REhints

4.1K posts

REhints

REhints

@REhints

sharing reverse engineering knowledge

เข้าร่วม Mayıs 2013
5 กำลังติดตาม14.1K ผู้ติดตาม
ทวีตที่ปักหมุด
REhints
REhints@REhints·
New #CodeXplorer v2.1 [IDA7 Edition] released! Changelog: multiple bugfixes, added gcc Virtual Tables and RTTI parsing, improved Linux and macOS support. github.com/REhints/HexRay… #REhints
English
2
98
189
0
REhints รีทวีตแล้ว
Hermes Tool
Hermes Tool@Hermes_tooll·
CVE-2025-24257 — IOGPUFamily kernel heap OOB write on iOS 18.3 .. First public PoC — built entirely github.com/crazymind90/CV…
English
1
10
82
5.8K
REhints รีทวีตแล้ว
RE//verse
RE//verse@REverseConf·
Catch Christopher Domas’ keynote from RE//verse 2026! fail: jmp fail (everything I got wrong in RE and security research) gets into the dead ends, bad ideas, and wasted hours behind real progress in RE and security work. Watch now: youtu.be/iOq8O_phwbA?si…
YouTube video
YouTube
RE//verse tweet media
English
1
11
27
1.7K
REhints รีทวีตแล้ว
ESET Research
ESET Research@ESETresearch·
#ESETresearch analyzed more than 80 EDR killers, seen across real-world intrusions, and used ESET telemetry to document how these tools operate, who uses them, and how they evolve beyond simple driver abuse. welivesecurity.com/en/eset-resear… 1/6
English
4
64
205
14.5K
REhints รีทวีตแล้ว
RE//verse
RE//verse@REverseConf·
The Xbox One was hacked for the first time in over a decade at RE//verse! Watch the full talk here: youtu.be/FTFn4UZsA5U?si…
YouTube video
YouTube
RE//verse tweet media
English
3
17
96
7.8K
REhints รีทวีตแล้ว
Alex Matrosov
Alex Matrosov@matrosov·
Get insights into your software supply chain, now free and open source. SBOMs are a powerful type of report. If you generate them, make sure you’re collecting and monitoring them at scale.
SBOM-Tools@sbom_tools

🪄✨Announcing sbom-tools v0.1.16 — open-source SBOM analysis that helps you spot supply chain gaps faster. This release adds broader CycloneDX/SPDX + VEX support, OSV/CISA KEV enrichment, semantic diffing, quality scoring, and compliance checks. Try it: github.com/sbom-tool/sbom…

English
0
4
16
3.3K
REhints รีทวีตแล้ว
johnny
johnny@zeroxjf·
Reverse engineered Apple’s Background Security Improvement (BSI) update for iOS 26.3.1. Found potential WebKit SOP bypass it patches — NavigateEvent.canIntercept=true on cross-port navigations that should be non-interceptable. Impact: redirect hijack github.com/zeroxjf/WebKit…
English
4
16
109
8.4K
REhints รีทวีตแล้ว
Alex Plaskett
Alex Plaskett@alexjplaskett·
An analysis of CVE-2026-21236 - A heap based buffer overflow in the Microsoft Windows Kernel afd.sys - was just published by @ASN_Sinanju_06S a recent secondment with my team EDG! Nice work for her first triage of a kernel memory corruption bug! nccgroup.com/research/vulne…
English
3
63
229
15.7K
REhints รีทวีตแล้ว
OtterSec
OtterSec@osec_io·
We achieved a guest-to-host escape by exploiting a QEMU 0-day where the bytes written out of bounds were uncontrolled. Full breakdown of the technique, glibc allocator behavior, and our heap spray/RIP-control primitive ↓
OtterSec tweet media
English
7
108
522
40.1K
REhints รีทวีตแล้ว
SBOM-Tools
SBOM-Tools@sbom_tools·
🪄✨Announcing sbom-tools v0.1.16 — open-source SBOM analysis that helps you spot supply chain gaps faster. This release adds broader CycloneDX/SPDX + VEX support, OSV/CISA KEV enrichment, semantic diffing, quality scoring, and compliance checks. Try it: github.com/sbom-tool/sbom…
English
3
39
165
20.7K
REhints รีทวีตแล้ว
Alex Matrosov
Alex Matrosov@matrosov·
Nice blog! This hits a real pain point with current SAST tooling. Most of it just runs a bunch of generic checks without understanding the actual threat model or where the real security boundaries are. That lack of semantic context is exactly the issue, I’ve been arguing for a while that detection logic needs to be context-aware, and trying to bolt that on manually with rules just doesn’t scale. This is a very natural place for LLMs to add value. With AI accelerating code production, we also need to move beyond the simple rubric of “bug exists -> reachable -> fix it.” That model breaks down at scale (reachable != exploitable). What’s missing is deeper context around exploitability, and how real is the risk, what’s the blast radius, and what actually matters to fix first. That’s the layer that will drive meaningful prioritization. Also, using LLMs purely for triaging SAST findings after the fact gets expensive very quickly at scale. It’s the easiest path, so a lot of tools go there now, but without deeper integration into the analysis pipeline, it’s a pretty inefficient approach.
Alex Matrosov tweet media
English
1
6
14
2.4K
REhints รีทวีตแล้ว
joernchen
joernchen@joernchen·
RIP FX We collected some texts from the community in memory of @41414141 . You can find them here phenoelit.de/fx.html
English
1
22
61
10.9K
REhints รีทวีตแล้ว
Ori Nimron
Ori Nimron@orinimron123·
Just released DriverExplorer — a Rust utility for exploring Windows kernel drivers. • Enumerate loaded drivers • Easily Load / Unload drivers • Built for Windows kernel devs & security researchers: github.com/orinimron123/D…
Ori Nimron tweet media
English
5
65
319
16.8K
REhints รีทวีตแล้ว
matteyeux
matteyeux@matteyeux·
Looks like iOS remote kernel debugging is working well with Binary Ninja and a virtual iPhone running iOS 26.3
matteyeux tweet media
English
9
76
652
39.3K
REhints รีทวีตแล้ว
b33f | 🇺🇦✊
b33f | 🇺🇦✊@FuzzySec·
I am releasing a reconstructed version of the cassowary CVE (CVE-2024-23222) that was disclosed as part of the Coruna leak. I also did some research with my AI assistants 😄 to reproduce a crash for the bug on x86_64 Linux github.com/FuzzySecurity/…
English
2
16
81
9.2K
REhints รีทวีตแล้ว
SBOM-Tools
SBOM-Tools@sbom_tools·
Working on a new release with a number of improvements. Refining the TUI workflows to allow seamless context switching between components, vulnerabilities, and dependencies tabs, improving visibility into how the data connects.
SBOM-Tools tweet media
English
0
1
4
902
REhints รีทวีตแล้ว
Alex Plaskett
Alex Plaskett@alexjplaskett·
ZeroDayBench: Evaluating LLM Agents on Unseen Zero-Day Vulnerabilities for Cyberdefense arxiv.org/pdf/2603.02297
Alex Plaskett tweet mediaAlex Plaskett tweet mediaAlex Plaskett tweet media
English
3
40
189
18.8K