cleptho

9.4K posts

cleptho

cleptho

@cleptho

Вечная память

France Katılım Kasım 2010
858 Takip Edilen278 Takipçiler
cleptho retweetledi
blasty
blasty@bl4sty·
looks like the AI + MCP-assisted reverse engineering hype train is gaining steam! 🚂✨ in just the past few days, we've seen: • @itszn13 integrating MCP into @vector35’s Binary Ninja (x.com/itszn13/status…) • @JH_Pointer casually dropping his IDA MCP project, which I had to nerdsnipe myself into trying (github.com/MxIris-Reverse…, x.com/bl4sty/status/…) • @mrexodia rolling out a clean (judging by a quick code quality check) MCP implementation for IDA (github.com/mrexodia/ida-p…) • @lauriewired dropping GhidraMCP for @NSAGov’s Ghidra (github.com/LaurieWired/Gh…) these tools are early-stage but already hint at the potential for interactive RE software running on (semi) autopilot. makes me wonder—should we formalize a set of MCP primitives across RE tools and unify them under one overarching framework? 🤔 of course, these aren’t silver bullets. but much like typical LLM usage, in the right hands, they could be powerful time-savers. curious to see what comes next! might be time for hacking competitions focused on small/constrained binaries to start thinking about countermeasures against AI-assisted cheesing. 👀
itszn@itszn13

Claude reversing a binary using Binary Ninja via MCP while I get a snack @bl4sty @ziyadedher @vector35

English
11
88
398
59.1K
cleptho retweetledi
Alfie
Alfie@alfiecg_dev·
I've just published a new blog post detailing how I developed a deterministic kernel exploit for iOS. Enjoy! alfiecg.uk/2025/03/01/Tri…
English
5
145
701
147.3K
cleptho retweetledi
Alexander Popov
Alexander Popov@a13xp0p0v·
Slides for my talk at @h2hconference 2024: Diving into Linux kernel security 🤿 I described how to learn this complex area and knowingly configure the security parameters of your Linux-based system. And I showed my open-source tools for that purpose! a13xp0p0v.github.io/img/Alexander_…
English
5
79
261
27.4K
cleptho retweetledi
p3rr0
p3rr0@Hperalta89·
This research allowed me to find critical bugs in several electron applications by finding public n-day exploits for older versions of chrome and adapting them to the electron framework. github.com/p3rr0x/Blog/tr… #BugBounty
English
7
53
238
15.5K
cleptho retweetledi
eShard
eShard@eshard·
We needed tools to perform advanced security investigations on iOS. But those tools didn’t exist yet... or weren’t openly available. So we created our own. We’ve fully emulated iOS on #QEMU using only open-source technologies. And this is just the beginning.
English
3
12
46
6.3K
cleptho retweetledi
Piotr Bazydło
Piotr Bazydło@chudyPB·
My WarCon slides about Ivanti Avalanche are public! I tried to do some mapping of the attack-surface, show the new auth mechanism and present some research ideas (things I didn't try). It also shows my first-ever fuzzing and memory corruption experience😆 github.com/thezdi/present…
English
1
42
149
10.8K
cleptho retweetledi
Pumpkin 🎃
Pumpkin 🎃@u1f383·
Dropped my slide for POC2024 on Linux kernel exploitation, including a journal from Pwn2Own Vancouver earlier this year. Enjoy 🙂. u1f383.github.io/slides/talks/2…
English
7
103
349
37.7K
cleptho retweetledi
hasherezade
hasherezade@hasherezade·
Did you notice that the techniques used to evade AI censorship are basically the same patterns as the ones used in psychomanipulation? "Boiling the frog", fabricating higher cause to justify the means, etc, etc. [1/2]
English
3
7
63
6.5K
cleptho retweetledi