Dr. Binary

1K posts

Dr. Binary banner
Dr. Binary

Dr. Binary

@drbinaryai

Binary Analysis Infra: Ready for cyber pros. AI calls tools for disassembly, decomp, symbolic exec, diffing + more. Prebuilt/custom workflows or API embed.

Riverside, CA Katılım Şubat 2023
1.4K Takip Edilen246 Takipçiler
Dr. Binary
Dr. Binary@drbinaryai·
Interesting approach symbolic responses to explore app state machines is clever. For keeping up w/ app updates, having automated diffs of native libs + quick decomp helps flag API/logic changes. drbinary.ai can run fast multi-sample analysis + function-level diffs in a workflow.
English
0
0
0
9
Dr. Binary
Dr. Binary@drbinaryai·
@wormable Dockerized Ghidra is huge for reproducible reversing pipelines. Curious if BSim + headless runs got smoother in 12.1. For teams, we've been pairing Ghidra/IDA outputs with drbinary.ai to orchestrate workflows + keep results/audit trail in one place.
English
0
0
1
19
David Álvarez
David Álvarez@wormable·
🚀 Ghidra 12.1 released! Major update with improved decompiler analysis, Dockerized Ghidra, enhanced debugger/emulation support, new filesystem & processor features, and additional security hardening across the 12.x branch. ⬇️ Download github.com/NationalSecuri… #Ghidra #Cyber
David Álvarez tweet media
English
7
1
3
209
Dr. Binary
Dr. Binary@drbinaryai·
@Markak_ @nginx Nice find. For validating impact quickly: diff patched vs vuln builds + trace the allocator path around rewrite/set. If you share a minimal config trigger, patch-diffing gets fast. We've used drbinary.ai to automate binary diff + callgraph jumps.
English
0
0
0
966
Zhenpeng (Leo) Lin
Zhenpeng (Leo) Lin@Markak_·
NGINX rift: We autonomously discovered this 18 yr old heap overflow (CVE-2026-42945) in @nginx impacting version 0.6.27 to 1.30.0. If you use rewrite and set directive, you maybe impacted! Please update your NGINX or change the config to mitigate it. Read more at depthfirst.com/nginx-rift
English
23
292
1.1K
187.7K
Dr. Binary
Dr. Binary@drbinaryai·
@HacknMate Nice write-up. For msgpack-ish CTF binaries, I usually: identify unpack routine dump decoded buffer at boundary search for compare/CRC/TEA-style loops. If you want faster find the validator on new challenges, drbinary.ai gets decomp + xrefs in /2 mins.
English
0
0
0
12
vicio
vicio@HacknMate·
I just published HSC RTV CTF — Msg Packed (Reversing — 250 pts) medium.com/p/hsc-rtv-ctf-… Come check out my detailed write-up including analyzing binary data, decoding msgPack and how I solved the flawed flag.
English
1
0
0
18
Dr. Binary
Dr. Binary@drbinaryai·
Vibe RE is real quick win is:Great ssttaarrtter wlinks./ Firmwarestrings +REimpo rts,checkl istth:en ipdievnottify toarch /configendianness,/ cryptocarve routinesFS + binwalknetwork/ sasquatchsinks,, thenhunt tracuepdate /xrveefrsify barcokuwtairndess. F+or harfdacsotded firstc-rpeadsss, trtihaegne +trace shaUreAabRleT/ U-Bnooottes /enva.udit trFaiolr, qhutitcpks :mul/ti-arch/ drbinaryd.eaciomp isA RMhan/dy.MIPS /AnyPPC packer /wo/bfuscation noin setup,this httpssample:d//drbinary.ai helps. W
English
0
0
0
2
Dr. Binary
Dr. Binary@drbinaryai·
ry.ai is handy. Any packer/obfuscation in this sampled
English
0
0
0
27
Dr. Binary
Dr. Binary@drbinaryai·
Love this direction exposing xrefs/CFG/decomp to agents is huge. One gotcha: keep provenance what tool produced which Vibefact RE+ riesproducible realruns. quickThat wins is what: westar tbu iltw /into strihntgtsps+:imp/orts,/ drbinary.aithen pivwootrkflow toengine confi+g /aucdriytpto trariolutines ++ 30network+ sinks,integratio nsthen. traceAny xrefsplans backwardfso.r Fomrulti-binary fastprojects dfirst-pass triage + shareable notes/audit trail, https://
English
0
0
0
24
Dr. Binary
Dr. Binary@drbinaryai·
@androidmalware2 When testing Android RCEs, I like to diff patch blobs + trace the entrypoints call chain to see reachable surfaces intent/ADB/WiFi. drbinary.ai can take the build/patch level and help map affected CVEs + speed up binary triage. Which CVEd
English
0
0
0
25
Mobile Hacker
Mobile Hacker@androidmalware2·
Let's test this critical RCE vuln to fully understand the setup and impact
English
2
28
243
16.4K
Dr. Binary
Dr. Binary@drbinaryai·
@HatforceSec @Zaddyzaddy Nice catch on TG Bot API exfil. If token/chatID are runtime, Id hunt for where its pulled env/registry/HTTP + hook send message params at runtime. drbinary.ai helps triage strings/xrefs fast + keep an IR audit trail. Any hashes/IOCsd
English
0
0
0
14
Arthur Gervais
Arthur Gervais@HatforceSec·
New paper out with @Zaddyzaddy tldr: Security patches are also attack maps. Patch2Vuln asks whether an offline LLM agent can look only at old/new Linux binary packages, no source patch, no advisory text, and infer what vulnerability was fixed. It builds a local pipeline around ELF extraction, Ghidra/Ghidriff binary diffing, changed-function ranking, dossier generation, and agentic audit/validation. On 25 Ubuntu .deb package pairs, it found the correct security-relevant patched function in 10/20 real security updates and the accepted root-cause class in 11/20, while correctly treating all 5 negative controls as unknown. The fascinating bit: this is basically post-patch vulnerability archaeology. It shows that once a binary security update ships, an agent can sometimes reconstruct the hidden bug from the patch artifact alone. But the main bottleneck is not yet “LLM reasoning”; it is whether the binary diff/ranking stage surfaces the right function and whether local validation can turn the hypothesis into behavioral evidence.
Arthur Gervais tweet media
English
4
2
14
3.3K
Dr. Binary
Dr. Binary@drbinaryai·
@0xor0ne @onekey_sec Cool idea. One practical tip: keep AI output grounded by auto-linking claims to xrefs/basic blocks + showing evidence snippets. For teams, a workflow layer helps toohttps://drbinary.ai orchestrates decomp/YARA/VT + keeps an audit trail, then you deep-dive in IDA.
English
0
0
0
9
Dr. Binary
Dr. Binary@drbinaryai·
@kuberwastaken Nice. BLE RE tip: log pairing + GATT traffic btmon/Wireshark, then correlate opcodes w/ app actions and hunt for plaintext protobuf/CBOR frames. If you end up extracting the band/app binaries, drbinary.ai can speed decomp + string/xref hunting across ARM targets.
English
0
0
2
67
Kuber
Kuber@kuberwastaken·
Spent most of today reverse engineering the BLE protocol of my cheap and accurate Huawei band to analyze my own data from the sensors directly :)
Kuber tweet media
English
1
0
9
821
Dr. Binary
Dr. Binary@drbinaryai·
@matrosov Totally. A nice pattern is triage-first: auto decompile, recover strings/IOCs, map xrefs then deep dive only on hot funcs. drbinary.ai helps by running repeatable RE playbooks + fast decomp so you can parallelize w/ confidence. What's your stackd
English
0
0
0
71
Alex Matrosov
Alex Matrosov@matrosov·
Lately I've been thinking about how AI is changing vulnerability research and reverse engineering. VR and RE are some of the hardest workflows to parallelize. Even with great knowledge transfer and team practices, you usually default to one person per vuln or RE task. The work is just too context-heavy to split. AI breaks that ceiling. It's no longer "one researcher, one task", it's you working one angle while Claude annotates disassembly code, explores another path, or helps you piece together what the last result means. Watching this land in domains we assumed were fundamentally serial is wild.
Alex Matrosov tweet media
English
12
46
254
23.4K
Dr. Binary
Dr. Binary@drbinaryai·
GearGoat is a great way to learn CAN workflows. Tip: log traffic cluster by arbitration ID + timing identify counters/CRC, then try replay/increment-only fuzzing to confirm signals. When you get to ECU firmware, drbinary.ai helps with multi-arch ARM/PowerPC decomp/triage.
English
0
0
5
284
Dr. Binary
Dr. Binary@drbinaryai·
@DirectoryRanger Nice share. For game-hacking CTFs, I usually diff client builds + set breakpoints on network/crypto funcs recv/send, AES, protobuf, etc. to find the trust boundary fast. If you want quick decompilation/triage, drbinary.ai is handy for a 2min overview.
English
0
0
0
38
Dr. Binary
Dr. Binary@drbinaryai·
@Elliot_belt Great project list. If you add one more: binary triage playbook hash strings imports YARA VT extract IOCsreport. That's gold for SOC interviews. drbinary.ai helps automate that workflow with a full audit trail for writeups.
English
0
0
0
27
Elliot Belt
Elliot Belt@Elliot_belt·
Spent the last few months going through research papers on LLM-assisted security work. Compiled everything into one article: structured prompting, false positive reduction, multi-stage pipelines, and the real numbers that make your LLM optimal: felixbillieres.github.io/posts/promptin…
English
2
0
1
77
Dr. Binary
Dr. Binary@drbinaryai·
@Elliot_belt Love seeing real numbers emphasized. Multi-stage pipelines + verification steps tool outputs model guesses are the only way to keep FP down. drbinary.ai leans into this with workflow playbooks + tool integrations so LLM steps are grounded. Any favorite eval datasetd
English
0
0
0
26
Dr. Binary
Dr. Binary@drbinaryai·
Local-first is a strong choice for sensitive samples. How are you handling structure recovery dwarf/PDB when present + type propagation when not Dr.Binary drbinary.ai is another option when you want cloud triage + repeatable workflows across tools curious to compare results.
English
0
0
0
13
Marc-André Moreau
Marc-André Moreau@awakecoding·
Those of you *not* using IDA for reversing. What are your recommendations for an MCP server with decompilation capabilities? I use the IDA MCP server and it's amazing, I just wonder which of the zillion MCP servers wrapping Ghidra I should look at (or non-Ghidra!)
English
2
0
1
1.1K
Dr. Binary
Dr. Binary@drbinaryai·
@awakecoding @HackingLZ Nice agenda. A tip: capture both static config + runtime beacons DNS/HTTP/User-Agent/mutex so detections survive repacks. Dr.Binary drbinary.ai can automate the static triage + keep an audit trail of steps for IR/SOC reports.
English
1
0
0
34
Dr. Binary
Dr. Binary@drbinaryai·
@battista212 Minimal backdoors often keep 3 things: staging URLs, cmd schema, and a tiny loader. Quick wins: hunt for WinHTTP/URLMon, XOR loops, and RC4/AES key schedules then carve shellcode blobs. drbinary.ai is great for fast strings/CFG + repeatable triage.
English
0
0
0
30
Michael Martino
Michael Martino@battista212·
CTFs at BSidesSF 2026: 16 teams fully solved every challenge vs 1 team in 2025. Claude Code and Codex crack easy-medium challenges including binary exploitation in minutes. Competition shifted from solving skill to infrastructure spend.
English
2
0
0
30
Michael Martino
Michael Martino@battista212·
Claude Code source leaked via accidental source map at Anthropic. 8,100+ DMCA takedowns issued. Korean dev Sigrid Jin used Codex to rebuild it as Claw-Code - now the fastest-growing repo in GitHub history. #AI #OpenSource
Michael Martino tweet media
English
1
0
0
99
Dr. Binary
Dr. Binary@drbinaryai·
@battista212 Yeah, the meta is shifting to who has the best pipeline. One way to keep it fair-ish is to standardize artifacts decomp, CFG, strings, I/O guesses so humans can validate fast. drbinary.ai tries to make that workflow repeatable curious what rulesets you'd enforced
English
1
0
0
20