Erika Noerenberg gutterchurl@infosec.exchange (@gutterchurl) 's Twitter Profile
Erika Noerenberg [email protected]

@gutterchurl

malware and kittens, basically. she/her

ID: 76923611

calendar_today24-09-2009 12:09:05

9,9K Tweet

2,2K Followers

2,2K Following

Vector 35 (@vector35) 's Twitter Profile Photo

Binary Ninja 5.0 has major upgrades for firmware analysis! Firmware Ninja is now built into Ultimate, with entropy analysis, memory insights, and automatic board detection. Hex formats like IHEX and SREC are now supported natively, and SVD file loading includes full structure and

Binary Ninja 5.0 has major upgrades for firmware analysis! Firmware Ninja is now built into Ultimate, with entropy analysis, memory insights, and automatic board detection. Hex formats like IHEX and SREC are now supported natively, and SVD file loading includes full structure and
Objective-See Foundation (@objective_see) 's Twitter Profile Photo

Stoked to announce the #OBTS v8 trainings! 🔗 objectivebythesea.org/v8/trainings.h… This year we’ve expanded adding 2 brand-new trainings: 1️⃣ "*OS – Security & Insecurity" by Jonathan Levin 2️⃣ "AI for Mac Security" by Dr. Kimo Bumanglag (of OpenAI) Trainings always sell out — sign up today!

Vector 35 (@vector35) 's Twitter Profile Photo

With 5.0, we’re open sourcing one of the oldest components of Binary Ninja: the Shellcode Compiler. It’s powered countless Compile C Source dialogs over the years, and now it’s yours to tinker with. Long term, we’re eyeing LLVM as a modern replacement. binary.ninja/2025/04/23/5.0…

With 5.0, we’re open sourcing one of the oldest components of Binary Ninja: the Shellcode Compiler. It’s powered countless Compile C Source dialogs over the years, and now it’s yours to tinker with. Long term, we’re eyeing LLVM as a modern replacement. binary.ninja/2025/04/23/5.0…
Patrick Wardle (@patrickwardle) 's Twitter Profile Photo

🎙️😍 Was stoked to talk nerdy on the Mac Admins Podcast! If you're interested in macOS malware, Apple security & detection, and much more, have a listen: linkedin.com/feed/update/ur…

Vector 35 (@vector35) 's Twitter Profile Photo

One of the coolest new things in Binary Ninja 5.1? Pseudo Objective‑C. Huge shoutout to Mark Rowe, who actually wrote this before joining the team (talk about an overkill job application). If you’re digging into iOS, Swift, or kernelcaches, this one’s a game‑changer.

One of the coolest new things in Binary Ninja 5.1? Pseudo Objective‑C. Huge shoutout to <a href="/bdash/">Mark Rowe</a>, who actually wrote this before joining the team (talk about an overkill job application). If you’re digging into iOS, Swift, or kernelcaches, this one’s a game‑changer.
Objective-See Foundation (@objective_see) 's Twitter Profile Photo

Move over DJs! The nerds of #OBTS will soon be taking over the stage in Ibiza! 🎧➡️💻 Even the local press took notice (much to our surprise!): lavozdeibiza.com/ibiza/iphone-y… 🎟️ P.S. But we're close to selling out, w/ only 10 tickets left for #OBTS v8. Don’t wait to get yours!

Mussy (@mu55sy) 's Twitter Profile Photo

Alohaaaa 🌴 Just ran into Patrick right before #OBTS kicked off — man’s got the calm of a monk and the brain of a Mac exploit 😮‍💨💻 Conference hasn’t even started and it’s already elite vibes. Let’s gooo 🤙🔥

Alohaaaa 🌴 Just ran into Patrick right before #OBTS kicked off — man’s got the calm of a monk and the brain of a Mac exploit 😮‍💨💻

Conference hasn’t even started and it’s already elite vibes. Let’s gooo 🤙🔥
Csaba Fitzl (@theevilbit) 's Twitter Profile Photo

The slidedeck to our talk, Crash One: A Starbucks Story - CVE-2025-24277, with Gergely Kalman from Hexacon and Objective-See Foundation #OBTS is available from the link below. It was a macOS vulnerability impacting the crash reporting process where we could achieve LPE and sandbox

Trail of Bits (@trailofbits) 's Twitter Profile Photo

Today (4:00 PM GMT+2) Objective-See Foundation: Paweł Płatek shows a user-to-root exploit on modern macOS by chaining bugs in mDNSResponder and traceroute6. Learn new libmalloc exploitation techniques and PAC bypass methods. objectivebythesea.org/v8/

Today (4:00 PM GMT+2) <a href="/objective_see/">Objective-See Foundation</a>: Paweł Płatek shows a user-to-root exploit on modern macOS by chaining bugs in mDNSResponder and traceroute6. Learn new libmalloc exploitation techniques and PAC bypass methods. 
objectivebythesea.org/v8/
Erika Noerenberg gutterchurl@infosec.exchange (@gutterchurl) 's Twitter Profile Photo

Starting to think I should have made #OBTS bingo cards - I don’t think I’ve ever heard a speaker use the phrase “bee’s knees” before 😹 Sharvil Shah dropping some jokes along with FSKit knowledge ❤️

Starting to think I should have made #OBTS bingo cards - I don’t think I’ve ever heard a speaker use the phrase “bee’s knees” before 😹
<a href="/sharvil/">Sharvil Shah</a> dropping some jokes along with FSKit knowledge ❤️