Vector 35
@vector35
Followers
10K
Following
2K
Media
425
Statuses
2K
Makers of the Binary Ninja - Reverse Engineering Platform. https://t.co/opkys50srq Also posting at https://t.co/2HEfgOtSSR
Melbourne, FL
Joined January 2015
Binary Ninja 5.2, Io, is live and it's out of this world! https://t.co/w4wAoqUwUf With some of our most requested features of all time including bitfield support, containers, hexagon, Ghidra import, and a huge upgrade to TTD capabilities, plus a ton more, make sure to check out
3
31
106
Interested in spending the summer at Vector 35 working on Binary Ninja? Our 2026 internship applications are currently open through January 15! Positions are in-person in Melbourne FL. Apply by emailing hiring@vector35.com. https://t.co/DlanQTT7Qn
0
1
3
First two unauthenticated RCE CVEs published - Discovered with the help of our #Binja plugin #Mole! 🔗 Advisory: https://t.co/tgb42PVnyx 🔗 Mole: https://t.co/J3NwT2iWkK More vulnerabilities have been reported - stay tuned for upcoming advisories.
github.com
A Binary Ninja plugin to identify interesting paths using static backward slicing - cyber-defence-campus/mole
0
2
5
We are teaming up with @eShard on December 5th at 10am EST for a live demo that walks through the full PetyA workflow! We'll look at how the malware drops and maps its DLL into memory, how TTD recording captures the full execution, and how the Binary Ninja debugger ties into
0
16
54
In 2000, the S&P 500 had an elevated trailing P/E of 26, well above its long-term avg. of 14. For the next 11 years, the S&P 500 delivered zero returns! The current S&P 500 trailing P/E is 30 – even higher than 2000. History rhymes. For standardized performance visit our website.
0
21
130
Full length reverse engineering with Invoke RE! Showcasing new iterations of the "Scavenger" malware, or what we saw as "ExoTickler" previously as a fake City Skylines 2 video game mod, now w/ more crypto/creds stealing and C2. Binary Ninja, x64dbg & more: https://t.co/AvW8A6lROO
5
32
203
Looks like more MacSync: 4d751dd363298589cb436d78cd302f9d794ae1e3670722a464884be908671a9c - Zoom lookalike. thanks @malwrhunterteam :) Written in Objective-C, which is beautiful and a great start to a Monday. Look a how pretty that binja Pseudo-ObjC is.♥️ Brackets! 🧵
1
9
33
I heard you like using static typing, and so do I. Use static typing to manipulate binaryninja and write native plugin !
github.com
BinaryNinja dotnet C# Bindings (Typed, Safe, Native AOT Ready) - tinysec/binaryninja
0
14
77
You can now pull Ghidra databases straight into your workflow in Binary Ninja 5.2! Open a .gbf on its own, import Ghidra data into an existing session, or bring parts of a full project into a Binary Ninja project on Commercial and above. Mixed tool workflows get a lot easier and
2
7
50
Binary Ninja 5.2 adds support for custom string formats and constant encodings. Instead of wrestling with odd or obfuscated values, you can teach Binja how they work and let the analysis reveal the real content anywhere it appears. This update lays the groundwork for more
0
7
60
Container support is finally here in Binary Ninja 5.2! You can browse nested formats like ZIP, IMG4, or CaRT right in memory with no manual extraction. When a container resolves to a single target, Binja can open it straight away. If there are multiple payloads, the new Container
1
3
28
Binary Ninja 5.2 brings initial bitfield support. You can now represent structure members with specific bit positions and widths, and Linear View will show them cleanly. Our debug info plugins like DWARF, PDB, and the built in SVD import all express bitfields now too. More
0
9
68
Free Candy anyone? Well, not quite free candy, but it might seem like it if you’re a user of the Free edition of Binary Ninja! In 5.2, we’re adding many new features from the paid versions to Free: Objective-C workflow, WARP plugin, DWARF Import and TTD support!
1
5
19
Join us in just a few minutes for a discussion about obfuscation, deobfuscation, and security with RE//verse 2026 trainier Tim Blazytko!
0
3
9
Join us for another interview this Friday at 4pm ET with Tim Blazytko! As the instructor of Software Deobfuscation Techniques at RE//verse 2026, we'll be picking his brain about the role obfuscation and deobfuscation play a role in today's cybersecurity scene. What would you like
2
8
25
Back-to-back-to-back streams! Join us again today at 4pm ET to meet Marion Marschalek, and get a taste of what Advanced Linux Malware Reverse Engineering at RE//verse 2026 will be like! Ask your questions during the stream or reply with them here! https://t.co/klHRciFJJg
4
5
27
How VT Code Insight + Binary Ninja use AI to scan Apple binaries at scale, catch undetected Mac/iOS malware, and reduce false positives. No metadata, just code. https://t.co/Rxi3mNvylu
0
22
82
Join us NOW (10pm ET) in finally putting some Flare-On challenges to rest on tonight's late-night Halloween stream! Check out time travel debugging with us!
0
3
16
The agent loop, exposed as a primitive. Script it. Pipe it. Build on it. Spawn parallel instances across your monorepo. → npm install -g cline
3
6
75
The CFP for RE//verse 2026 is open, but not for long! Submissions close November 14th. Share your best RE and security research with us here: https://t.co/5l5IZLKzdZ
0
9
12