Explore tweets tagged as #binaryninja
@mr_phrazer
Tim Blazytko
1 year
New #BinaryNinja plugin: ReverserAI. It uses local large language models (LLMs) to derive semantically meaningful function names from decompiler output, demonstrating the potential of local LLMs to support reverse engineering on consumer hardware. Link:
Tweet media one
1
149
533
@0xor0ne
0xor0ne
1 year
Interesting reading on reversing a custom Instruction Set Architecture (ISA) using Binary Ninja (37C3 CTF).Credits Thomas Imbert (@Synacktiv). #cybersecurity #reverseengineering #binaryninja
Tweet media one
Tweet media two
Tweet media three
2
39
144
@Anastasis_King
Cyberkid
2 months
🧠 Top Reverse Engineering Tools Every Cybersecurity Researcher Should Know 🔍🛠️. #ReverseEngineering #CyberSecurityTools #InfoSec #MalwareAnalysis #EthicalHacking #Ghidra #IDAPro #BinaryNinja #EducationOnly #RedTeamTools #CyberAwareness
Tweet media one
0
0
1
@fr0gger_
Thomas Roccia 🤘
2 years
I really like this tool; it is a web interface which allows to decompile a sample and to directly obtain the result in the web page. You have IDA, Ghidra, BinaryNinja, RETdec and many more! And on top of that the code is opensource! 🔍.
Tweet media one
3
165
466
@FAMASoon
FAMASoon
9 months
I bought BinaryNinja
Tweet media one
0
0
4
@mr_phrazer
Tim Blazytko
2 years
New version of my #binaryninja plugin to detect interesting code in binaries. I've added a new heuristic to detect simple XOR decryption loops. It can identify string decryption routines, code decryption stubs and cryptographic implementations. Code:
Tweet media one
2
32
123
@Myrtus0x0
Myrtus
3 years
hype hype hype 🔥🔥🔥 this is a fantastic add for us windows REs #binaryninja @vector35
Tweet media one
2
9
44
@mr_phrazer
Tim Blazytko
2 years
New major release of my #BinaryNinja plugin obfuscation_detection: Additional to code detection heuristics to explore unknown binaries, it now also includes analysis helpers such as entropy computation to detect packed/encrypted code & data. Code:
Tweet media one
0
24
80
@mr_phrazer
Tim Blazytko
2 years
My new blog post introduces a heuristic based on call frequency to identify API functions in statically-linked executables & embedded firmware. It also detects API hashing routines in PlugX malware. Link: #binaryninja plugin:
Tweet media one
0
35
102
@0x796
Convergence Boy
3 years
Anyone tried Ethersplay?.Does it still work?.Don't wanna buy BinaryNinja just to see it's no longer supported or smth.
Tweet media one
4
0
8
@viperbjk
Bjoern Kerler
2 years
Ok, obviously MIPS16e isn't getting enough love from Ghidra and IDA. I doubt binaryninja supports MIPS16e at all. Also unicorn doesn't support it at all. Not to mention baby and nanomips, where the situation is even worse.
Tweet media one
Tweet media two
Tweet media three
Tweet media four
1
0
6
@mr_phrazer
Tim Blazytko
3 months
New #BinaryNinja plugin: Obfuscation Analysis. Simplifies arithmetic obfuscation (MBA) directly in the decompiler (see demo below). Also identifies functions with corrupted disassembly. Co-authored by @nicolodev; available in the plugin manager.
1
45
177
@mr_phrazer
Tim Blazytko
2 years
New version of my #binaryninja to identify obfuscated code. Besides major performance improvements it includes a new heuristic to detect frequently called functions which identifies string decryption and API hashing routines in #malware. Code:
Tweet media one
1
28
110
@retr0reg
Ruikai
3 months
working with binaryninja on an single ASAN output, of a sophisticated framework.
3
36
257
@RobelCampbell
Robel Campbell
10 months
Recent updates to IDA Pro 9 and Binaryninja 4.1 "broke" some functionality with the tools bindiff/binexport which are used by reverse engineers for binary diffing. I am sure the maintainers will incorporate some fixes for these tools but in the meantime, I am releasing my
Tweet media one
1
1
5
@greglesnewich
Greg Lesnewich
2 years
#100DaysofYARA Day 19 they're not all winners! But what I love about BinaryNinja is that a lowly analyst like me with no dev experience can create a quick little snippet to try and mine out all unnamed functions as YARA rules. crude: yes.effective: eh? . but have to try it right?
Tweet media one
Tweet media two
2
5
29
@dulgex
Dulge
9 months
Binary Ninja Edit.#binaryninja.
Tweet media one
0
4
25
@pedramamini
Pedram Amini
1 year
Simple and clean BinaryNinja integration with Ollama to rename functions and variables via LLM:.
Tweet media one
Tweet media two
0
15
76
@mr_phrazer
Tim Blazytko
1 year
New version of my #BinaryNinja plugin obfuscation_detection. New features detect:.* RC4 implementations (KSA + PRGA).* functions with a high loop frequency (potential performance bottlenecks).* irreducible loops (aggressive optimizations & obfuscation).
Tweet media one
0
29
114