jk42 (@jkfourtwo) 's Twitter Profile
jk42

@jkfourtwo

42!

ID: 812449727727935488

calendar_today24-12-2016 00:08:04

1,1K Tweet

154 Followers

479 Following

Duncan Ogilvie 🍍 (@mrexodia) 's Twitter Profile Photo

Got sick of the bloat in the Python MCP server ecosystem and decided to write my own. Turns out you can fit everything you need in less than 1k lines of code. For reference: FastMCP is around 40kloc, excluding dependencies 🤯

Got sick of the bloat in the Python MCP server ecosystem and decided to write my own. Turns out you can fit everything you need in less than 1k lines of code.

For reference: FastMCP is around 40kloc, excluding dependencies 🤯
Lenny Zeltser (@lennyzeltser) 's Twitter Profile Photo

The new REMnux MCP server lets AI analyze malware using the REMnux toolkit. I was surprised at the depth of investigation it delivers. Most of my time went into capturing how I approach malware analysis and providing AI the right guidance at the right time, so it can think and

ricochet (@mkovavoda) 's Twitter Profile Photo

omill - experimental deobfuscator based on the SATURN paper, utilizing remill to lift instructions from machine code into LLVM IR, and deobfuscating this code for recompilation. It also implements a small OLLVM-style obfuscator to fuzz against. Built with Claude . It

Jiří Vinopal (@vinopaljiri) 's Twitter Profile Photo

I recommend reading this, it's very decent content 💙 Thank you Thomas Roccia 🤘 my friend for sharing this valuable content! 🙏 But read it all, slowly, carefully — the title is strong and some can just skim and leave thinking reverse engineering is dead, replaced by AI… which is not

Josh Reynolds (jmag) (@jershmagersh) 's Twitter Profile Photo

There's a lot of talk currently about reverse engineering with LLMs, I encourage folks to check out my keynote from September where I spoke about their applicability/limitations with malware analysis youtu.be/tLR_hHQVkOk LLMs have improved but the core principles still apply.

Hex-Rays SA (@hexrayssa) 's Twitter Profile Photo

⚡Check out what we have in store for IDA in 2026... We’re expanding technical depth, improving performance, strengthening collaboration, and introducing a new generation of scalable RE tools. Read our 2026 Product Vision: hex-rays.com/blog/2026-prod…

⚡Check out what we have in store for IDA in 2026...

We’re expanding technical depth, improving performance, strengthening collaboration, and introducing a new generation of scalable RE tools.

Read our 2026 Product Vision: hex-rays.com/blog/2026-prod…
Alexandre Borges (@ale_sp_brazil) 's Twitter Profile Photo

I am excited to release the seventh article in the Exploiting Reversing Series (ERS). Titled “Exploitation Techniques | CVE-2024-30085 (part 01)” this 119-page technical guide offers a comprehensive roadmap for vulnerability exploitation: exploitreversing.com/2026/03/04/exp… Key features of

I am excited to release the seventh article in the Exploiting Reversing Series (ERS). Titled “Exploitation Techniques | CVE-2024-30085 (part 01)” this 119-page technical guide offers a comprehensive roadmap for vulnerability exploitation:

exploitreversing.com/2026/03/04/exp…

Key features of
allthingsida (@allthingsida) 's Twitter Profile Photo

Sharing this repo where I plan to keep posting Vibe-Reverse Engineered (with idasql) targets. A few more targets in the way, dealing with more obfuscation and what not. No rocket science just basic scenarios. github.com/0xeb/vibe-re/

ringzerø.training && @ringzer0@infosec.exchange (@_ringzer0) 's Twitter Profile Photo

Rust binaries aren’t C binaries. Learn modern reversing techniques from Cindy Xiao (RECon / RE//verse / NorthSec speaker, founder of Decoder Loop). Deconstructing Rust Binaries March 2026 • Virtual 🔗 ringzer0.training/countermeasure…

Seongsu Park (@unpacker) 's Twitter Profile Photo

While the use of AI in cyber operations isn't brand new, Microsoft’s latest blog reveals just how deeply threat actors are embedding AI into their daily workflows. Of particular note are DPRK threat actors, who are aggressively adopting AI as a "force multiplier" across the

While the use of AI in cyber operations isn't brand new, Microsoft’s latest blog reveals just how deeply threat actors are embedding AI into their daily workflows.

Of particular note are DPRK threat actors, who are aggressively adopting AI as a "force multiplier" across the
Jiří Vinopal (@vinopaljiri) 's Twitter Profile Photo

#IDA Pro tip 🤙 ApplyCalleeTypeEx — ApplyCalleeType is Reborn 🔥 — — — IMO one of the most practically useful IDA plugins ever written. It died on IDA 9.x. Not anymore. Rebuilt from scratch — compatible IDA 8.x → 9.3+. github.com/Dump-GUY/Apply… — — — What's new: ✅ IDA 9.3 ready +

Moritz (@m_r_tz) 's Twitter Profile Photo

Speakeasy emulator v2b1 is here! 🚀 Massive upgrade thanks to Willi Ballenthin. Modernized codebase using Unicorn 2. Now handles complex multi-stage unpacking and deep system introspection. API traces on par with sandbox analysis. github.com/mandiant/speak… pypi.org/project/speake…

Josh Stroschein | The Cyber Yeti (@jstrosch) 's Twitter Profile Photo

⏪Dynamic analysis has come a long way. Time-travel debugging (TTD) is a great example - it allows you to query execution information instead of relying on break/resume to find what you are looking for! - Full OS interaction - Forwards/backwards navigation from the trace -

Volexity (@volexity) 's Twitter Profile Photo

.Volexity recently released GoResolver v1.4, bringing significant updates to our #opensource tool for recovering symbol data from obfuscated Go binaries. This release is available on GitHub: github.com/volexity/GoRes… [1/8]

Alex Matrosov (@matrosov) 's Twitter Profile Photo

This is a very interesting piece of research by the team on algorithmic methods for effective complex type recovery. Practical type inference is a challenging problem the industry has been grappling with for years. paper: arxiv.org/abs/2603.08225 blog: binarly.io/blog/type-infe…

This is a very interesting piece of research by the team on algorithmic methods for effective complex type recovery.

Practical type inference is a challenging problem the industry has been grappling with for years.

paper: arxiv.org/abs/2603.08225
blog: binarly.io/blog/type-infe…
Eduardo Novella (@enovella_) 's Twitter Profile Photo

Syscall Tracer🔥🔥 Sometimes it’s useful to observe the system calls happening inside a given target process. Especially if the target includes some kind of Frida detection, root detection, or any other kind of Runtime Application Self-Protection (RASP). frida.re/news/2026/03/0…

Syscall Tracer🔥🔥
Sometimes it’s useful to observe the system calls happening inside a given target process. Especially if the target includes some kind of Frida detection, root detection, or any other kind of Runtime Application Self-Protection (RASP).
frida.re/news/2026/03/0…