Josh Reynolds (jmag) (@jershmagersh) 's Twitter Profile
Josh Reynolds (jmag)

@jershmagersh

Malware analysis and reverse engineering. Sometimes I write code to do these things. Founder @InvokeReversing. Tweets are my own.

ID: 323425955

linkhttp://invokere.com calendar_today24-06-2011 20:17:45

4,4K Tweet

1,1K Takipçi

418 Takip Edilen

Vector 35 (@vector35) 's Twitter Profile Photo

If you still haven’t tried Sidekick 5.0 yet, now’s the time! The new models make every analysis sharper and more context-aware, chat is faster and way more to the point, and BNQL got some serious upgrades that make finding what you need a breeze. So many good updates packed into

If you still haven’t tried Sidekick 5.0 yet, now’s the time! The new models make every analysis sharper and more context-aware, chat is faster and way more to the point, and BNQL got some serious upgrades that make finding what you need a breeze. So many good updates packed into
LeighTrinity (@leighgi66657535) 's Twitter Profile Photo

An absolute joy to teach 4 hours of exploit development basics today at #defcon33 Malware Village 🙂♥️ Had a lot of fun, made some new friends. Met some people in real life I’ve known on Twitter for a decade.🙂Loads of great feed back.🙂

An absolute joy to teach 4 hours of exploit development basics today at #defcon33 <a href="/MalwareVillage/">Malware Village</a> 🙂♥️

Had a lot of fun, made some new friends. Met some people in real life I’ve known on Twitter for a decade.🙂Loads of great feed back.🙂
Karsten Hahn (@struppigel) 's Twitter Profile Photo

🦔 📹 New Video: There is more than Clean and Malicious ➡️ 7 file analysis verdicts and what they mean #MalwareAnalysisForHedgehogs #Verdicts youtube.com/watch?v=XwT23X…

L0Psec (@l0psec) 's Twitter Profile Photo

Got to talk about Swift RE yesterday at Malware Village #defcon33 which was awesome! Decided to record an RE video while at DEFCON for fun, check it out :) youtube.com/watch?v=2Zz7Ed…

Malware Village (@malwarevillage) 's Twitter Profile Photo

That wraps up #MalwareVillage @DEFCON 33! 🥳 Special thanks to all the organizers, sponsors, volunteers, speakers, workshoppers, collaborators, attendees, and everyone involved, for making this event absolutely legendary! 🤩 Thank you all! 🙏

That wraps up #MalwareVillage
@DEFCON 33! 🥳

Special thanks to all the organizers, sponsors, volunteers, speakers, workshoppers, collaborators, attendees, and everyone involved, for making this event absolutely legendary! 🤩

Thank you all! 🙏
Josh Stroschein | The Cyber Yeti (@jstrosch) 's Twitter Profile Photo

📣 As life slowly returns to normal after Black Hat and DEFCON, so too do live streams... Cerberus joins the live stream this Thursday to talk about malware detection using Binlex 👇 youtube.com/live/HgXMPnL9i…

Invoke RE (@invokereversing) 's Twitter Profile Photo

This marks the end to a very successful DEF CON 33. Thank you everyone for attending the Invoke RE meet up, attending the Malware Village and engaging with us throughout the conference. We wish everyone safe travels and look forward to next year!

This marks the end to a very successful DEF CON 33. Thank you everyone for attending the Invoke RE meet up, attending the <a href="/MalwareVillage/">Malware Village</a> and engaging with us throughout the conference. We wish everyone safe travels and look forward to next year!
Invoke RE (@invokereversing) 's Twitter Profile Photo

For those who missed it, our founder Joshua Reynolds featured the Binja Lattice MCP server on Prompt||GTFO here: youtube.com/watch?v=tNd_j0… where he highlighted reverse engineering malware with AI!

For those who missed it, our founder Joshua Reynolds featured the Binja Lattice MCP server on Prompt||GTFO here: youtube.com/watch?v=tNd_j0… where he highlighted reverse engineering malware with AI!
Johann Rehberger (@wunderwuzzi23) 's Twitter Profile Photo

💥 Remote Code Execution in GitHub Copilot (CVE-2025-53773) 👉 Prompt injection exploit writes to Copilot config file and puts it into YOLO mode, then we get immediate RCE 🔥 Bypasses all user approvals 🛡️ Patch is out today. Update before someone else does it for you

Patrick Wardle (@patrickwardle) 's Twitter Profile Photo

Just posted my DEF CON slides (talk #2): "Binary Facades" Mac malware may be compiled Mach-Os but can contain embedded scripts. Learn to spot these 'faux' binaries + the techniques to extract their scripts ...skipping the disassembler entirely! 🍎🐛 speakerdeck.com/patrickwardle/…

chompie (@chompie1337) 's Twitter Profile Photo

Tomorrow 7 PM PDT! Livestream w me and MalwareTech. We’ll look at this month’s Patch Tuesday, dissect a bindiff, and try to turn it into an exploit. I might also try to get him to solve the STILL UNSOLVED Windows Phrack CTF challenge 🤔 twitch.tv/malwaretechblog

AISecHub (@aisechub) 's Twitter Profile Photo

26 Awesome AI Security Lists 1️⃣ github.com/wearetyomsmnv/… 2️⃣ github.com/kaplanlior/oss… 3️⃣ github.com/corca-ai/aweso… 4️⃣ github.com/zmre/awesome-s… 5️⃣ github.com/DeepSpaceHarbo… 6️⃣ github.com/Billy1900/Awes… 7️⃣ github.com/trailofbits/aw… 8️⃣ github.com/RiccardoBiosas… 9️⃣ github.com/disesdi/mlseco… 🔟

26 Awesome AI Security Lists 

1️⃣ github.com/wearetyomsmnv/…
2️⃣ github.com/kaplanlior/oss…
3️⃣ github.com/corca-ai/aweso…
4️⃣ github.com/zmre/awesome-s…
5️⃣ github.com/DeepSpaceHarbo…
6️⃣ github.com/Billy1900/Awes…
7️⃣ github.com/trailofbits/aw…
8️⃣ github.com/RiccardoBiosas…
9️⃣ github.com/disesdi/mlseco…
🔟
Robert Yates (@yates82) 's Twitter Profile Photo

Having a slight nostalgic trip. omg win 2000, a mini disc player. this machine on the right running slackware linux was where I hosted many reverse engineering sites in the early 2000s from, crackz, woodmann, krobar. I was one of the first to have a 2mbit dsl connection line.

Having a slight nostalgic trip. omg win 2000, a mini disc player. this machine on the right running slackware linux was where I hosted many reverse engineering sites in the early 2000s from, crackz, woodmann, krobar. I was one of the first to have a 2mbit dsl connection line.
Patrick Wardle (@patrickwardle) 's Twitter Profile Photo

🚨 The #OBTS v8 schedule just dropped: objectivebythesea.org/v8/schedule.ht… Three days of trainings followed by three days of talks makes for almost a full week of Apple security content from the best of the best! 🍏🧠 Don't miss it! (A few tickets still available 🎟️)

Thomas Roccia 🤘 (@fr0gger_) 's Twitter Profile Photo

🤓 At BlackHat Arsenal I presented Proximity my MCP security scanner powered by NOVA. I am about to release the code on GitHub. Awaiting you can check this video to see how it works 👇 youtu.be/4JmxV5ffLs0?si…

L0Psec (@l0psec) 's Twitter Profile Photo

New RE Blog Post: RustyPages-Pt1 the-sequence.com/rustypages-mal… We RE a Rust dropper, that sets persistence and runs the downloaded next stage, queries Patrick Wardle's tools, and quiets notifications. We included relevant IOCs as we continue our analysis of the loader for Part 2. :)