Rezultati pretraživanja
  1. 3. pro 2019.

    Today we released Hashashin, a tool which combines basic block & graph aware hashing to allow porting annotations from one binary to another. Part 2 of our blog series shares the design decisions, where to get it on , & how to use it:

  2. 25. ožu 2019.

    New vis tool based on looks better and better ;) It supports all 129 formats available at

  3. 16. ožu 2019.

    Sneak peek preview at new visualization tool utilizing declarative power to explore inner structures of intricate binary formats. Hurray to more vis tools and integrations!

  4. 16. kol 2019.
    Prikaži ovu nit
  5. 30. kol 2019.

    "RT RT josh_watson: The iOS implant that was found by Google P0 () was written in Objective-C. They used IDA Pro, but if they'd used my ObjCGraphView plugin, it probably would have been a lot easier! "

  6. 14. sij

    INFILTRATE Training Update! Happy to announce from will be joining as a co-trainer. Come learn how to use program analysis for vulnerability research.

  7. 11. ožu 2019.

    Just pushed a plugin to load and disassemble GameBoy ROMs, initially it was only for solving a challenge but it was finally quite rewarding in itself :-)

  8. 1. velj

    Thank you for the Yeti! Extracting the binary from the web-app and loading into made for a good unintended preliminary challenge!

  9. 16. sij

    Want to create plugins? Discover how to write a plugin to add a new architecture for & . Then master program analysis with at ! Get your Early Bird ticket ⭐

  10. 13. sij

    Have been using for ~1 week now after buying a license. Much better than IDA in terms of UX and a wonderful tool generally -- very happy with it overall. If I had one request, it would be to be able to seek to variable definitions with a hotkey well done!

  11. 9. sij

    What's your RE tool of choice: , , ? 🐉 Discover why Three Heads are Better Than One - Then master reversing with Ghidra at with & . Don't forget your Early Bird ticket ➡️

  12. 23. pro 2019.

    Learn inside and out with as she teaches "Program Analysis for Vulnerability Research" at . Become a ninja at and vulnerability discovery in 4 days ⭐ Get up to 25% OFF before Dec 31:

  13. 3. pro 2019.

    Time for more F'ing Around with – continuing my research into binary diffing! Come hang out:

  14. 31. lis 2019.

    I'm back from my vacation, and ready to start writing more program analysis tooling! Let's see if I can remember what I was even doing on today's F'ing Around with !

  15. 24. lis 2019.

    Elevate your skills, and learn from a recognized expert in automation with . Grab a seat before Early Bird pricing ends:

  16. 15. lis 2019.

    Doing an earlier, shorter stream today! Come hang out while I continue to write tooling in !

  17. 10. lis 2019.

    Let's do some tool dev! It's time for more F'ing Around with ! Come hang out:

  18. 11. ruj 2019.

    is really dope! 👍

  19. 14. srp 2019.
  20. 18. lip 2019.

    "Isn't an SSA Variable as good as it's memory location?" In response to 's exclusion of a pass by reference (MLIL_ADDRESS_OF) from the SSA uses list.

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.