REhints

4.1K posts

REhints

REhints

@REhints

sharing reverse engineering knowledge

Katılım Mayıs 2013
5 Takip Edilen14.1K Takipçiler
REhints retweetledi
Hermes Tool
Hermes Tool@Hermes_tooll·
CVE-2025-24257 — IOGPUFamily kernel heap OOB write on iOS 18.3 .. First public PoC — built entirely github.com/crazymind90/CV…
English
1
8
66
3.9K
REhints retweetledi
RE//verse
RE//verse@REverseConf·
Catch Christopher Domas’ keynote from RE//verse 2026! fail: jmp fail (everything I got wrong in RE and security research) gets into the dead ends, bad ideas, and wasted hours behind real progress in RE and security work. Watch now: youtu.be/iOq8O_phwbA?si…
YouTube video
YouTube
RE//verse tweet media
English
1
10
25
1.3K
REhints retweetledi
ESET Research
ESET Research@ESETresearch·
#ESETresearch analyzed more than 80 EDR killers, seen across real-world intrusions, and used ESET telemetry to document how these tools operate, who uses them, and how they evolve beyond simple driver abuse. welivesecurity.com/en/eset-resear… 1/6
English
3
58
193
12.5K
REhints retweetledi
RE//verse
RE//verse@REverseConf·
The Xbox One was hacked for the first time in over a decade at RE//verse! Watch the full talk here: youtu.be/FTFn4UZsA5U?si…
YouTube video
YouTube
RE//verse tweet media
English
3
16
89
7.1K
REhints retweetledi
Alex Matrosov
Alex Matrosov@matrosov·
Get insights into your software supply chain, now free and open source. SBOMs are a powerful type of report. If you generate them, make sure you’re collecting and monitoring them at scale.
SBOM-Tools@sbom_tools

🪄✨Announcing sbom-tools v0.1.16 — open-source SBOM analysis that helps you spot supply chain gaps faster. This release adds broader CycloneDX/SPDX + VEX support, OSV/CISA KEV enrichment, semantic diffing, quality scoring, and compliance checks. Try it: github.com/sbom-tool/sbom…

English
0
4
16
3.2K
REhints retweetledi
johnny
johnny@zeroxjf·
Reverse engineered Apple’s Background Security Improvement (BSI) update for iOS 26.3.1. Found potential WebKit SOP bypass it patches — NavigateEvent.canIntercept=true on cross-port navigations that should be non-interceptable. Impact: redirect hijack github.com/zeroxjf/WebKit…
English
4
16
109
8.4K
REhints retweetledi
Alex Plaskett
Alex Plaskett@alexjplaskett·
An analysis of CVE-2026-21236 - A heap based buffer overflow in the Microsoft Windows Kernel afd.sys - was just published by @ASN_Sinanju_06S a recent secondment with my team EDG! Nice work for her first triage of a kernel memory corruption bug! nccgroup.com/research/vulne…
English
3
63
229
15.7K
REhints retweetledi
OtterSec
OtterSec@osec_io·
We achieved a guest-to-host escape by exploiting a QEMU 0-day where the bytes written out of bounds were uncontrolled. Full breakdown of the technique, glibc allocator behavior, and our heap spray/RIP-control primitive ↓
OtterSec tweet media
English
6
108
520
39.8K
REhints retweetledi
SBOM-Tools
SBOM-Tools@sbom_tools·
🪄✨Announcing sbom-tools v0.1.16 — open-source SBOM analysis that helps you spot supply chain gaps faster. This release adds broader CycloneDX/SPDX + VEX support, OSV/CISA KEV enrichment, semantic diffing, quality scoring, and compliance checks. Try it: github.com/sbom-tool/sbom…
English
3
39
165
20.4K
REhints retweetledi
Alex Matrosov
Alex Matrosov@matrosov·
Nice blog! This hits a real pain point with current SAST tooling. Most of it just runs a bunch of generic checks without understanding the actual threat model or where the real security boundaries are. That lack of semantic context is exactly the issue, I’ve been arguing for a while that detection logic needs to be context-aware, and trying to bolt that on manually with rules just doesn’t scale. This is a very natural place for LLMs to add value. With AI accelerating code production, we also need to move beyond the simple rubric of “bug exists -> reachable -> fix it.” That model breaks down at scale (reachable != exploitable). What’s missing is deeper context around exploitability, and how real is the risk, what’s the blast radius, and what actually matters to fix first. That’s the layer that will drive meaningful prioritization. Also, using LLMs purely for triaging SAST findings after the fact gets expensive very quickly at scale. It’s the easiest path, so a lot of tools go there now, but without deeper integration into the analysis pipeline, it’s a pretty inefficient approach.
Alex Matrosov tweet media
English
1
6
14
2.4K
REhints retweetledi
Ori Nimron
Ori Nimron@orinimron123·
Just released DriverExplorer — a Rust utility for exploring Windows kernel drivers. • Enumerate loaded drivers • Easily Load / Unload drivers • Built for Windows kernel devs & security researchers: github.com/orinimron123/D…
Ori Nimron tweet media
English
5
65
318
16.8K
REhints retweetledi
matteyeux
matteyeux@matteyeux·
Looks like iOS remote kernel debugging is working well with Binary Ninja and a virtual iPhone running iOS 26.3
matteyeux tweet media
English
9
76
652
39.3K
REhints retweetledi
b33f | 🇺🇦✊
b33f | 🇺🇦✊@FuzzySec·
I am releasing a reconstructed version of the cassowary CVE (CVE-2024-23222) that was disclosed as part of the Coruna leak. I also did some research with my AI assistants 😄 to reproduce a crash for the bug on x86_64 Linux github.com/FuzzySecurity/…
English
2
16
81
9.2K
REhints retweetledi
SBOM-Tools
SBOM-Tools@sbom_tools·
Working on a new release with a number of improvements. Refining the TUI workflows to allow seamless context switching between components, vulnerabilities, and dependencies tabs, improving visibility into how the data connects.
SBOM-Tools tweet media
English
0
1
4
901
REhints retweetledi
Alex Plaskett
Alex Plaskett@alexjplaskett·
ZeroDayBench: Evaluating LLM Agents on Unseen Zero-Day Vulnerabilities for Cyberdefense arxiv.org/pdf/2603.02297
Alex Plaskett tweet mediaAlex Plaskett tweet mediaAlex Plaskett tweet media
English
3
40
189
18.7K