Ole André V. Ravnås (@oleavr) 's Twitter Profile
Ole André V. Ravnås

@oleavr

Creator of Frida. Security Researcher at NowSecure. Polyglot hacker passionate about reverse-engineering and dynamic instrumentation.

ID: 24262669

linkhttps://frida.re/ calendar_today13-03-2009 21:50:27

4,4K Tweet

6,6K Takipçi

1,1K Takip Edilen

NowSecure (@nowsecuremobile) 's Twitter Profile Photo

Go behind the scenes with @Fridadotre creator Ole André V. Ravnås to learn about the hard work entailed in achieving iOS 17 support in Frida & peep code examples for interacting directly with Apple device-side APIs. #Frida loom.ly/nUccYIg 14

Go behind the scenes with @Fridadotre creator <a href="/oleavr/">Ole André V. Ravnås</a> to learn about the hard work entailed in achieving iOS 17 support in Frida &amp; peep code examples for interacting directly with Apple device-side APIs. #Frida
loom.ly/nUccYIg 14
NowSecure (@nowsecuremobile) 's Twitter Profile Photo

With full iOS 17 support, new CoreDevice protocols and forward-looking iOS 18 readiness, the @Fridadotre OSS project is more powerful than ever. Learn how those enhancements came about from Frida creator @Oleavr. #Frida #iOS18 loom.ly/nUccYIg 14

With full iOS 17 support, new CoreDevice protocols and forward-looking iOS 18 readiness, the @Fridadotre OSS project is more powerful than ever. Learn how those enhancements came about from Frida creator @Oleavr. #Frida #iOS18
loom.ly/nUccYIg 14
Matt Brown (@nmatt0) 's Twitter Profile Photo

New video and blog post about bypassing cert pinning using Frida and proxying mobile app traffic using Caido. ✍️📹 This is all for my latest #IoT #hacking project: a BLE body composition scale 🧐 Stay tuned for some BLE hacking fun 😎 youtu.be/GvRi7chKMPI

Frida (@fridadotre) 's Twitter Profile Photo

Frida 16.5.0 is out! 🎉 frida.re/news/2024/09/0… Check out the release notes for a fun walkthrough of how to use the new watchpoint support to work out how to run your own code when bullets are fired in id Software's amazing DOOM 2024 re-release 🥳

Frida (@fridadotre) 's Twitter Profile Photo

frida-tools 12.5.1 is out 🎉 This one fixes frida-trace being slow when handlers need to be generated for C-style targets. It was due to manpage lookups, where one subprocess got spawned per target. We now scan the manpage directories up front, and all parsing happens in-process.

NowSecure (@nowsecuremobile) 's Twitter Profile Photo

🔍 Dive deep into iOS system library reversing with #Radare2! In Part 2 of our blog series, mrmacete reveals how to find cross references within a single library in the dyld shared cache. #ReverseEngineering @Radareorg loom.ly/oNiEI0c

🔍 Dive deep into iOS system library reversing with #Radare2! In Part 2 of our blog series, <a href="/bezjaje/">mrmacete</a> reveals how to find cross references within a single library in the dyld shared cache. #ReverseEngineering @Radareorg 
loom.ly/oNiEI0c
NowSecure (@nowsecuremobile) 's Twitter Profile Photo

🔍 Ready for the final dive into iOS system library reversing? In Part 3 of our series from mrmacete we explore cross-references across DYLD cache libraries, uncovering advanced techniques and performance trade-offs. @Radareorg #ReverseEngineering #Radare2 loom.ly/giYzq7g

🔍 Ready for the final dive into iOS system library reversing? In Part 3 of our series from <a href="/bezjaje/">mrmacete</a> we explore cross-references across DYLD cache libraries, uncovering advanced techniques and performance trade-offs. @Radareorg #ReverseEngineering #Radare2
loom.ly/giYzq7g
radare (@radareorg) 's Twitter Profile Photo

. 🔥 🔥 🔥 🎟️ 🎟️ 🎟️ 🔥 🔥 🔥 #r2con2024 tickets are finally available! 🔥 🔥 🔥 🎟️ 🎟️ 🎟️ 🔥 🔥 🔥 radare.org/con/2024/

Axelle Ap. @cryptax @mastodon.social (@cryptax) 's Twitter Profile Photo

r2ai solves my CrackMe in a few seconds. The solution is both elegant and educational. cryptax.medium.com/cracking-my-ow… + recommend: youtube.com/watch?v=UxE5GN… #r2con #radare2 #AI #crackme #CTF

r2ai solves my CrackMe in a few seconds. The solution is both elegant and educational.

cryptax.medium.com/cracking-my-ow…

+ recommend: youtube.com/watch?v=UxE5GN… 

#r2con #radare2 #AI #crackme #CTF
radare (@radareorg) 's Twitter Profile Photo

r2frida-5.9.8 is out! 🔹Support for hardware breakpoints and watchpoints 🔹Adds the new :ies command to enumerate app entrypoints 👉 More details: github.com/nowsecure/r2fr… #frida #radare2 #r2frida #reverseengineering

NowSecure (@nowsecuremobile) 's Twitter Profile Photo

AI-powered decompilation is here. radare creator walks through using r2ai to reverse engineer mobile apps, boosting efficiency & reducing the learning curve. #Radare #ReverseEngineering #AI loom.ly/dII6FD8

AI-powered decompilation is here. <a href="/radareorg/">radare</a> creator walks through using r2ai to reverse engineer mobile apps, boosting efficiency &amp; reducing the learning curve. #Radare #ReverseEngineering #AI
loom.ly/dII6FD8
Frida (@fridadotre) 's Twitter Profile Photo

Attending FOSDEM 2025 this weekend? Let's try to get an informal Frida meetup set up! Join our fosdem channel on Discord to coordinate. (Link to follow.)

Frida (@fridadotre) 's Twitter Profile Photo

Frida 16.7.0 is out w/ brand new APIs for observing the lifecycles of threads and modules, a profiler and multiple samplers for measuring cycles/time/etc., MemoryAccessMonitor providing access to thread ID and registers, and more 🎉