Takahiro Haruyama

4.6K posts

Takahiro Haruyama banner
Takahiro Haruyama

Takahiro Haruyama

@cci_forensics

唇亡歯寒

Katılım Mart 2010
155 Takip Edilen2.9K Takipçiler
Takahiro Haruyama retweetledi
lukas seidel
lukas seidel@pr0me·
we will present our work on practical binary type recovery at ACM CODASPY '26! prior work rarely focused on applicability: too slow, no meaningful filtering mechanisms, unsound struct recovery we address these gaps and present a system for headless type recovery at scale
lukas seidel tweet media
English
2
23
78
22.8K
Takahiro Haruyama retweetledi
Alex Matrosov
Alex Matrosov@matrosov·
The dream of a fast and reliable binary analysis framework is now a reality. Today, we’re open sourcing VulHunt.RE 🎉 code: github.com/vulhunt-re/vul… docs: vulhunt.re/docs A huge kudos to the entire REsearch team!
Alex Matrosov@matrosov

This year at @REverseConf, we’re dropping something special, a project we’ve been heads-down on for a while that boosts semantic-level binary detection with reachability + taint analysis. Like CodeQL/Semgrep, but for binaries. VulHunt use cases: Vuln REsearch: binarly.io/blog/vulnerabi… Detection Eng: binarly.io/blog/vulhunt-i… VH Intro: binarly.io/blog/vulhunt-i…

English
4
94
383
34.8K
Takahiro Haruyama retweetledi
Sam Thomas
Sam Thomas@xorpse·
VulHunt is the culmination of 4 years of R&D with a goal to scale vulnerability detection in binaries. While the foundation is built on tried and true static analysis techniques, we’ve embraced the AI era and expose VulHunt’s capabilities to agents and tools via MCP and skills.
GIF
English
1
5
28
1.6K
Takahiro Haruyama retweetledi
BINARLY🔬
BINARLY🔬@binarly_io·
@francesco_ev is presenting VulHunt at @REverseConf today! Alongside the talk, we're also releasing the framework and tooling as open-source. vulhunt.re
English
1
11
22
1.3K
lukas seidel
lukas seidel@pr0me·
due to a bad case of influenza, I am in no condition to travel and won't be able to make it to @REverseConf 💔 was really looking forward to meeting old and new friends. hope y'all have a great conf!
English
1
0
6
365
Takahiro Haruyama retweetledi
BINARLY🔬
BINARLY🔬@binarly_io·
In the last blog of our VulHunt series, we explore what happens when VulHunt meets LLMs. We show how LLM-guided workflows can automate vulnerability triaging and hunting, reducing the manual effort required for binary analysis. binarly.io/blog/agentic-v…
English
1
15
23
2.3K
Takahiro Haruyama retweetledi
ぴんく
ぴんく@PINKSAWTOOTH·
NSAのGhidraの公開から7年・・・Ghidra✖️AI、メカギドラを公開します! - pyghidraによるヘッドレス実行でプラグインインストール不要 - プロジェクトへのロード、解析対象の切り替え、並列化に対応 - Ghidra Serverにも対応、24/7稼動する最強のチームメイトと協力して解析! github.com/ghidra-user-jp…
日本語
3
71
278
15.8K
Takahiro Haruyama retweetledi
BINARLY🔬
BINARLY🔬@binarly_io·
In today's instalment of our VulHunt series, we walk through VulHunt’s capabilities in detail. We show what VulHunt can detect, explain how it performs analysis, and how it represents findings for maximum actionability. 👉 binarly.io/blog/vulhunt-i…
English
1
15
17
1.8K
Takahiro Haruyama retweetledi
BINARLY🔬
BINARLY🔬@binarly_io·
Continuing our VulHunt blog series, we adopt the mindset of a vulnerability researcher and attempt to uncover a number of vulnerabilities in a router's firmware: binarly.io/blog/vulnerabi…
English
0
14
19
4.4K
Takahiro Haruyama retweetledi
Claude
Claude@claudeai·
Introducing Claude Code Security, now in limited research preview. It scans codebases for vulnerabilities and suggests targeted software patches for human review, allowing teams to find and fix issues that traditional tools often miss. Learn more: anthropic.com/news/claude-co…
English
1.9K
5.8K
50K
26M
Takahiro Haruyama retweetledi
Alex Matrosov
Alex Matrosov@matrosov·
When we started @binarly_io, we had a goal: bring code-level detections (think CodeQL/Semgrep) to binaries. Not just byte patterns like YARA, but rules built on semantic meaning and program behavior. Now that the tech is proven & scaled, we’re bringing VulHunt to @REverseConf.
Sam Thomas@xorpse

@francesco_ev will be presenting VulHunt, our framework for scalable vulnerability detection and hunting, at @REverseConf this year!

English
2
14
57
7K
Takahiro Haruyama retweetledi
Alex Matrosov
Alex Matrosov@matrosov·
It was a pleasure to contribute to year one of @DistrictCon with the “Broken Trust: Firmware Bypass Chains, BMC Persistence, and EDR Evasion” talk alongside @pagabuc @ant_av7 @yeggorv @xorpse Slides: github.com/binarly-io/Res… Detailed blog post + advisories go live tomorrow!
Alex Matrosov@matrosov

On my way to @DistrictCon with new firmware update verification bypass on Supermicro BMCs (previously "fixed"). NEW: CVE-2025-12006 & CVE-2025-12007) @ant_av7 👏 Backstory: Ghost in the Controller binarly.io/blog/ghost-in-… Broken Trust binarly.io/blog/broken-tr… Stay tuned!

English
2
12
35
5.6K