Buzzer

75 posts

Buzzer banner
Buzzer

Buzzer

@buzz3r_

Reverse engineer & programmer

Katılım Mayıs 2021
273 Takip Edilen334 Takipçiler
Buzzer
Buzzer@buzz3r_·
Sneak peek of some news features of the next Rikugan plugin release (Binja/IDA): Research Mode (/research). This mode reverse engineers the binary and produces a full notes folder, compatible with both Obsidian and Logseq. Perfect for documentation and analysis mind maps.
Buzzer tweet mediaBuzzer tweet mediaBuzzer tweet media
English
1
1
27
2.6K
Buzzer
Buzzer@buzz3r_·
Release notes: github.com/buzzer-re/Riku… I've also updated AGENTS.md and added DEVELOPMENT.md with best practices and development guidelines.
English
0
0
0
90
Buzzer
Buzzer@buzz3r_·
Rikugan v1.1 is out! I've worked on feedbacks and added new features: - MCP/Skills import from Claude Code/Codex - Profiles - control what gets sent to the LLM - Hardened security - anti-LLM evasion, profile-aware filtering Website/Docs: rikugan.reversing.codes
Buzzer tweet mediaBuzzer tweet media
English
1
0
5
318
Buzzer retweetledi
moly
moly@morimolymoly2·
I analyzed malware with Rikugan. The sample is called ChChes which was used by APT10. I did find C2 communication functions and clean up the config decryption part. LLM steals fun part of malware analysis from me! but it is so effective. damn. WTF is going on brooo.
moly tweet mediamoly tweet media
English
3
20
184
11.3K
Buzzer
Buzzer@buzz3r_·
@in19h @bouguereau_stan I’ll implement that on the next release, rikugan need a way to call external agents, I imagine various uses cases such as web research, local source code summarization/compare, code rewriting and the list goes up. This will be configurable, of course
English
0
0
1
46
Buzzer
Buzzer@buzz3r_·
I decided to try out agentic coding/reversing, so I’m releasing a project that assists with reverse engineering in both Binja and IDA Pro. It’s an agent, not an MCP, that support multiple providers, it has some interesting features such as code exploration github.com/buzzer-re/Riku…
English
3
40
202
16.2K
Buzzer retweetledi
Andy Nguyen
Andy Nguyen@theflow0·
I ported Linux to the PS5 and turned it into a Steam Machine. Running GTA 5 Enhanced with Ray Tracing. 🤯
English
492
1.7K
18.5K
2.2M
Buzzer
Buzzer@buzz3r_·
@Butuoyv1Eyer @in19h Grok is OpenAI compatible so it should work, add its connection on the settings, just click the “+” button and configure the ApiBase + key
English
0
0
0
39
Buzzer
Buzzer@buzz3r_·
@in19h Oh, that would be good, I’ll check that out
English
1
0
0
532
Kenan Sulayman
Kenan Sulayman@in19h·
@buzz3r_ Amazing project, you should tell Claude to implement direct use of an agent harness via ACP as a subprocess, which instantly opens the project up to the entire claude / codex / opencode ecosystem without implementing explicit LLM provider interaction.
English
2
0
1
659
Buzzer
Buzzer@buzz3r_·
Modify mode is also pretty cool, you ask for patching and modding and the agent will treat your binary as code and plan the necessary modifications to achieve your goal “Modify the size of this screen” or “make me always win this game”
English
0
0
1
1.2K
Buzzer
Buzzer@buzz3r_·
Interesting feature is the code exploration mode, directly inspired on how agents tackle large projects: plan, explore and summarize to build context To assist this, it uses subagents with a single task to perform
English
1
0
2
1.3K
Buzzer retweetledi
João Vitor(Keowu)
João Vitor(Keowu)@keowu·
My new article, “Ryūjin – Writing a Bin2Bin Obfuscator from Scratch for Windows PE x64 and Fully Deobfuscating It,” covers in detail the creation of a own Bin2Bin obfuscator tool, named “Ryūjin". Check it out: keowu.re/posts/Ry%C5%AB…
English
2
47
142
10.5K
Buzzer
Buzzer@buzz3r_·
I've started to document a few of my projects, starting on that research on how an ELF injector would work on the PS5. It has interesting information about some FreeBSD's kernel data structures as well a glance of modern console security technologies reversing.codes/posts/PlayStat…
English
0
0
5
217
Buzzer retweetledi
Boris Larin
Boris Larin@oct0xor·
We're revealing details of an obscure debugging feature in the Apple A12-A16 SoC’s that bypasses all of the hard-to-hack hardware-based memory protections on new iPhones. Its not used by the firmware and we don't know how the attackers found out about it. securelist.com/operation-tria…
English
25
245
925
314.4K
Buzzer retweetledi
Daax
Daax@daaximus·
I got time to update a draft that should've been published long ago. Here is a fun PG-compliant hooking mechanism, and the example covered in the article is system-wide SYSCALL hooks in a PG-compliant manner. revers.engineering/fun-with-pg-co…
English
3
82
239
42.6K
Buzzer retweetledi
tmp.0ut
tmp.0ut@tmpout·
Check it out, it's tmp.0ut Volume 3! tmpout.sh/3/
tmp.0ut tweet media
English
20
406
1K
176.2K