sean (@seanmw) 's Twitter Profile
sean

@seanmw

UnpacMe | OALABS | Security Researcher

ID: 14794278

linkhttp://openanalysis.net calendar_today16-05-2008 03:15:36

2,2K Tweet

2,2K Followers

533 Following

Duncan Ogilvie 🍍 (@mrexodia) 's Twitter Profile Photo

Over the past year I have been working on Python bindings (icicle-python) in stealth-mode. You can try it out today! The reversing community desperately needs alternatives to unicorn. Icicile is based on Ghidra's semantics and improvements there come essentially for free!

Over the past year I have been working on Python bindings (icicle-python) in stealth-mode. You can try it out today!

The reversing community desperately needs alternatives to unicorn. Icicile is based on Ghidra's semantics and improvements there come essentially for free!
Duncan Ogilvie 🍍 (@mrexodia) 's Twitter Profile Photo

🔥 TitanHide has been updated to support the latest VMProtect 3.9.4 changes! The service name is now used as the device name as well, so the check for \\.\TitanHide will fail if you name the service differently 🧠

🔥 TitanHide has been updated to support the latest VMProtect 3.9.4 changes!

The service name is now used as the device name as well, so the check for \\.\TitanHide will fail if you name the service differently 🧠
the tiny corp (@__tinygrad__) 's Twitter Profile Photo

Contract is signed! No confidentiality, AMD has leadership that's capable of acting. Let's make this training run happen, we work in public on our Discord.

Silas Cutler // p1nk (@silascutler) 's Twitter Profile Photo

May be getting time to refresh why threat actor names exist and why they are important. They're not for marketing. silascutler.com/2021/01/14/Kil…

Invoke RE (@invokereversing) 's Twitter Profile Photo

We've uploaded our Time Travel Debugging in Binary Ninja stream with Xusheng Li from Vector 35 where we unpacked malware and analyzed anti-analysis capabilities with TTD traces. Enjoy!

We've uploaded our Time Travel Debugging in Binary Ninja stream with Xusheng Li from <a href="/vector35/">Vector 35</a> where we unpacked malware and analyzed anti-analysis capabilities with TTD traces. Enjoy!
Cyb3rjerry (@cyb3rjerry) 's Twitter Profile Photo

Hey all! As promised, here's the in-depth analysis Josh Reynolds (jmag) from Invoke RE and I did of the malware strain that's been spreading through NPM in the last few days following a successful phish. We present to you: Scavenger. c-b.io/2025-07-20+-+I…

Hey all! As promised, here's the in-depth analysis
<a href="/JershMagersh/">Josh Reynolds (jmag)</a> from <a href="/InvokeReversing/">Invoke RE</a> and I did of the malware strain that's been spreading through NPM in the last few days following a successful phish.   

We present to you: Scavenger.

c-b.io/2025-07-20+-+I…
herrcore (@herrcore) 's Twitter Profile Photo

Using the UnpacMe byte-search IDA plugin we found some Scavenger related malware dating back to October 2024. At the time the malware was dubbed ExoTickler. Analysis follows...

Using the UnpacMe byte-search IDA plugin we found some Scavenger related malware dating back to October 2024. At the time the malware was dubbed ExoTickler.

Analysis follows...
Vector 35 (@vector35) 's Twitter Profile Photo

Check out our latest blog post on modeling complex control flow with function-level basic block analysis in Binary Ninja 5.1. From DSPs to Brain***k, this update makes it easier to develop plugins for tricky architectures. binary.ninja/2025/08/12/fun…

Check out our latest blog post on modeling complex control flow with function-level basic block analysis in Binary Ninja 5.1. From DSPs to Brain***k, this update makes it easier to develop plugins for tricky architectures. binary.ninja/2025/08/12/fun…
UNPACME (@unpacme) 's Twitter Profile Photo

We’ve seen a spike in submissions this morning, which may cause some analysis delays. We’re working to resolve the backlog.

Tim Blazytko (@mr_phrazer) 's Twitter Profile Photo

We at emproof open-sourced a free firmware reverse engineering workshop for self-study. Topics: ELF analysis, cracking, malware triage, embedded-Linux, bare-metal, crypto-key extraction, anti-analysis. Docker setup and solutions included. github.com/emproof-com/wo…

RE//verse (@reverseconf) 's Twitter Profile Photo

The CFP for RE//verse 2026 is open, but not for long! Submissions close November 14th. Share your best RE and security research with us here: sessionize.com/reverse-2026

The CFP for RE//verse 2026 is open, but not for long! Submissions close November 14th. Share your best RE and security research with us here: sessionize.com/reverse-2026
Invoke RE (@invokereversing) 's Twitter Profile Photo

We've uploaded our stream from Oct 24 where we continued analyzing the SORVEPOTEL infection chain, including shellcode, Maverick.Agent.StageTwo, Maverick Agent, and a PowerShells WhatsApp worm. Big shout out to Dodo on Security 🇵🇸 🇺🇦, Washi and UNPACME for helping with this stream.

We've uploaded our stream from Oct 24 where we continued analyzing the SORVEPOTEL infection chain, including shellcode, Maverick.Agent.StageTwo, Maverick Agent, and a PowerShells WhatsApp worm. Big shout out to <a href="/dodo_sec/">Dodo on Security 🇵🇸 🇺🇦</a>, <a href="/washi_dev/">Washi</a> and <a href="/unpacme/">UNPACME</a> for helping with this stream.
sean (@seanmw) 's Twitter Profile Photo

Infrastructure for the Rhadamanthys, VenomRAT, and Elysium botnet disrupted. ~1000 servers taken offline 👏 europol.europa.eu/media-press/ne…

Tim Blazytko (@mr_phrazer) 's Twitter Profile Photo

Happy to share that later today (Friday, Nov 14, at 10:00 PM CET / 16:00 ET), I’ll be live on the #BinaryNinja livestream to talk about (anti-)reverse engineering & code (de)obfuscation. I'll also showcase some of my plugins.

sean (@seanmw) 's Twitter Profile Photo

Zombieware doing its thing stuck in a respawn loop…rewriting a mutated copy of itself before relaunching. Depending on the sandbox setup, one analysis can generate dozens of mutated samples, which are then fed back into pipelines and threat feeds... 🐢 🐢 🐢

Zombieware doing its thing stuck in a respawn loop…rewriting a mutated copy of itself before relaunching. Depending on the sandbox setup, one analysis can generate dozens of mutated samples, which are then  fed back into pipelines and threat feeds...
🐢
   🐢
      🐢
Willi Ballenthin (@williballenthin) 's Twitter Profile Photo

IDA has a plugin manager now! I hope this makes it so much easier for you to try new extensions, like after the Plugin Contest. hex-rays.com/blog/introduci…