Itay Cohen ๐ŸŒฑ (@megabeets_) 's Twitter Profile
Itay Cohen ๐ŸŒฑ

@megabeets_

Animal liberation activist & Reverse Engineer ๐ŸŒŸ Forbes 30 Under 30 โ€ข
Maintainer of Cutter and Rizin โ€ข Leading Research @ Check Point โ€ข
I don't eat animals.

ID: 778521612509409280

linkhttps://www.megabeets.net/ calendar_today21-09-2016 09:09:51

1,1K Tweet

5,5K Followers

516 Following

hasherezade (@hasherezade) 's Twitter Profile Photo

This is a really solid deep dive by my friend and colleague, Itay Cohen ๐ŸŒฑ . If you want to get a well researched perspective on modern hacktivism, you canโ€™t miss it

Takahiro Haruyama (@cci_forensics) 's Twitter Profile Photo

My presentation slides "UEFI Bootkit Hunting: In-Depth Search for Unique Code Behavior" RE//verse are available online github.com/binarly-io/Resโ€ฆ

Itay Cohen ๐ŸŒฑ (@megabeets_) 's Twitter Profile Photo

After almost 7 years, this week marks my last at Check Point (Check Point Research ). Itโ€™s been an incredible journey, working alongside brilliant minds, tackling complex threats, and pushing the boundaries of security research. Grateful for every moment. I will miss you all ๐Ÿฉท

Vector 35 (@vector35) 's Twitter Profile Photo

Announcing Binary Ninja 5.0! Today we're proud to announce the release of Binary Ninja 5.0 (Gallifrey). Here's some highlights: Union Support, Dyld Share Cache & Kernel Cache, Firmware Ninja, Auto Stack Arrays, Stack Structure Type Propagation, and so much more. Check out the

Announcing Binary Ninja 5.0! Today we're proud to announce the release of Binary Ninja 5.0 (Gallifrey). Here's some highlights: Union Support, Dyld Share Cache & Kernel Cache, Firmware Ninja, Auto Stack Arrays, Stack Structure Type Propagation, and so much more. Check out the
CERT Polska (@cert_polska_en) 's Twitter Profile Photo

Do you really enjoy reverse engineering but keep stumbling into heavily obfuscated binary files? We've got you covered! In our latest blog article we look at examples of obfuscation used in #LummaStealer and explain how we can work our way around it! ๐Ÿง cert.pl/en/posts/2025/โ€ฆ

๐™ ๐™€ ๐™‡ ๐™„ ๐™“ ๐™ˆ (@felixm_pw) 's Twitter Profile Photo

With some guidance from DebugPrivilege I've found a way to easily dump clear text implants even while they sleep. Bad day for sleep obfuscation ๐Ÿ’ค blog.felixm.pw/rude_awakeningโ€ฆ

Rizin (@rizinorg) 's Twitter Profile Photo

It's time for dropping a new Rizin release ! - Full migration to rzshell - Search is now multithreaded ๐Ÿš€ - Better Unicode/regex search! - Added Alpha, LoongArch - MIPS, PIC, MSP430, Xtensa, Hexagon RzIL uplifting! github.com/rizinorg/rizinโ€ฆ #rizin #rizinorg

Rizin (@rizinorg) 's Twitter Profile Photo

We are happy to announce the students participating at the #GoogleSummerOfCode You read more about them on the Rizin blog #GSoC2025 #GSoC rizin.re/posts/gsoc-202โ€ฆ

Nadav Lorber (@lnadav) 's Twitter Profile Photo

Joining the MCP trend with windbg-ext-mcp ๐Ÿ›Now you can vibe debugging your Windows kernel: github.com/NadavLor/windbโ€ฆ Example of asking Claude to hide explorer.exe by unlinking it from EPROCESS + PspCidTable: #windbg #mcp

Joining the MCP trend with windbg-ext-mcp ๐Ÿ›Now you can vibe debugging your Windows kernel:
github.com/NadavLor/windbโ€ฆ

Example of asking Claude to hide explorer.exe by unlinking it from EPROCESS + PspCidTable:
#windbg #mcp
Check Point Research (@_cpresearch_) 's Twitter Profile Photo

Zero-Day used by Stealth Falcon APT group in a spear-phishing campaign: ๐Ÿ’ฅ .URL file exploitation (assigned CVE-2025-33053) ๐Ÿงฐ Custom Mythic implants, LOLBins, and custom payloads ๐ŸŒย High-profile targets across the Middle East and Africa research.checkpoint.com/2025/stealth-fโ€ฆ