
Vector 35
@vector35
Followers
10K
Following
1K
Media
388
Statuses
2K
Makers of the Binary Ninja - Reverse Engineering Platform. https://t.co/opkys50srq Also posting at https://t.co/2HEfgOtSSR
Melbourne, FL
Joined January 2015
RT @InvokeReversing: We've uploaded our Time Travel Debugging in Binary Ninja stream with Xusheng Li from @vector35 where we unpacked malwa….
0
32
0
RT @PeterLaFosse: I’m at @reconmtl if you’ve written a plugin or are otherwise a Binary Ninja super fan find me or @psifertex for some shwa….
0
5
0
RT @nicolodev: We just presented our new Binary Ninja plugin for deobfuscation of Mixed Boolean Arithmetic expressions at REcon25. Check it….
0
11
0
RT @exploitsclub: New EC out NOW 👇. 🎉 @vector35 Binary Ninja GIVEAWAY! 🎉. Popping smart speakers from @ret2systems . @Synacktiv hacks an ol….
0
8
0
Xusheng put together a super practical intro that gets you using Binary Ninja alongside a debugger right away! You won't want to miss this 3 week mini-class kicking off next week.
📢Call for beta testers!📢."Debuggers 1103: Introductory Binary Ninja" by Xusheng Li of @Vector35 (makers of Binary Ninja) will start June 9th, and run for 3 weeks. It is a mini-class and is expected to take 4 or less hours to complete. It will integrate with the assembly classes.
2
11
66
RT @mr_phrazer: New #BinaryNinja plugin: Obfuscation Analysis. Simplifies arithmetic obfuscation (MBA) directly in the decompiler (see demo….
0
45
0
RT @CX330Blake: After a month of testing, I finally release the brand new theme for @vector35 Binary Ninja! . The popular theme in neovim,….
0
5
0
RT @MalwareUtkonos: DanaBot loader (exe+shellcode).This is the single function in the exe component. sha256:.d048071c444d065306979255112bf….
0
7
0
Our colleagues at @aarnolabsllc have published a follow-up addressing vulnerabilities in production stripped binaries, even if the vendor doesn't fix it themselves. This is related to our collaboration through the @ARPAHealth DIGIHEALS program.
1
0
4