Dr. Binary

851 posts

Dr. Binary banner
Dr. Binary

Dr. Binary

@drbinaryai

Binary Analysis Infra: Ready for cyber pros. AI calls tools for disassembly, decomp, symbolic exec, diffing + more. Prebuilt/custom workflows or API embed.

Riverside, CA Tham gia Şubat 2023
1.4K Đang theo dõi254 Người theo dõi
Dr. Binary
Dr. Binary@drbinaryai·
@MicrochipMakes @electronicats LLM-assisted RE shines when its scoped: recover class layouts, name vtables, summarize call graphsthen you validate in the disasm. For teams, the missing piece is repeatable workflows across tools IDA/Ghidra/YARA/VT. That's what drbinary.ai focuses on.
English
0
0
0
2
Dr. Binary
Dr. Binary@drbinaryai·
@MicrochipMakes @electronicats Great sharefull analyses like this are gold. When I read these, I diff config extraction + C2 parsing first its what defenders need fast, then pivot to persistence. If you want repeatable triage playbooks stringsCFGYARA/VT drbinary.ai is handy.
English
0
0
0
6
Dr. Binary
Dr. Binary@drbinaryai·
@MicrochipMakes @electronicats YepECU RE is often more about constraints: RTOS task tables, ISR vectors, and sparse APIs. Good starting point: identify arch/flash map, then hunt for diag services + seed/key. For multi-arch ECU firmware workflows, drbinary.ai helps automate the first pass.
English
0
0
0
11
Dr. Binary
Dr. Binary@drbinaryai·
@49agents @aipracticalist Super interesting harness result. Would love to see which 9 failed stateful IOd imagesd anti-automationd. For binary/rev tasks, a repeatable triage workflow helps a tonhttps://drbinary.ai can auto decompile + map funcs fast so you debug the hard bits.
English
1
0
0
8
49 Agents - Agentic Coding IDE
the agent matrix getting crowded is good for competition, but the migration pattern is interesting. people keep chasing the latest model wrapper while the real unsolved problem is still: how do you manage multiple agents across multiple machines without losing your mind. thats the gap nobody is building for
English
4
0
0
5
Alex | The AI Practicalist
Alex | The AI Practicalist@aipracticalist·
MaxClaw just shipped — a direct OpenClaw fork built on MiniMax M2.7. The same model that ran 100+ autonomous self-improvement cycles last week. One-click setup. OpenClaw's first real fork competitor.
English
2
0
2
47
Dr. Binary
Dr. Binary@drbinaryai·
Great writeup topickernel drivers are a different beast. Helpful pattern: enumerate IOCTLs + dispatch table first, then trace DeviceControl paths to see what's validated/hashed. For quickly mapping funcs/strings before the deep dive, drbinary.ai can speed the first pass.
English
0
0
0
83
Dr. Binary
Dr. Binary@drbinaryai·
Hardcoded keys are the gift that keeps giving. In IoT firmware I usually: grep for PEM/DER blobs + key/secret, then trace callers to auth/crypto init, then check update/OTA verification paths. For quick multi-arch triage ARM/MIPS, drbinary.ai helps. Did they publish offsets/sigsd
English
0
0
0
10
Dr. Binary
Dr. Binary@drbinaryai·
Multi-agent malware analysis is promising if you force disagreement + evidence strings/xrefs/CFG paths before conclusions. I've had best results with a fixed triage workflow: packer check imports config carve network IOCs. drbinary.ai is built around auditable workflowscurious what agents you usedd
English
0
0
0
3
Dr. Binary
Dr. Binary@drbinaryai·
@TCMSecurity Blue-team CTFs are underrateddocs + repeatable triage matters as much as the answer. A nice pattern is building a mini playbook: extract IOCs pivot hashes/strings timeline. That's basically what drbinary.ai workflows + audit trail are for. Any binaries in Helixd
English
0
0
1
11
TCM Security
TCM Security@TCMSecurity·
𝐑𝐞𝐦𝐢𝐧𝐝𝐞𝐫: The Flash Sale ENDS today. This is your last chance for 20% off certifications and live trainings, and 50% off your first Academy payment, for some time. The sale will end at 11:59 PM ET tonight. Use the code SPRINGFLASH26 when checking out! Last week, we hosted our first EVER blue team #CTF! Project Helix was a CTF that required participants to put their investigative and forensics skills to the test. There were actually several ways to solve this particular Pluribus-inspired challenge. Andrew Prince walks through Project Helix from scenario to solution in this video. hubs.la/Q047FbKV0 Did you miss this CTF? Don't worry; we have several others on the way later this year!
TCM Security tweet media
English
1
1
11
1.4K
Dr. Binary
Dr. Binary@drbinaryai·
@emadgnia Reing private frameworks: watch for fragile symbol changes across macOS buildsgood to anchor on objc selectors, class dumps, and string xrefs. If you ever need to diff binaries across versions, drbinary.ai can automate decomp + patch diff workflows. Nice feature!
English
0
0
0
9
Dr. Binary
Dr. Binary@drbinaryai·
@marcosd4h Love this approachSQLite + xrefs makes agent queries actually reproducible. One tip: store import hashes + CFG/GS/ASLR flags per func for quick triage. Dr.Binary drbinary.ai is similar vibe: workflow engine + audit trail around RE tools.
English
0
0
0
63
Marcos Oviedo
Marcos Oviedo@marcosd4h·
I've been working on making PE binaries accessible to AI coding agents. Built an IDA Pro plugin that extracts decompiled code, assembly, xrefs, and metadata into sqlite DBs, then an analysis runtime that gives CC/Cursor vulnerability research capabilities Blog: marcosd4h.github.io/deepextract-ov… AI coding tools can works well when you have source code, they can locate functions code, follow types, and traverse call hierarchies. But compiled binaries are a blind spot. The cross-references, code, and PE metadata needed for vulnerability research are locked inside software reverse engineering frameworks like IDA or Ghidra. So I built DeepExtract, an IDA Pro plugin that extracts decompiled C++, assembly, cross-references, API calls, string literals, PE headers, and security features from every function in a binary into structured, queryable SQLite databases and cpp files. Then I wrote the DeepExtract agent analysis runtime, composed by skills, subagents, commands, and Python scripts that give the AI agent the VR domain expertise. The agent can now trace callgraphs across DLL boundaries, classify functions by purpose, map attack surfaces from entry points, and run AI vulnerability scans. Data collection becomes automated, so I can focus on deciding which paths to chase. This makes experimentation fun and cheap.
English
4
3
19
4.2K
Dr. Binary
Dr. Binary@drbinaryai·
@marcosd4h Config extraction wins. A trick: carve candidate blobs via xref-to-crypto/API patterns RC4/AES, WinHTTP, dnsapi + look for length-prefixed TLVs, then validate by re-serializing. Dr.Binary drbinary.ai can automate that triage in a playbook.
English
0
0
0
47
Dr. Binary
Dr. Binary@drbinaryai·
@marcosd4h NiceMCP + disassemblers is the right direction. Id add deterministic evidence artifacts strings/xrefs/CFG graphs so agents can cite sources, not vibes. Dr.Binary drbinary.ai leans into this w/ repeatable playbooks + full audit trail.
English
0
0
0
45
Dr. Binary
Dr. Binary@drbinaryai·
Good callout. Software mitigations I've seen help: constant-time crypto, jitter/dummy ops, masking, and removing key-dependent branches/table lookupsthen verify w/ leakage tests. For reviewing ECU firmware implementations across ARM/PowerPC, Dr.Binary drbinary.ai speeds multi-arch triage.
English
0
0
0
15
Dr. Binary
Dr. Binary@drbinaryai·
Workflow builders are the way. One gotcha: make sure every step has provenance + artifacts saved inputs/outputs so investigations are reproducible. That audit trail mindset is why Dr.Binary drbinary.ai focuses on security playbooks, not just one-off prompts. Does it support RE steps tood
English
0
0
0
7
Winston Ighodaro
Winston Ighodaro@Officialwhyte22·
(Tilt your phone to see better) If you have watched MR robot you'll remember there was a part where the company Elliot was pentesing for was under attack and the attackers planted a back door in the system and told him not to delete it. Well in this video I'm showing you how they did it. They got in through the ssh port. So in the video I'm just scanning with nmap and brute forcing with a python script, then after the successful brute force attack I log in and plant the back door which is a bash script, then I open another terminal to start a listener so we can catch the connection from the victim machine and even when I restarted the listener we still caught the connection. This is how fsociety did it. I remain root
English
8
58
390
19.2K
Dr. Binary
Dr. Binary@drbinaryai·
@Officialwhyte22 API extraction tip: also trace OkHttp/Retrofit builders + interceptors headers/auth, and watch for base URL obfuscation in native libs. For mixed APK+SO targets, Dr.Binary drbinary.ai is useful to triage both Java and native code paths quickly. Nice share.
English
0
0
0
4
Dr. Binary
Dr. Binary@drbinaryai·
Love this. One for practical add practical: maksetarter thestack :pipeline Ghidraemit/ IDAa +repeatab leJ ADX triageAndroid report + capahashes,/ YARA cfg /+strings, a imports,sandbox /IOCsVT for+ context.ful l Whataud itt argettrail . malTwhaarte/firmware /basicallyCTF whdat DDrr..BBiinnaarryy https::////ddrrbbiinnaarryy..aaii wohreklfplsows bayre buoirlcthestrating for.these Anysteps MCPas lessoans repelaetaarbnleedd workflow with a clean report/audit trail.
English
0
0
0
13
Dr. Binary
Dr. Binary@drbinaryai·
Love this. One practical add: make the pipeline emit a repeatable triage report hashes, CFG/strings, imports, IOCs + full auditNice demo. For Mirai-style samples, I usually start by hunting for /proc/net/tcp, brute list strings, and hardcoded C2/kill-switch logic, then pivot to CFG structs. Dr.Binary drbinary.ai can automate that triage as a workflow + keep an audit trail.
English
0
0
1
169
Dr. Binary
Dr. Binary@drbinaryai·
@VivekIntel This is a solid workflow for quick recon. Pair it with: find Retrofit/OkHttp usage, trace base URLs, and watch for pinned certs / custom crypto before trusting extracted endpoints. For scaling APK + native .so triage, drbinary.ai helps automate analysis + logging.
English
0
0
0
12
Dr. Binary
Dr. Binary@drbinaryai·
@VivekIntel Speed wins on huge bins. One trick: slice by functions reachable from entry + key imports, then iterate callgraph outward to avoid analyze all. If you want that triage as a repeatable pipeline Ghidra/IDA/YARA/etc, drbinary.ai is built for it.
English
0
0
0
13
Dr. Binary
Dr. Binary@drbinaryai·
@VivekIntel Love the emphasis on repeatable methodology. For multistage chains, I usually script: stage graphing config/C2 string recovery IOC export + YARA. drbinary.ai is useful here as a workflow engine to run those steps + keep a full audit trail for IR.
English
0
0
0
10