datalocaltmp Profile Banner
Luke (datalocaltmp) Profile
Luke (datalocaltmp)

@datalocaltmp

Followers
1K
Following
3K
Media
157
Statuses
447

mobile reverse engineering, vulnerability research, using lldb

🇨🇦
Joined February 2019
Don't wanna be here? Send us removal request.
@datalocaltmp
Luke (datalocaltmp)
2 months
Had a great time presenting at @reconmtl this weekend - always amazing meeting everyone and sharing research 🙌. For those that missed the conference, or just want to review my WhatsApp work, feel free to read the slides here & hmu if you have questions!.
Tweet card summary image
docs.google.com
Call, Crash, Repeat WhatsApp Hacking @datalocaltmp
3
68
244
@datalocaltmp
Luke (datalocaltmp)
7 days
RT @clearbluejar: new blog post, new tool 👀. Unlock project-wide, multi-binary analysis with pyghidra-mcp, a headless Ghidra MCP server for….
Tweet card summary image
clearbluejar.github.io
Unlock project-wide, multi-binary analysis with pyghidra-mcp, a headless Ghidra MCP server for automated, LLM-assisted reverse engineering.
0
36
0
@grok
Grok
8 days
What do you want to know?.
651
473
3K
@datalocaltmp
Luke (datalocaltmp)
1 month
RT @clearbluejar: First time in Ibiza for #OBTS 🌴☀️ and couldn’t be more stoked! Honored to be speaking alongside some brilliant researcher….
0
5
0
@datalocaltmp
Luke (datalocaltmp)
1 month
RT @alfiecg_dev: Just released a short writeup for the A9 version of the Trigon exploit, which involves getting code execution on a coproce….
alfiecg.uk
Where did we leave off? Background: KTRR IORVBAR Coprocessors Always-On Processor Investigation AXI? What’s that?! Mapping DRAM Code execution Improving the strategy What about A7 and A8(X)? Conclu...
0
36
0
@datalocaltmp
Luke (datalocaltmp)
2 months
Fired up to see everyone in beautiful Montreal for @reconmtl 2025 - attend my talk to hear about my research on WhatsApp. Might have a surprise 4th bug make an appearance 👀
Tweet media one
3
10
88
@datalocaltmp
Luke (datalocaltmp)
3 months
RT @thatjiaozi: Oh hey! That’s my bug 👀 .
0
24
0
@datalocaltmp
Luke (datalocaltmp)
3 months
RT @phwd_: Respect and blessings 🙇.And big ❤️ to my good friend, a true homie Luke (@datalocaltmp) he is a real OG for the amount of conten….
0
2
0
@datalocaltmp
Luke (datalocaltmp)
3 months
Thrilled to be speaking at @reconmtl 2025 for the 20th anniversary!. My talk is "Call, Crash, Repeat: Hacking WhatsApp" and covers my reverse engineering efforts and the bugs I've found in deeplink handling, PJSIP usage, and XMPP signalling. Hope you find it interesting 🥳
Tweet media one
Tweet media two
Tweet media three
2
2
47
@datalocaltmp
Luke (datalocaltmp)
4 months
Enjoying the Tokyo skyline with my mate courtesy of my friends at @BugBountyArg and @ekoparty - beautiful day to be a hacker!
Tweet media one
3
0
13
@datalocaltmp
Luke (datalocaltmp)
4 months
On vacay in Taipei and I heard TSMC engineers place these chips (乖乖) next to their computers for good luck. Hoping they boost my odds of getting this talk on WhatsApp bugs past the CFP stage!
Tweet media one
2
3
27
@datalocaltmp
Luke (datalocaltmp)
4 months
Focused on iOS research rn - pleasently surprised to see that user data persists when downgrading apps with TrollStore. i.e. Find bug in v7 - app auto updates to v8 - force downgrade to v7.0 with TrollStore - user data persists. For when you forget to turn off updates . 🤦‍♂️.
0
0
5
@datalocaltmp
Luke (datalocaltmp)
5 months
Since AFL++ is making random permutations, can I claim these bug bounties as tax free lottery winnings?.
0
4
21
@datalocaltmp
Luke (datalocaltmp)
5 months
Tested GhidraMCP for RE on stripped binaries - specifically the URL validation functions in Messenger (see my EkoParty talk). It reached the same conclusions in under a minute - may have took me a moment longer 👀. S/O @lauriewired for the awesome tool -
Tweet media one
Tweet media two
Tweet media three
Tweet media four
0
17
131
@datalocaltmp
Luke (datalocaltmp)
5 months
RT @lauriewired: Just built an MCP for Ghidra. Now basically any LLM (Claude, Gemini, local. ) can Reverse Engineer malware for you. Wit….
0
804
0
@datalocaltmp
Luke (datalocaltmp)
5 months
RT @clearbluejar: Wrapped up an incredible time teaching #PatchDiffingInTheDark in Austin, TX with @_ringzer0 ! The city didn’t disappoint—….
0
6
0
@datalocaltmp
Luke (datalocaltmp)
5 months
RT @signalapp: Right now there are a lot of new eyes on Signal, and not all of them are familiar with secure messaging and its nuances. Whi….
0
2K
0
@datalocaltmp
Luke (datalocaltmp)
5 months
RT @0xcc: 0xCC 2025 tickets are now available! 🎉✨. We're a free technical training conference by women, for women in or interested in cyber….
0
5
0
@datalocaltmp
Luke (datalocaltmp)
5 months
RT @vxunderground: Yesterday I became acquainted with a young and passionate person who, for the past 2 years, has been documenting RATs (i….
0
130
0
@datalocaltmp
Luke (datalocaltmp)
5 months
RT @0xcc: Have you heard about our travel grant program? . It aims to support students, those starting out, returning to work and other int….
Tweet card summary image
docs.google.com
Please note that this application is an expression of interest. While we can't guarantee you a grant, we can promise we'll do our best to source the funding so we can. When you submit an application,...
0
8
0