Invoke RE

349 posts

Invoke RE banner
Invoke RE

Invoke RE

@InvokeReversing

Empowering you to take on today's toughest threats.

Katılım Ocak 2022
104 Takip Edilen2.7K Takipçiler
Invoke RE
Invoke RE@InvokeReversing·
We are super excited to announce our founder Joshua Reynolds @JershMagersh will be providing a 3 hour workshop on recovering C++ symbols and type information with Binary Ninja at REcon 2026!
Invoke RE tweet media
English
1
7
14
1.1K
Invoke RE retweetledi
Invoke RE retweetledi
Hussein Muhaisen
Hussein Muhaisen@husseinmuhaisen·
I just published a NEW blog post -> reverse engineering the multi stage file format steganography chain from TeamPCP's telnyx SDK (4.87.1 and 4.87.2) husseinmuhaisen.com/blog/reverse-e…
English
0
11
33
3.4K
Invoke RE retweetledi
Tim Blazytko
Tim Blazytko@mr_phrazer·
This Thursday I'm joining @Vector35's live to put LLM-powered reverse-engineering workflows head-to-head. We compare Binja's client-side LLM integrations vs. fully headless agents Expect practical workflow comparisons, lots of fun, and a bit of chaos. youtube.com/live/TBqBpaqec…
YouTube video
YouTube
Vector 35@vector35

Join @mr_phrazer with us on Thursday @4pm ET to pit machine versus machine! We'll be comparing LLM options for both assisted and fully-automatic reverse engineering, including different CLI interfaces, MCP servers, plugins, and agents. Don't miss who comes out on top of reversing's biggest battle yet: youtube.com/live/TBqBpaqec…

English
1
16
57
15K
Invoke RE
Invoke RE@InvokeReversing·
Huge congrats to @t33j_sec for completing the Binary Ninja Edition of the Introduction to Malware Binary Triage course 🥳🎊
Invoke RE tweet media
English
1
3
4
394
Invoke RE
Invoke RE@InvokeReversing·
We've uploaded our live stream from RE//verse 2026 where we sat down with @emesarecom from @vector35 to discuss WARP signatures used for symbol and type information recovery. Mason is a wealth of knowledge and it was a pleasure speaking with him at this amazing event!
Invoke RE tweet media
English
1
8
29
2.3K
Invoke RE
Invoke RE@InvokeReversing·
Another great year at .@REverseConf! We are super happy to have collaborated with @emesarecom on a live stream and see everyone in person again. With hacking the Xbox One, deobfuscators used in anti-cheat engines and reverse engineering munitions, this year was packed with amazing talks from the best in the industry. We look forward to next year!
Invoke RE tweet media
English
0
2
14
656
Invoke RE retweetledi
Darius Houle (darbonzo)
Darius Houle (darbonzo)@dariushoule·
I added a shellcode analyzer to my x64dbg skills repo! It was awesome watching it unpack a multi-stage payload, annotate everything in the debugger, and produce a solid report. chuck a bin at it - the skill knows how to load raw shellcode 🦾 github.com/dariushoule/x6…
English
1
38
167
7.7K
Invoke RE
Invoke RE@InvokeReversing·
Join us at 10AM EST today for a special live stream from RE//verse 2026 with Binary Ninja's WARP developer Mason Reed twitch.tv/invokereversing
English
1
2
6
527
Invoke RE retweetledi
REcon
REcon@reconmtl·
10 days left to submit in time for Phase 1 of the Recon CFP (March 14th), CFP closes April 11th. REcon is a top reverse engineering cybersecurity conference covering software and hardware reversing, exploit dev, malware analysis, software deobfuscation & more. recon.cx/2026/en/cfp.ht… #REcon2026 #ReverseEngineering #InfoSec
REcon tweet media
English
0
15
44
5K
Invoke RE retweetledi
Tim Blazytko
Tim Blazytko@mr_phrazer·
Recently my RE workflow moved into sandboxed VMs where agents have full control over the environment. I needed an MCP server that runs headless in the same sandbox and exposes way more of the #BinaryNinja API than others. Here's the release: github.com/mrphrazer/bina…
English
3
50
273
36.9K
Invoke RE
Invoke RE@InvokeReversing·
Our founder Joshua Reynolds will be attending RE//verse 2026! Come say hi during the conference to get some Invoke RE swag and talk to him about malware analysis and reverse engineering!
Invoke RE tweet media
English
0
2
8
779
Invoke RE retweetledi
Josh Reynolds (jmag)
Josh Reynolds (jmag)@JershMagersh·
There's a lot of talk currently about reverse engineering with LLMs, I encourage folks to check out my keynote from September where I spoke about their applicability/limitations with malware analysis youtu.be/tLR_hHQVkOk LLMs have improved but the core principles still apply.
YouTube video
YouTube
English
1
7
23
2.9K
Invoke RE retweetledi
Malcat dev
Malcat dev@malcat4ever·
Quick peek at the upcoming 0.9.3 release. It will also feature a 100% headless MCP server for full and pro users.
Malcat dev tweet media
English
0
11
40
3.7K