Vector 35
@vector35
Followers
10K
Following
2K
Media
425
Statuses
2K
Makers of the Binary Ninja - Reverse Engineering Platform. https://t.co/opkys50srq Also posting at https://t.co/2HEfgOtSSR
Melbourne, FL
Joined January 2015
Binary Ninja 5.2, Io, is live and it's out of this world! https://t.co/w4wAoqUwUf With some of our most requested features of all time including bitfield support, containers, hexagon, Ghidra import, and a huge upgrade to TTD capabilities, plus a ton more, make sure to check out
3
31
106
Interested in spending the summer at Vector 35 working on Binary Ninja? Our 2026 internship applications are currently open through January 15! Positions are in-person in Melbourne FL. Apply by emailing hiring@vector35.com. https://t.co/DlanQTT7Qn
0
1
9
First two unauthenticated RCE CVEs published - Discovered with the help of our #Binja plugin #Mole! š Advisory: https://t.co/tgb42PVnyx š Mole: https://t.co/J3NwT2iWkK More vulnerabilities have been reported - stay tuned for upcoming advisories.
github.com
A Binary Ninja plugin to identify interesting paths using static backward slicing - cyber-defence-campus/mole
0
2
5
We are teaming up with @eShard on December 5th at 10am EST for a live demo that walks through the full PetyA workflow! We'll look at how the malware drops and maps its DLL into memory, how TTD recording captures the full execution, and how the Binary Ninja debugger ties into
0
16
54
Think you can survive the job? Bring friends for a terrifying co-op horror heist in Dark Hours! Play Dark Hours now on Steam.
0
0
1
Full length reverse engineering with Invoke RE! Showcasing new iterations of the "Scavenger" malware, or what we saw as "ExoTickler" previously as a fake City Skylines 2 video game mod, now w/ more crypto/creds stealing and C2. Binary Ninja, x64dbg & more: https://t.co/AvW8A6lROO
5
32
203
Looks like more MacSync: 4d751dd363298589cb436d78cd302f9d794ae1e3670722a464884be908671a9c - Zoom lookalike. thanks @malwrhunterteam :) Written in Objective-C, which is beautiful and a great start to a Monday. Look a how pretty that binja Pseudo-ObjC is.ā„ļø Brackets! š§µ
1
9
33
I heard you like using static typing, and so do I. Use static typing to manipulate binaryninja and write native plugin !
github.com
BinaryNinja dotnet C# Bindings (Typed, Safe, Native AOT Ready) - tinysec/binaryninja
0
14
78
You can now pull Ghidra databases straight into your workflow in Binary Ninja 5.2! Open a .gbf on its own, import Ghidra data into an existing session, or bring parts of a full project into a Binary Ninja project on Commercial and above. Mixed tool workflows get a lot easier and
2
7
50
More and more Amazon sellers switch to Boxem every day It's the modern way to create shipments, track profit, and save more time than ever managing your business Get a free trial today:
3
1
21
Binary Ninja 5.2 adds support for custom string formats and constant encodings. Instead of wrestling with odd or obfuscated values, you can teach Binja how they work and let the analysis reveal the real content anywhere it appears. This update lays the groundwork for more
0
7
60
Container support is finally here in Binary Ninja 5.2! You can browse nested formats like ZIP, IMG4, or CaRT right in memory with no manual extraction. When a container resolves to a single target, Binja can open it straight away. If there are multiple payloads, the new Container
1
3
28
Binary Ninja 5.2 brings initial bitfield support. You can now represent structure members with specific bit positions and widths, and Linear View will show them cleanly. Our debug info plugins like DWARF, PDB, and the built in SVD import all express bitfields now too. More
0
9
68
Free Candy anyone? Well, not quite free candy, but it might seem like it if youāre a user of the Free edition of Binary Ninja! In 5.2, weāre adding many new features from the paid versions to Free: Objective-C workflow, WARP plugin, DWARF Import and TTD support!
1
5
19
Join us in just a few minutes for a discussion about obfuscation, deobfuscation, and security with RE//verse 2026 trainier Tim Blazytko!
0
3
9
One click, and your data could be exposed to AI agentsāforever? Inga Cherney, threat researcher and member of Cato CTRL, discusses how to develop a Zero Trust mindset when working with AI, and how to steer clear of hanging permissions in AI agents.
5
4
71
Join us for another interview this Friday at 4pm ET with Tim Blazytko! As the instructor of Software Deobfuscation Techniques at RE//verse 2026, we'll be picking his brain about the role obfuscation and deobfuscation play a role in today's cybersecurity scene. What would you like
2
8
25
Back-to-back-to-back streams! Join us again today at 4pm ET to meet Marion Marschalek, and get a taste of what Advanced Linux Malware Reverse Engineering at RE//verse 2026 will be like! Ask your questions during the stream or reply with them here! https://t.co/klHRciFJJg
4
5
27
How VT Code Insight + Binary Ninja use AI to scan Apple binaries at scale, catch undetected Mac/iOS malware, and reduce false positives. No metadata, just code. https://t.co/Rxi3mNvylu
0
22
82
Join us NOW (10pm ET) in finally putting some Flare-On challenges to rest on tonight's late-night Halloween stream! Check out time travel debugging with us!
0
3
16
Peace isnāt found ā itās formed. Ben Sira 1 shows how. This could help the worldā¦and each of us. Read and share. š
0
5
45
The CFP for RE//verse 2026 is open, but not for long! Submissions close November 14th. Share your best RE and security research with us here: https://t.co/5l5IZLKzdZ
0
9
12