
Luke (datalocaltmp)
@datalocaltmp
Followers
1K
Following
3K
Media
157
Statuses
447
mobile reverse engineering, vulnerability research, using lldb
🇨🇦
Joined February 2019
Had a great time presenting at @reconmtl this weekend - always amazing meeting everyone and sharing research 🙌. For those that missed the conference, or just want to review my WhatsApp work, feel free to read the slides here & hmu if you have questions!.
docs.google.com
Call, Crash, Repeat WhatsApp Hacking @datalocaltmp
3
68
244
RT @clearbluejar: new blog post, new tool 👀. Unlock project-wide, multi-binary analysis with pyghidra-mcp, a headless Ghidra MCP server for….
clearbluejar.github.io
Unlock project-wide, multi-binary analysis with pyghidra-mcp, a headless Ghidra MCP server for automated, LLM-assisted reverse engineering.
0
36
0
RT @clearbluejar: First time in Ibiza for #OBTS 🌴☀️ and couldn’t be more stoked! Honored to be speaking alongside some brilliant researcher….
0
5
0
RT @alfiecg_dev: Just released a short writeup for the A9 version of the Trigon exploit, which involves getting code execution on a coproce….
alfiecg.uk
Where did we leave off? Background: KTRR IORVBAR Coprocessors Always-On Processor Investigation AXI? What’s that?! Mapping DRAM Code execution Improving the strategy What about A7 and A8(X)? Conclu...
0
36
0
RT @exploitsclub: EXTRA EXTRA 📣📰 #79 OUT NOW!. WhatsApp bugs from @datalocaltmp. @immortalp0ny finds a 20 year old….
blog.exploits.club
NO movie night for Love Island USA this season? Bro - come on, thats the best part....annnnyways 👇 In Case You Missed It... * Jack Dorsey Downloaded Cursor - Jk...kinda. But a cool project. *...
0
6
0
Fired up to see everyone in beautiful Montreal for @reconmtl 2025 - attend my talk to hear about my research on WhatsApp. Might have a surprise 4th bug make an appearance 👀
3
10
88
RT @phwd_: Respect and blessings 🙇.And big ❤️ to my good friend, a true homie Luke (@datalocaltmp) he is a real OG for the amount of conten….
0
2
0
Thrilled to be speaking at @reconmtl 2025 for the 20th anniversary!. My talk is "Call, Crash, Repeat: Hacking WhatsApp" and covers my reverse engineering efforts and the bugs I've found in deeplink handling, PJSIP usage, and XMPP signalling. Hope you find it interesting 🥳
2
2
47
Enjoying the Tokyo skyline with my mate courtesy of my friends at @BugBountyArg and @ekoparty - beautiful day to be a hacker!
3
0
13
Tested GhidraMCP for RE on stripped binaries - specifically the URL validation functions in Messenger (see my EkoParty talk). It reached the same conclusions in under a minute - may have took me a moment longer 👀. S/O @lauriewired for the awesome tool -
0
17
131
RT @lauriewired: Just built an MCP for Ghidra. Now basically any LLM (Claude, Gemini, local. ) can Reverse Engineer malware for you. Wit….
0
804
0
RT @clearbluejar: Wrapped up an incredible time teaching #PatchDiffingInTheDark in Austin, TX with @_ringzer0 ! The city didn’t disappoint—….
0
6
0
RT @signalapp: Right now there are a lot of new eyes on Signal, and not all of them are familiar with secure messaging and its nuances. Whi….
0
2K
0
RT @0xcc: 0xCC 2025 tickets are now available! 🎉✨. We're a free technical training conference by women, for women in or interested in cyber….
0
5
0
RT @vxunderground: Yesterday I became acquainted with a young and passionate person who, for the past 2 years, has been documenting RATs (i….
0
130
0
RT @0xcc: Have you heard about our travel grant program? . It aims to support students, those starting out, returning to work and other int….
docs.google.com
Please note that this application is an expression of interest. While we can't guarantee you a grant, we can promise we'll do our best to source the funding so we can. When you submit an application,...
0
8
0