Luke (@datalocaltmp) 's Twitter Profile
Luke

@datalocaltmp

mobile reverse engineering, vulnerability research, using lldb

ID: 1093925535074406403

linkhttps://s11research.com/training/ calendar_today08-02-2019 17:32:26

426 Tweet

865 Followers

502 Following

vx-underground (@vxunderground) 's Twitter Profile Photo

Yesterday I became acquainted with a young and passionate person who, for the past 2 years, has been documenting RATs (images, versions, port usage), and ransomware payloads (images, notes, contact information). They've documented 92 ransomware variants including (if

LaurieWired (@lauriewired) 's Twitter Profile Photo

Just built an MCP for Ghidra. Now basically any LLM (Claude, Gemini, local...) can Reverse Engineer malware for you. With the right prompting, it automates a *ton* of tedious tasks. One-shot markups of entire binaries with just a click. Open source, on Github now.

0xCC (@0xcc) 's Twitter Profile Photo

0xCC 2025 tickets are now available! 🎉✨ We're a free technical training conference by women, for women in or interested in cybersecurity. Date: 13-14 June Location: Melbourne Tickets: events.humanitix.com/0xcc-2025 Need help attending? We have a travel grant program! Website:

0xCC 2025 tickets are now available! 🎉✨

We're a free technical training conference by women, for women in or interested in cybersecurity.   

Date: 13-14 June
Location: Melbourne
Tickets: events.humanitix.com/0xcc-2025
Need help attending? We have a travel grant program!
Website:
Signal (@signalapp) 's Twitter Profile Photo

Right now there are a lot of new eyes on Signal, and not all of them are familiar with secure messaging and its nuances. Which means there’s misinfo flying around that might drive people away from Signal and private communications. One piece of misinfo we need to address is the

clearbluejar (@clearbluejar) 's Twitter Profile Photo

Wrapped up an incredible time teaching #PatchDiffingInTheDark in Austin, TX with ringzerø.training && @[email protected] ! The city didn’t disappoint—amazing food, friendly people, and my first autonomous vehicle ride!🤖 🚗✨ #waymo

Luke (@datalocaltmp) 's Twitter Profile Photo

Tested GhidraMCP for RE on stripped binaries - specifically the URL validation functions in Messenger (see my EkoParty talk). It reached the same conclusions in under a minute - may have took me a moment longer 👀 S/O LaurieWired for the awesome tool - github.com/LaurieWired/Gh…

Luke (@datalocaltmp) 's Twitter Profile Photo

Focused on iOS research rn - pleasently surprised to see that user data persists when downgrading apps with TrollStore. i.e. Find bug in v7 - app auto updates to v8 - force downgrade to v7.0 with TrollStore - user data persists. For when you forget to turn off updates .... 🤦‍♂️

Luke (@datalocaltmp) 's Twitter Profile Photo

On vacay in Taipei and I heard TSMC engineers place these chips (乖乖) next to their computers for good luck. Hoping they boost my odds of getting this talk on WhatsApp bugs past the CFP stage!

On vacay in Taipei and I heard TSMC engineers place these chips (乖乖) next to their computers for good luck.

Hoping they boost my odds of getting this talk on WhatsApp bugs past the CFP stage!
Luke (@datalocaltmp) 's Twitter Profile Photo

Thrilled to be speaking at REcon 2025 for the 20th anniversary! My talk is "Call, Crash, Repeat: Hacking WhatsApp" and covers my reverse engineering efforts and the bugs I've found in deeplink handling, PJSIP usage, and XMPP signalling. Hope you find it interesting 🥳

Thrilled to be speaking at <a href="/reconmtl/">REcon</a> 2025 for the 20th anniversary!

My talk is "Call, Crash, Repeat: Hacking WhatsApp" and covers my reverse engineering efforts and the bugs I've found in deeplink handling, PJSIP usage, and XMPP signalling.

Hope you find it interesting 🥳
Philippe Harewood (@phwd_) 's Twitter Profile Photo

Respect and blessings 🙇 And big ❤️ to my good friend, a true homie Luke (Luke (datalocaltmp)) he is a real OG for the amount of content he has shared to the community and at conferences around the world. This award really means a lot as it reinforces that sharing really is caring.

Respect and blessings 🙇
And big ❤️ to my good friend, a true homie Luke (<a href="/datalocaltmp/">Luke (datalocaltmp)</a>) he is a real OG for the amount of content he has shared to the community and at conferences around the world.

This award really means a lot as it reinforces that sharing really is caring.
Luke (@datalocaltmp) 's Twitter Profile Photo

Fired up to see everyone in beautiful Montreal for REcon 2025 - attend my talk to hear about my research on WhatsApp cfp.recon.cx/recon-2025/tal… Might have a surprise 4th bug make an appearance 👀

Fired up to see everyone in beautiful Montreal for <a href="/reconmtl/">REcon</a> 2025 - attend my talk to hear about my research on WhatsApp

cfp.recon.cx/recon-2025/tal…

Might have a surprise 4th bug make an appearance 👀
exploits.club (@exploitsclub) 's Twitter Profile Photo

EXTRA EXTRA 📣📰 exploits.club #79 OUT NOW! WhatsApp bugs from Luke (datalocaltmp) immortalp0ny finds a 20 year old NTFS vuln Forgotten syzkaller reports with Hoàng Hải Long 🇻🇳 Atredis Partners alks Lenovo LPEs + Jobs and MORE 👇 blog.exploits.club/exploits-club-…

Alfie (@alfiecg_dev) 's Twitter Profile Photo

Just released a short writeup for the A9 version of the Trigon exploit, which involves getting code execution on a coprocessor before exploiting the kernel - enjoy! alfiecg.uk/2025/07/16/Tri…

clearbluejar (@clearbluejar) 's Twitter Profile Photo

First time in Ibiza for #OBTS 🌴☀️ and couldn’t be more stoked! Honored to be speaking alongside some brilliant researchers. In my new talk I'll explore Apple Security Updates and how to tear them open for intel. Bring your sunscreen and your curiosity😎🧠

clearbluejar (@clearbluejar) 's Twitter Profile Photo

new blog post, new tool 👀 Unlock project-wide, multi-binary analysis with pyghidra-mcp, a headless Ghidra MCP server for automated, LLM-assisted reverse engineering. clearbluejar.github.io/posts/pyghidra…