
Josh Reynolds (jmag)
@jershmagersh
Malware analysis and reverse engineering. Sometimes I write code to do these things. Founder @InvokeReversing. Tweets are my own.
ID: 323425955
http://invokere.com 24-06-2011 20:17:45
4,4K Tweet
1,1K Takipçi
418 Takip Edilen


An absolute joy to teach 4 hours of exploit development basics today at #defcon33 Malware Village 🙂♥️ Had a lot of fun, made some new friends. Met some people in real life I’ve known on Twitter for a decade.🙂Loads of great feed back.🙂



Got to talk about Swift RE yesterday at Malware Village #defcon33 which was awesome! Decided to record an RE video while at DEFCON for fun, check it out :) youtube.com/watch?v=2Zz7Ed…



This marks the end to a very successful DEF CON 33. Thank you everyone for attending the Invoke RE meet up, attending the Malware Village and engaging with us throughout the conference. We wish everyone safe travels and look forward to next year!





Tomorrow 7 PM PDT! Livestream w me and MalwareTech. We’ll look at this month’s Patch Tuesday, dissect a bindiff, and try to turn it into an exploit. I might also try to get him to solve the STILL UNSOLVED Windows Phrack CTF challenge 🤔 twitch.tv/malwaretechblog


26 Awesome AI Security Lists 1️⃣ github.com/wearetyomsmnv/… 2️⃣ github.com/kaplanlior/oss… 3️⃣ github.com/corca-ai/aweso… 4️⃣ github.com/zmre/awesome-s… 5️⃣ github.com/DeepSpaceHarbo… 6️⃣ github.com/Billy1900/Awes… 7️⃣ github.com/trailofbits/aw… 8️⃣ github.com/RiccardoBiosas… 9️⃣ github.com/disesdi/mlseco… 🔟







New RE Blog Post: RustyPages-Pt1 the-sequence.com/rustypages-mal… We RE a Rust dropper, that sets persistence and runs the downloaded next stage, queries Patrick Wardle's tools, and quiets notifications. We included relevant IOCs as we continue our analysis of the loader for Part 2. :)
