23
208
@mrexodia
Duncan Ogilvie 🍍
7 months
Also made a quick video on how to install TitanHide in Windows Sandbox using the SandboxBootkit project. It takes about 3 minutes end-to-end.
@mrexodia
Duncan Ogilvie 🍍
7 months
🔥 TitanHide has been updated to support the latest VMProtect 3.9.4 changes! The service name is now used as the device name as well, so the check for \\.\TitanHide will fail if you name the service differently 🧠
2
45
192