clearseclabs
@clearseclabs
Followers
101
Following
173
Media
18
Statuses
144
Clear Security, Training, and Solutions Check out website for latest course offerings.
Joined September 2023
DEF CON early bird pricing ends soon! Register for Everyday Ghidra Windows Ghidra Reverse Engineering!
training.defcon.org
Name of Training: Everyday Ghidra: Practical Windows Reverse EngineeringTrainer(s): John McIntoshDates: August 11-12, 2025Time: 08:00 am to 05:00 pm PT Venue: Las Vegas Convention CenterCost: $2600...
Friendly reminder: #defcontraining Las Vegas is exiting #earlybird mode tomorrow! To get the best price, head to https://t.co/Xe6sE8UEom and reserve your spot now. #defcon
0
1
2
We released part of Recon 2025 Video on youtube https://t.co/AR0vzkkVUP. We are getting ready to announce Recon 2026 https://t.co/WxAPSuMXrH.
1
35
143
At #OBTS John McIntosh (@clearbluejar) from @clearseclabs demo’d his pipeline that uses AI, ipsw and ghidriff to auto-extract and diff Apple firmware — rapidly reveals real code changes behind Apple security fixes and to get actionable root-cause intel. Super clever stuff!
0
8
20
New paper just dropped on arXiv featuring my open‑source tool #ghidriff 👀 "Binary Diff Summarization using Large Language Models" The authors show how patch diffing provides the perfect context for LLMs that turn raw binary changes into structured, explainable insights. 🧵
1
2
13
John (@clearbluejar) already uncovered what Apple fixed in CVE-2025-43400 on iOS/macOS 26.0.1 🍎🐛🔬🧠 And at #OBTS v8 he’ll show exactly how, with case studies, in his talk: “Reverse Engineering Apple Security Updates” Patch first, then make sure not to miss his #OBTS talk!
Breaking down the patch for CVE-2025-43400, a FontParser vulnerability in the latest macOS Tahoe and iOS 26.0.1 update. The issue: A malicious font could cause an out-of-bounds write, leading to memory corruption. Let's look at the fix. 🧵
2
13
82
Breaking down the patch for CVE-2025-43400, a FontParser vulnerability in the latest macOS Tahoe and iOS 26.0.1 update. The issue: A malicious font could cause an out-of-bounds write, leading to memory corruption. Let's look at the fix. 🧵
1
29
107
New tool "read_bytes" coming soon to pyghidra-mcp. See examples of pyghidra parsing Mach-O headers and interpreting them.
0
3
7
pyghidra-mcp v0.1.9 released - Now supports async binary import. Add binaries to your Ghidra project without restarting your analysis session. 👀🔥
1
2
8
pyghidra-mcp: headless Model Context Protocol (MCP) server for Ghidra by @clearbluejar Blog post: https://t.co/sSqlJnxbDL Repository: https://t.co/reNui9NTmM
#infosec
1
27
112
pyghidra-mcp: headless Model Context Protocol (MCP) server for Ghidra Blog post: https://t.co/sSqlJnxbDL Repository: https://t.co/reNui9NTmM Credits @clearbluejar
#infosec
1
33
119
new blog post, new tool 👀 Unlock project-wide, multi-binary analysis with pyghidra-mcp, a headless Ghidra MCP server for automated, LLM-assisted reverse engineering. https://t.co/YQs9zVH1c7
clearbluejar.github.io
Unlock project-wide, multi-binary analysis with pyghidra-mcp, a headless Ghidra MCP server for automated, LLM-assisted reverse engineering.
3
35
103
Been testing local LLM tool calling with openai/gpt-oss-20b (even at 4-bit) using pyghidra-mcp. It made 22 tool calls in a one-shot run to analyze multiple binaries and traced the call chain from user-mode through kernelbase.dll to the final syscall in ntdll! 🤯
3
12
60
📢 Incoming release: pyghidra‑mcp 🛠️ Meet your new RE best friend. Harness frontier models or a local gpt-oss-20b llm brain to power Ghidra multi‑binary, project‑wide analysis. You’ll be slicing through code like butter 🧈😆 ETA: imminent. Keep your shells warm 🔥🐙⚡🐉
1
10
39
First time in Ibiza for #OBTS 🌴☀️ and couldn’t be more stoked! Honored to be speaking alongside some brilliant researchers. In my new talk I'll explore Apple Security Updates and how to tear them open for intel. Bring your sunscreen and your curiosity😎🧠
📢 Just dropped: the full #OBTS v8 talk lineup! https://t.co/WnHCvCdWqm And for the first time we'll have 3 full days of presentations! 🤩 Congrats to the selected speakers and mahalo to all who submitted. With ~100 submissions, selecting the final talks was a daunting task! 😫
0
5
25
DEF CON early bird pricing ends soon! Register for Everyday Ghidra Windows Ghidra Reverse Engineering!
training.defcon.org
Name of Training: Everyday Ghidra: Practical Windows Reverse EngineeringTrainer(s): John McIntoshDates: August 11-12, 2025Time: 08:00 am to 05:00 pm PT Venue: Las Vegas Convention CenterCost: $2600...
Friendly reminder: #defcontraining Las Vegas is exiting #earlybird mode tomorrow! To get the best price, head to https://t.co/Xe6sE8UEom and reserve your spot now. #defcon
0
1
2
Tick-tock... 10 days left until the Everyday Ghidra Virtual Course begins! Still debating? Here's your sign: grab 10% off with this last-minute coupon → em-2xilxwrrwuzgte58 Secure your spot now 🔐 https://t.co/kcuf49UobM
0
2
2
#ghidriff v1.0.0 released with full support for Ghidra 11.4 🔥 Release : https://t.co/5FKPpCOFsL 👀
0
16
52
Tick-tock... 10 days left until the Everyday Ghidra Virtual Course begins! Still debating? Here's your sign: grab 10% off with this last-minute coupon → em-2xilxwrrwuzgte58 Secure your spot now 🔐 https://t.co/kcuf49UobM
0
2
2
Had a fantastic time teaching participants in my Ghidra CLI-to-MCP workshop. Huge thanks to @reconmtl for the opportunity! Best part? Connecting afterward to brainstorm future ideas with so many brilliant minds. 🔥
1
1
19