clearseclabs Profile Banner
clearseclabs Profile
clearseclabs

@clearseclabs

Followers
101
Following
173
Media
18
Statuses
144

Clear Security, Training, and Solutions Check out website for latest course offerings.

Joined September 2023
Don't wanna be here? Send us removal request.
@clearseclabs
clearseclabs
6 months
DEF CON early bird pricing ends soon! Register for Everyday Ghidra Windows Ghidra Reverse Engineering!
training.defcon.org
Name of Training: Everyday Ghidra: Practical Windows Reverse EngineeringTrainer(s): John McIntoshDates:  August 11-12, 2025Time: 08:00 am to 05:00 pm PT  Venue: Las Vegas Convention CenterCost: $2600...
@defcon
DEF CON
6 months
Friendly reminder: #defcontraining Las Vegas is exiting #earlybird mode tomorrow! To get the best price, head to https://t.co/Xe6sE8UEom and reserve your spot now. #defcon
0
1
2
@reconmtl
REcon
2 months
We released part of Recon 2025 Video on youtube https://t.co/AR0vzkkVUP. We are getting ready to announce Recon 2026 https://t.co/WxAPSuMXrH.
1
35
143
@forensicdave
Doc Dave
2 months
At #OBTS John McIntosh (@clearbluejar) from @clearseclabs demo’d his pipeline that uses AI, ipsw and ghidriff to auto-extract and diff Apple firmware — rapidly reveals real code changes behind Apple security fixes and to get actionable root-cause intel. Super clever stuff!
0
8
20
@clearbluejar
clearbluejar
2 months
New paper just dropped on arXiv featuring my open‑source tool #ghidriff 👀 "Binary Diff Summarization using Large Language Models" The authors show how patch diffing provides the perfect context for LLMs that turn raw binary changes into structured, explainable insights. 🧵
1
2
13
@patrickwardle
Patrick Wardle
2 months
John (@clearbluejar) already uncovered what Apple fixed in CVE-2025-43400 on iOS/macOS 26.0.1 🍎🐛🔬🧠 And at #OBTS v8 he’ll show exactly how, with case studies, in his talk: “Reverse Engineering Apple Security Updates” Patch first, then make sure not to miss his #OBTS talk!
@clearbluejar
clearbluejar
2 months
Breaking down the patch for CVE-2025-43400, a FontParser vulnerability in the latest macOS Tahoe and iOS 26.0.1 update. The issue: A malicious font could cause an out-of-bounds write, leading to memory corruption. Let's look at the fix. 🧵
2
13
82
@clearbluejar
clearbluejar
2 months
Breaking down the patch for CVE-2025-43400, a FontParser vulnerability in the latest macOS Tahoe and iOS 26.0.1 update. The issue: A malicious font could cause an out-of-bounds write, leading to memory corruption. Let's look at the fix. 🧵
@patrickwardle
Patrick Wardle
2 months
https://t.co/ADY1xz7n93 👀 ...impacts iOS too
1
29
107
@clearbluejar
clearbluejar
2 months
New tool "read_bytes" coming soon to pyghidra-mcp. See examples of pyghidra parsing Mach-O headers and interpreting them.
0
3
7
@clearbluejar
clearbluejar
3 months
pyghidra-mcp v0.1.9 released - Now supports async binary import. Add binaries to your Ghidra project without restarting your analysis session. 👀🔥
1
2
8
@0xor0ne
0xor0ne
3 months
pyghidra-mcp: headless Model Context Protocol (MCP) server for Ghidra by @clearbluejar Blog post: https://t.co/sSqlJnxbDL Repository: https://t.co/reNui9NTmM #infosec
1
27
112
@clearseclabs
clearseclabs
3 months
0
1
3
@0xor0ne
0xor0ne
3 months
pyghidra-mcp: headless Model Context Protocol (MCP) server for Ghidra Blog post: https://t.co/sSqlJnxbDL Repository: https://t.co/reNui9NTmM Credits @clearbluejar #infosec
1
33
119
@clearbluejar
clearbluejar
3 months
new blog post, new tool 👀 Unlock project-wide, multi-binary analysis with pyghidra-mcp, a headless Ghidra MCP server for automated, LLM-assisted reverse engineering. https://t.co/YQs9zVH1c7
Tweet card summary image
clearbluejar.github.io
Unlock project-wide, multi-binary analysis with pyghidra-mcp, a headless Ghidra MCP server for automated, LLM-assisted reverse engineering.
3
35
103
@clearbluejar
clearbluejar
4 months
Been testing local LLM tool calling with openai/gpt-oss-20b (even at 4-bit) using pyghidra-mcp. It made 22 tool calls in a one-shot run to analyze multiple binaries and traced the call chain from user-mode through kernelbase.dll to the final syscall in ntdll! 🤯
3
12
60
@clearbluejar
clearbluejar
4 months
📢 Incoming release: pyghidra‑mcp 🛠️ Meet your new RE best friend. Harness frontier models or a local gpt-oss-20b llm brain to power Ghidra multi‑binary, project‑wide analysis. You’ll be slicing through code like butter 🧈😆 ETA: imminent. Keep your shells warm 🔥🐙⚡🐉
1
10
39
@clearbluejar
clearbluejar
4 months
New ghidrecomp release with support for Ghidra 11 👀
1
3
7
@clearbluejar
clearbluejar
4 months
First time in Ibiza for #OBTS 🌴☀️ and couldn’t be more stoked! Honored to be speaking alongside some brilliant researchers. In my new talk I'll explore Apple Security Updates and how to tear them open for intel. Bring your sunscreen and your curiosity😎🧠
@objective_see
Objective-See Foundation
4 months
📢 Just dropped: the full #OBTS v8 talk lineup! https://t.co/WnHCvCdWqm And for the first time we'll have 3 full days of presentations! 🤩 Congrats to the selected speakers and mahalo to all who submitted. With ~100 submissions, selecting the final talks was a daunting task! 😫
0
5
25
@clearseclabs
clearseclabs
6 months
DEF CON early bird pricing ends soon! Register for Everyday Ghidra Windows Ghidra Reverse Engineering!
training.defcon.org
Name of Training: Everyday Ghidra: Practical Windows Reverse EngineeringTrainer(s): John McIntoshDates:  August 11-12, 2025Time: 08:00 am to 05:00 pm PT  Venue: Las Vegas Convention CenterCost: $2600...
@defcon
DEF CON
6 months
Friendly reminder: #defcontraining Las Vegas is exiting #earlybird mode tomorrow! To get the best price, head to https://t.co/Xe6sE8UEom and reserve your spot now. #defcon
0
1
2
@clearseclabs
clearseclabs
5 months
Tick-tock... 10 days left until the Everyday Ghidra Virtual Course begins! Still debating? Here's your sign: grab 10% off with this last-minute coupon → em-2xilxwrrwuzgte58 Secure your spot now 🔐 https://t.co/kcuf49UobM
0
2
2
@clearbluejar
clearbluejar
5 months
#ghidriff v1.0.0 released with full support for Ghidra 11.4 🔥 Release : https://t.co/5FKPpCOFsL 👀
0
16
52
@clearseclabs
clearseclabs
5 months
Tick-tock... 10 days left until the Everyday Ghidra Virtual Course begins! Still debating? Here's your sign: grab 10% off with this last-minute coupon → em-2xilxwrrwuzgte58 Secure your spot now 🔐 https://t.co/kcuf49UobM
0
2
2
@clearbluejar
clearbluejar
5 months
Had a fantastic time teaching participants in my Ghidra CLI-to-MCP workshop. Huge thanks to @reconmtl for the opportunity! Best part? Connecting afterward to brainstorm future ideas with so many brilliant minds. 🔥
1
1
19