naci
@_nnaci
Followers
145
Following
141
Media
1
Statuses
40
⬆️ Grow with us! #hiring Hex-Rays has a handful of open positions in our product, engineering and business development departments. We have offices in Belgium and Romania, with onsite and hybrid opps. Start the new year with a new adventure... ● Engineering - Back End
linkedin.com
Posted 4:17:25 PM. About Hex-Rays Hex-Rays is a small, highly specialized expert team behind industry-leading software…See this and similar jobs on LinkedIn.
1
10
40
time for some paper links: DEBRA: A Real-World Benchmark For Evaluating Deobfuscation Methods https://t.co/ZFB2rxhnqM Advancing Code Obfuscation: Novel Opaque Predicate Techniques to Counter Dynamic Symbolic Execution
techscience.com
Code obfuscation is a crucial technique for protecting software against reverse engineering and security attacks. Among various obfuscation methods, opaque predicates, which are recognized as...
5
3
25
Lately I've been working in my very own binary lifter... As part of the documentation process, I decided to write a few words about my implementation of static recovery of a given function's control flow graph. Hope you enjoy it! https://t.co/4e1tBzWlYv
2
11
45
For your enjoyment, the video of the talk has been published: https://t.co/LtUNFX6QZa 🤦♂️ No warning, no nothing. Published as a regular talk 🤷♂️
0
1
9
When Dragons Fight Back: Logic Assisted Reversal Program (L.A.R.P.) and Super Learning Optimized Program (S.L.O.P.) https://t.co/yKYXEewy0s
nac-l.github.io
Table Of Contents
0
1
4
🔥 Understanding Windows ~ DSE Mechanism & Abusing ETW by @0xdr4f3rt
https://t.co/p4rasTRMtQ
0xreverse.com
Introduction In this article, I will discuss the details of the Driver Signature Enforcement Policy and Event Tracing for Windows mechanisms, which play an important role on the Windows side for...
0
4
15
1
48
188
The future is past reheated
Someone stole my blogpost and rephrazed it using AI: https://t.co/TVxqqrIkXk Like everything is almost identical to my post: https://t.co/cOb2dOBR1W This is honestly just sad. This is why so many people hate AI...
0
0
1
rofl
How did this AI slop get a talk at the main track @ DEFCON????????? https://t.co/uN5KrfiBg7
0
0
2
Misafirperverliğiniz için teşekkür ederim, TTMO Meetup'ta konuşmacı olmak benim için bir onurdu. Başta organizasyon ekibi olmak üzere emeği geçen herkese sevgiler.
TTMO Meetup 6'dan kareler... Sunumları için Celil Ünüver(@celilunuver), Utku Çorbacı(@rhotav), Yusuf İşlek(@_nnaci) ve Ahsen Tekdemir'e(@ahsentekd); güzel katılım için TTMO üyelerine çok teşekkürler. Sponsorlarımız: Forestall, Secrove ve Hexflow
0
0
16
Daveti için @__TTMO__'na teşekkür ederim. Mergen ve (VM bazlı) korumalar hakkında konuşacağım.
🔥 Tersine mühendisler, 6. toplantıya koşun! Yusuf İşlek, Ahsen Tekdemir, Celil Ünüver ve Utku Çorbacı ile, 16 Ağustos, İzmir'de. RT == MOV PC, 0x41414141414141
0
0
9
🚀 CodeDefender SDK now supports source-level macros! Obfuscate functions in Rust/C/C++ by tagging them with your pre-defined obfuscation profile. 🦀 #[codedefender("Profile1")] 💻 CODEDEFENDER("Profile1", ...) Docs + examples 👉 https://t.co/X98IMAioVw
#infosec #rustlang
0
5
32
We're excited to announce a major new release of x64dbg! The main new feature is support for bitfields, enums and anonymous types, which allows all types in the Windows SDK to be represented and displayed 🔥
11
262
1K
I'm currently preparing my talk for #NN2025. I probably spent too much time on the first slide, but i kinda love it 😂
📣 ¡CIERRA EL CFP! ⏱️ ¿Tienes algo potente que contar sobre ciberseguridad? 🔥 Navaja Negra 2025 te espera. 📍 Últimas horas para enviar tu paper. 🕛 Fecha límite: Hoy 22 de junio a las 23:59 (CEST) ✍️ Participa YA: https://t.co/pOrup28bEB
#NN2025 #Conference
7
25
181
I explore existing error finding methods and recompiling binaries to detect errors.🔎 https://t.co/Ta2aFiMPei
nac-l.github.io
Table Of Contents
1
18
68
here's how compilers compare against our dedicated GAMBA tool for deobfuscation ( https://t.co/XYVcLqH8AD)
1
1
2
Truly excited for the upcoming workshop. Covering modern ransomware evasion & detection and also implementing your own ransomware/decryptor for Windows, MacOS and Linux. See you soon! 👻
Looking forward to running the ransomware workshop at @x33fcon this week with @C5pider. Some teasers of what to expect, with some painstakingly crafted slides 🙃
7
38
330
We released new Pwndbg: https://t.co/KVxi4ToLFi ! It brings new kernel commands for dumping heap allocator info, display of not taken branches (X marker) in disasm, better disasm for ARM/MIPS/LoongArch64, initial s390x support & more! Sponsor us at https://t.co/1KVYKgrpXn !
16
68
303
👋 Please join us in welcoming @RolfRolles as Hex-Rays’ new Chief Scientist! Rolf brings decades of RE expertise, with standout work in obfuscation, decompilation, and software protection. At Hex-Rays, he’ll lead research into next-gen decompilation and automated program
0
23
208
Also made a quick video on how to install TitanHide in Windows Sandbox using the SandboxBootkit project. It takes about 3 minutes end-to-end.
🔥 TitanHide has been updated to support the latest VMProtect 3.9.4 changes! The service name is now used as the device name as well, so the check for \\.\TitanHide will fail if you name the service differently 🧠
2
45
192