REhints

4.1K posts

REhints

REhints

@REhints

sharing reverse engineering knowledge

انضم Mayıs 2013
5 يتبع14.1K المتابعون
REhints أُعيد تغريده
clearbluejar
clearbluejar@clearbluejar·
Video is up from my RE//verse talk on Agentic Diffing Apple Security Updates. If you're curious about how AI can accelerate your reverse engineering workflows, check it out. Especially useful if you're looking to get started with agentic RE.
clearbluejar tweet media
English
1
0
13
443
REhints أُعيد تغريده
Muirey03
Muirey03@Muirey03·
My analysis of CVE-2025-43520, the kernel vulnerability exploited by DarkSword (patched in 26.1): gist.github.com/Muirey03/8c837…
English
2
31
183
12.5K
REhints أُعيد تغريده
Synacktiv
Synacktiv@Synacktiv·
Deep dive into the provisionning an on-prem low-privileged #LLM stack, with air-gapped networking and GPU-isolation, hardened down to kernel modules. What could possibly go wrong? Read the full article here: synacktiv.com/en/publication…
English
0
9
22
1.2K
REhints أُعيد تغريده
Hermes Tool
Hermes Tool@Hermes_tooll·
CVE-2025-24257 — IOGPUFamily kernel heap OOB write on iOS 18.3 .. First public PoC — built entirely github.com/crazymind90/CV…
English
1
10
84
6.4K
REhints أُعيد تغريده
RE//verse
RE//verse@REverseConf·
Catch Christopher Domas’ keynote from RE//verse 2026! fail: jmp fail (everything I got wrong in RE and security research) gets into the dead ends, bad ideas, and wasted hours behind real progress in RE and security work. Watch now: youtu.be/iOq8O_phwbA?si…
YouTube video
YouTube
RE//verse tweet media
English
1
11
28
1.8K
REhints أُعيد تغريده
ESET Research
ESET Research@ESETresearch·
#ESETresearch analyzed more than 80 EDR killers, seen across real-world intrusions, and used ESET telemetry to document how these tools operate, who uses them, and how they evolve beyond simple driver abuse. welivesecurity.com/en/eset-resear… 1/6
English
4
64
206
15.1K
REhints أُعيد تغريده
RE//verse
RE//verse@REverseConf·
The Xbox One was hacked for the first time in over a decade at RE//verse! Watch the full talk here: youtu.be/FTFn4UZsA5U?si…
YouTube video
YouTube
RE//verse tweet media
English
3
17
99
8.2K
REhints أُعيد تغريده
Alex Matrosov
Alex Matrosov@matrosov·
Get insights into your software supply chain, now free and open source. SBOMs are a powerful type of report. If you generate them, make sure you’re collecting and monitoring them at scale.
SBOM-Tools@sbom_tools

🪄✨Announcing sbom-tools v0.1.16 — open-source SBOM analysis that helps you spot supply chain gaps faster. This release adds broader CycloneDX/SPDX + VEX support, OSV/CISA KEV enrichment, semantic diffing, quality scoring, and compliance checks. Try it: github.com/sbom-tool/sbom…

English
0
4
16
3.4K
REhints أُعيد تغريده
johnny
johnny@zeroxjf·
Reverse engineered Apple’s Background Security Improvement (BSI) update for iOS 26.3.1. Found potential WebKit SOP bypass it patches — NavigateEvent.canIntercept=true on cross-port navigations that should be non-interceptable. Impact: redirect hijack github.com/zeroxjf/WebKit…
English
4
16
109
8.5K
REhints أُعيد تغريده
Alex Plaskett
Alex Plaskett@alexjplaskett·
An analysis of CVE-2026-21236 - A heap based buffer overflow in the Microsoft Windows Kernel afd.sys - was just published by @ASN_Sinanju_06S a recent secondment with my team EDG! Nice work for her first triage of a kernel memory corruption bug! nccgroup.com/research/vulne…
English
3
63
229
15.8K
REhints أُعيد تغريده
OtterSec
OtterSec@osec_io·
We achieved a guest-to-host escape by exploiting a QEMU 0-day where the bytes written out of bounds were uncontrolled. Full breakdown of the technique, glibc allocator behavior, and our heap spray/RIP-control primitive ↓
OtterSec tweet media
English
7
109
523
40.2K
REhints أُعيد تغريده
SBOM-Tools
SBOM-Tools@sbom_tools·
🪄✨Announcing sbom-tools v0.1.16 — open-source SBOM analysis that helps you spot supply chain gaps faster. This release adds broader CycloneDX/SPDX + VEX support, OSV/CISA KEV enrichment, semantic diffing, quality scoring, and compliance checks. Try it: github.com/sbom-tool/sbom…
English
3
39
165
20.8K
REhints أُعيد تغريده
Alex Matrosov
Alex Matrosov@matrosov·
Nice blog! This hits a real pain point with current SAST tooling. Most of it just runs a bunch of generic checks without understanding the actual threat model or where the real security boundaries are. That lack of semantic context is exactly the issue, I’ve been arguing for a while that detection logic needs to be context-aware, and trying to bolt that on manually with rules just doesn’t scale. This is a very natural place for LLMs to add value. With AI accelerating code production, we also need to move beyond the simple rubric of “bug exists -> reachable -> fix it.” That model breaks down at scale (reachable != exploitable). What’s missing is deeper context around exploitability, and how real is the risk, what’s the blast radius, and what actually matters to fix first. That’s the layer that will drive meaningful prioritization. Also, using LLMs purely for triaging SAST findings after the fact gets expensive very quickly at scale. It’s the easiest path, so a lot of tools go there now, but without deeper integration into the analysis pipeline, it’s a pretty inefficient approach.
Alex Matrosov tweet media
English
1
6
14
2.4K
REhints أُعيد تغريده
joernchen
joernchen@joernchen·
RIP FX We collected some texts from the community in memory of @41414141 . You can find them here phenoelit.de/fx.html
English
1
22
61
10.9K
REhints أُعيد تغريده
Ori Nimron
Ori Nimron@orinimron123·
Just released DriverExplorer — a Rust utility for exploring Windows kernel drivers. • Enumerate loaded drivers • Easily Load / Unload drivers • Built for Windows kernel devs & security researchers: github.com/orinimron123/D…
Ori Nimron tweet media
English
5
65
319
16.8K
REhints أُعيد تغريده
matteyeux
matteyeux@matteyeux·
Looks like iOS remote kernel debugging is working well with Binary Ninja and a virtual iPhone running iOS 26.3
matteyeux tweet media
English
9
76
653
39.3K