Sam Thomas

682 posts

Sam Thomas banner
Sam Thomas

Sam Thomas

@xorpse

Chief Scientist @binarly_io. Program analysis. Reverse engineering. Backdoor detection.

United Kingdom Katılım Aralık 2017
626 Takip Edilen657 Takipçiler
Sam Thomas retweetledi
Invoke RE
Invoke RE@InvokeReversing·
We've uploaded our live stream from RE//verse 2026 where we sat down with @emesarecom from @vector35 to discuss WARP signatures used for symbol and type information recovery. Mason is a wealth of knowledge and it was a pleasure speaking with him at this amazing event!
Invoke RE tweet media
English
1
8
29
2K
Sam Thomas retweetledi
lukas seidel
lukas seidel@pr0me·
@0x464D standalone should be up in a couple days, and we are also looking into a version for VulHunt :)
English
0
1
6
234
Sam Thomas retweetledi
Quentin Kaiser
Quentin Kaiser@qkaiser·
Spent the evening digging through the code. The engineering behind this is 🤌 deeply complex, yet full of elegant, high-leverage tricks to keep it fast. If you work on similar problems, there’s a lot here to learn from.
Sam Thomas@xorpse

We @binarly_io just open-sourced our VulHunt framework at @REverseConf! GitHub: github.com/vulhunt-re/vul… Documentation: vulhunt.re/docs Slack: join.slack.com/t/vulhunt/shar… vulhunt.re

English
2
5
19
3.4K
Sam Thomas retweetledi
lukas seidel
lukas seidel@pr0me·
recovering type layouts is one of the primary tasks during reverse engineering. especially recovering structs and their fields can drastically improve the readability of decompiled code. type recovery systems aim to automate this step, e.g., by using machine learning techniques
lukas seidel tweet media
English
3
2
20
844
Sam Thomas retweetledi
lukas seidel
lukas seidel@pr0me·
our improved implementation of an n-gram-based approach enables automatic filtering and is orders of magnitudes faster than comparable systems. we also show that the system is on-par with the SotA in recovering struct types.
lukas seidel tweet media
English
1
2
10
639
Sam Thomas retweetledi
lukas seidel
lukas seidel@pr0me·
furthermore, we show that the approach also works reasonably well to recover full function signatures!
lukas seidel tweet media
English
1
2
13
797
Sam Thomas retweetledi
lukas seidel
lukas seidel@pr0me·
we will present our work on practical binary type recovery at ACM CODASPY '26! prior work rarely focused on applicability: too slow, no meaningful filtering mechanisms, unsound struct recovery we address these gaps and present a system for headless type recovery at scale
lukas seidel tweet media
English
2
23
78
22.6K
Sam Thomas retweetledi
lukas seidel
lukas seidel@pr0me·
VULHUNT IS OPEN SOURCE you can now use our binary analysis and querying engine for your own research or let an agent go ham with the MCP. the team also did an amazing job to ship comprehensive docs and blog posts with the details, check them out!
lukas seidel tweet media
Sam Thomas@xorpse

We @binarly_io just open-sourced our VulHunt framework at @REverseConf! GitHub: github.com/vulhunt-re/vul… Documentation: vulhunt.re/docs Slack: join.slack.com/t/vulhunt/shar… vulhunt.re

English
11
27
114
9.5K
Sam Thomas retweetledi
Fabio Pagani
Fabio Pagani@pagabuc·
Favorite talks: 1. fail: jmp fail (everything I got wrong in RE and security research) by Chris Domas 2. Breaking Encrypted USB Drives with Time-Travel Debugging by Xusheng Li 3. VulHunt: A Framework for Hunting Vulnerabilities in Binaries by @francesco_ev and @xorpse
English
1
5
12
809
Sam Thomas retweetledi
GitHub Projects Community
GitHub Projects Community@GithubProjects·
The definitive open-source tui hex editor for forensic file inspection
GitHub Projects Community tweet media
English
2
10
73
9.3K
Sam Thomas retweetledi
Alex Matrosov
Alex Matrosov@matrosov·
The dream of a fast and reliable binary analysis framework is now a reality. Today, we’re open sourcing VulHunt.RE 🎉 code: github.com/vulhunt-re/vul… docs: vulhunt.re/docs A huge kudos to the entire REsearch team!
Alex Matrosov@matrosov

This year at @REverseConf, we’re dropping something special, a project we’ve been heads-down on for a while that boosts semantic-level binary detection with reachability + taint analysis. Like CodeQL/Semgrep, but for binaries. VulHunt use cases: Vuln REsearch: binarly.io/blog/vulnerabi… Detection Eng: binarly.io/blog/vulhunt-i… VH Intro: binarly.io/blog/vulhunt-i…

English
4
94
382
34.6K