's Avatar

@pinkflawd

367
Followers
133
Following
183
Posts
26.11.2024
Joined
Posts Following

Latest posts by @pinkflawd

I came across another simple no-name Linux espionage RAT by coincidence and starting to wonder what else we're missing in that space 👀

11.03.2026 03:56 👍 4 🔁 0 💬 1 📌 0
Post image

En route to Orlando 😱 #REverse2026 #Squeee

28.02.2026 21:14 👍 3 🔁 0 💬 0 📌 0
C++ exception handling ABI Updated in 2024-11. I wrote an article a few weeks ago to introduce stack unwinding in detail. Today I will introduce C++ exception handling, an application of stack unwinding. Exception handling has

Another gem, here is all you ever wanted to know about Itanium C++ ABI exception handling and how its implemented in Linux C++ binaries maskray.me/blog/2020-12...

23.02.2026 19:20 👍 3 🔁 0 💬 0 📌 0
Preview
Black Hat USA 2026 Briefings

BlackHat US Call for Paper is open, and we're eagerly awaiting your submissions! I'm proud to be shepherding the Reverse Engineering track again this year and I'll be actively soliciting for cool research 😏😏😏
usa-briefings-cfp.blackhat.com

21.02.2026 00:41 👍 7 🔁 4 💬 1 📌 0
Post image

Randomly came across this downloader, which seems to want to download and built itself some kernel rootkit. The internet suggests this malware belongs to some relatively recent FnOS attack campaign on Feiniu private cloud. Tell me again Linux malware is boring.

19.02.2026 22:27 👍 8 🔁 1 💬 0 📌 0
Post image

My note taking pencil for the serious notes!

18.02.2026 17:50 👍 4 🔁 0 💬 0 📌 0
Analyzing The Simplest C++ Program CS & Math Stuff

This is a phenomenal little blog post about Linux C++ binary analysis ❤️❤️❤️
oneraynyday.github.io/dev/2020/05/...

11.02.2026 18:08 👍 5 🔁 1 💬 0 📌 0

And I've got to look whether that has been visualization in a graph yet 🤓

10.02.2026 06:15 👍 0 🔁 0 💬 0 📌 0

Id need to look but I'm almost sure this has been done, I'm curious now though. It also has to be a hard problem since not all paths are deterministic statically. Anyhow, have you looked into symbolic execution? One can mathematically determine the flow of data through a program.

10.02.2026 06:14 👍 0 🔁 0 💬 1 📌 0

Interesting, pathfinder as in data flow analysis, as in depending on input code takes said path through a given function? My scripts are definitely not advanced enough, but I believe there is prior research in that direction, and additional I'd think that a higher level representation would help

09.02.2026 22:32 👍 0 🔁 0 💬 1 📌 0
Post image

Mini blog: I promised I'd publish the binary pewpew project I created with the help of Claude, and here we are, blog with link to Github. Works-on-my-machine type of project ;)
hackandcheese.com/posts/blog2_...

09.02.2026 19:42 👍 2 🔁 0 💬 1 📌 0

Ok weird stuff. I have a flat earther in my family and am genuinely puzzled. Torn between plain curiosity, screaming at them for ignoring physics, and really worried for their future. What.. does one do with these people?

06.02.2026 22:57 👍 2 🔁 0 💬 0 📌 0

Save the date! @blackhoodie.bsky.social is coming to Luxembourg! On May 6th we're partnering with #BSidesLuxembourg for a day of binary fun and joy 🥳🥳🥳

04.02.2026 15:02 👍 8 🔁 6 💬 0 📌 0

Maaaaan GCC for 32-bit Intel really didn't like push instructions huh

03.02.2026 15:55 👍 0 🔁 0 💬 0 📌 0

Omg that could be two bestsellers 😱

03.02.2026 07:19 👍 1 🔁 0 💬 0 📌 0

The cathartic effect of reverse engineering without a business objective should have its own therapy book.

02.02.2026 13:27 👍 7 🔁 0 💬 2 📌 0

Its a function of a piece of malware, the graph is the flow graph of the function, and the fact that there are so many branches indicates code obfuscation :)

17.01.2026 23:31 👍 0 🔁 0 💬 0 📌 0

😍😍😍

17.01.2026 02:49 👍 0 🔁 0 💬 0 📌 0
Preview
New LockBit 5.0 Targets Windows, Linux, ESXi Trend™ Research analyzed source binaries from the latest activity from notorious LockBit ransomware with their 5.0 version that exhibits advanced obfuscation, anti-analysis techniques, and seamless cr...

Totally, this one was 4dc06ecee904b9165fa699b026045c1b6408cc7061df3d2a7bc2b7b4f0879f4d, from this blog post www.trendmicro.com/en_us/resear..., and they list some more hashes, link at the very bottom!
Keep me posted if you find anything interesting, Im short on time for fun projects these days 😭

17.01.2026 02:46 👍 1 🔁 0 💬 0 📌 0
Post image

I've only spent a hot 5 min, but the level of obfuscation in the September version of Lockbit for Linux is marvelous

16.01.2026 19:29 👍 4 🔁 0 💬 2 📌 0

Do Windows sandboxes these days run full blown Win11? Asking for a friend; a friend who's been waiting for their Win11 VM to update and is bored out of their mind.

15.01.2026 20:12 👍 1 🔁 0 💬 0 📌 0

Wow Claude, that input was supposed to go to this API, not THAT one; that loop counter really didn't need increasing here; and this sanitization check returns a value ffs

14.01.2026 18:45 👍 0 🔁 0 💬 0 📌 0
Post image

HAPPY FRIDAY!!! Our Agenda is now live! Check it out!
Check it out: www.districtcon.org/speakers

09.01.2026 15:13 👍 16 🔁 12 💬 3 📌 1
Binary Ninja Live Stream: Nov 7th, 2025
Binary Ninja Live Stream: Nov 7th, 2025 YouTube video by VECTOR 35

In November I joined @elykdeer.bsky.social on the @binaryninja.bsky.social podcast to chat about Linux malware reverse engineering, advances in analysis tools, and my upcoming training at RE//verse conference. Check out the recording!
www.youtube.com/watch?v=R72m...

07.01.2026 19:07 👍 2 🔁 0 💬 0 📌 0
Blackhoodie at DistrictCon 2026 Why, hello! BlackHoodie is super excited to be partnering with DistrictCon in 2026, bringing a day of vulnerability hunting in binaries toWashington DC! Come join us for an exciting day of reverse eng...

We still have seats open for @blackhoodie.bsky.social at @districtcon.bsky.social on January 23rd in Washington DC! The class will be reverse engineering their way through an integer overflow bug in libpng 🤓
blackhoodie.re/DistrictCon2...

05.01.2026 17:15 👍 7 🔁 8 💬 0 📌 0

Im on all platforms these days, it drives me nuts, but I miss my people, so

04.01.2026 05:23 👍 2 🔁 0 💬 0 📌 0
Post image

👀

03.01.2026 23:36 👍 423 🔁 126 💬 0 📌 9

Wag The Dog wasn't supposed to be a documentary..

03.01.2026 20:49 👍 0 🔁 0 💬 0 📌 0
Blackhoodie at DistrictCon 2026 Why, hello! BlackHoodie is super excited to be partnering with DistrictCon in 2026, bringing a day of vulnerability hunting in binaries toWashington DC! Come join us for an exciting day of reverse eng...

Squeee so excited 😍😍😍 @blackhoodie.bsky.social will be at @districtcon.bsky.social next year, on January 23rd @synapticrewrite.bsky.social and I will teach a day of Reverse Engineering for Vulnerability Discovery, registration is now open blackhoodie.re/DistrictCon2...

12.12.2025 15:32 👍 8 🔁 6 💬 0 📌 0
Preview
Understanding the Process Environment Block (PEB) for Malware Analysis Analysis of the Key PEB Techniques for Malware Analysis and Reverse Engineering

Wonderful little blog post about the Windows Process and Thread Environment blocks metehan-bulut.medium.com/understandin...

24.12.2025 23:59 👍 2 🔁 1 💬 0 📌 0