Ilfak Guilfanov

@ilfak

The author of IDA Pro and Hex-Rays Decompiler

Liege, Belgium
Joined August 2009

Tweets

You blocked @ilfak

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @ilfak

  1. Jan 17

    A good start and a lot of room for improvement :)

    Undo
  2. Jan 16

    Apparently, my BlackHat talk from 2018 got published on youtube. Our microcode became even better since then :)

    Undo
  3. Jan 10

    The recent versions of IDA Pro support syncing out of the box but if you are stuck with older versions, this plugin is worth checking out. Besides, it has a couple of useful twists:

    Undo
  4. Retweeted
    Jan 4

    i -really- love this one. it made a rotate by 10 by doing two rotates by 2 on -individual bytes- and then doing some sort of XOR swapping of the 2 remaining bits. this is a brilliant solution i wouldn't even consider on my own!

    Show this thread
    Undo
  5. Retweeted
    31 Dec 2019

    i love how people are shocked that doesn’t like security researchers (see drama), meanwhile i’ve been banned from doing research for them for 8 years.

    Undo
  6. 31 Dec 2019

    Thanks, Chris, for implementing this!

    Undo
  7. Retweeted
    27 Dec 2019

    Practical reverse engineering is an awesome book with insightful windows kernel exercises - I decided to complete all of the exercises and post complete write-ups to my solutions 😛🥳 Here's the first one: Reversing AuxKlibQueryModuleInformation

    Show this thread
    Undo
  8. Retweeted

    This mind-bending timelapse with the Milky Way stabilized shows the Earth is spinning through space. Credit:

    Undo
  9. Retweeted

    Forget about vector<bool>. Today I discovered unordered_set<bool> in our codebase.

    Undo
  10. Retweeted
    23 Dec 2019

    Check out the new 2020 syllabus for SEC760 "Advanced Exploit Development for Penetration Testers"...! The course now comes bundled with IDA Pro! ...and co-authorship and contributions from and

    Undo
  11. Retweeted

    have you ever wished to have interactive buttons in your IDA Pro comments?

    Undo
  12. 19 Dec 2019
    Undo
  13. Retweeted
    18 Dec 2019

    A recent result: deobfuscation via relational abstract interpretation

    Undo
  14. Retweeted

    Nice to see was used to reverse Samsung trustlets, as well as for coverage-guided fuzzing, in this great work!

    Undo
  15. Retweeted
    16 Dec 2019

    If you missed it and you look for a reading, please take a look here. Is Lazarus/APT38

    Undo
  16. Retweeted
    17 Dec 2019

    Timeless Analysis of an out-of-bounds read in a TTF font file using REVEN -2019-1244

    Undo
  17. Retweeted
    15 Dec 2019
    Show this thread
    Undo
  18. Retweeted
    9 Dec 2019

    how to disable arm macro instruction? Options>General…>Analysis>Kernel option3>Enable macro, uncheck it.

    Undo
  19. Retweeted
    3 Dec 2019

    Reverse engineering is made easy with Intezer's IDA Pro plugin. Watch this short demo to learn more:

    Undo
  20. Retweeted

    Apple's new iPhone 11 Pro seeks the user's location info even when all apps and system services on the phone are individually set to never request it. Apple says this is by design, but that response seems at odds w/ the company's own privacy policy.

    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·