[RSS] Building a Custom Architecture and Platform: Part 3
binary.ninja ->
#BinaryNinja
Original->
Latest posts tagged with #binaryninja on Bluesky
[RSS] Building a Custom Architecture and Platform: Part 3
binary.ninja ->
#BinaryNinja
Original->
Recently my RE workflow moved into sandboxed VMs where agents have full control over the environment. I needed an MCP server that runs headless in the same sandbox and exposes way more of the #BinaryNinja API than others.
Here's the release: github.com/mrphrazer/bi...
Alt text TBD, sorry!
After some unexpectedly painful test&debug sessions I'm publishing my #REshare exporter for #BinaryNinja:
github.com ->
Sine Binary Ninja supports importing Ghidra projects, technically there is now a conversion path between three major
1/2
[RSS] Building a Custom Architecture and Platform: Part 2
binary.ninja ->
#BinaryNinja
Original->
[RSS] Building a Custom Architecture and Platform: Part 1
binary.ninja ->
#BinaryNinja
Original->
Crackmes.one Reverse Engineering CTF starts in about three hours! Win #BinaryNinja and #WinRar licenses!
#ReverseEngineering #Crackmes
Decrypted/decoded a payload/binary using the Transform API in #BinaryNinja, but need a place to put it: use this to save it to your current project:
current_project.create_file(decoded_bytes, name="extracted.bin", folder=None, description="Extracted from: <insert hash of current file>")
Alt text TBD, sorry!
#REshare exporter for #BinaryNinja is getting into shape! A sane API and good documentation made a world of difference, but of course I found a bit in the type system that required some hacks :)
github.com ->
Code coming next week after some more testing.
1/2
scrapco.de ->
I'm still looking for contributors, esp. on the #radare2 and #BinaryNinja side!
2/2
Original->
#BinYars (write #YARA-X rules inside of #BinaryNinja) is now available in Binja's plugin manager!
I want to give a special shout out to @cxiao.net (Thank You 🙏) who provided valuable feedback making the plugin experience better.
Happy rule writing!
Learn more @ github.com/xorhex/BinYars
As tempting as it might be, don’t use recursion when writing a #binaryninja workflow.
I might need to find some bug bounty matching up with the price of that fw including ("Ultimate") version of #BinaryNinja.
It does look quite enticing.
Happy to share that later today (Friday, Nov 14, at 10:00 PM CET / 16:00 ET), I’ll be live on the #BinaryNinja livestream to talk about (anti-)reverse engineering & code (de)obfuscation. I'll also showcase some of my plugins.
www.youtube.com/watch?v=GQtX...
The slides and materials from @cxiao.net's "Reversing a (not-so-) Simple Rust Loader" workshop at Ringzer0 COUNTERMEASURE today are now available! github.com/decoderloop/...
#rustlang #ReverseEngineering #MalwareAnalysis #infosec #reversing #malware #binaryninja #COUNTERMEASURE25 #ringzer0
Still testing 🤞
For those able to use #BinaryNinja projects; #BinYars can sort the files into folders based upon the #Yara-X rule metadata field, BNFolder. The folder nesting structure is determined by the number of matches that reside under each folder - check out the video below!
me that this goal is worth pursuing.
I'm looking for contributors, esp. for #BinaryNinja, #IDA and #radare2 scripting so we can bring all these worlds together!
2/2
Original->
It's getting close to being done - #BinYars a #YARA-X #BinaryNinja plugin! Still testing, but plan on open sourcing it for all to use.
Shout out to Remco Sprooten for making this tool (also shown in the video) for quickly drafting Yara rules 💪 github.com/1337-42/Simp...
Video: Part 1 of 2
The recording of our (CC @nicolo.dev ) talk "Breaking Mixed Boolean-Arithmetic Obfuscation in Real-World Applications" at @reconmtl.bsky.social is now online!
Recording: www.youtube.com/watch?v=QxSG...
Slides: synthesis.to/presentation...
#BinaryNinja Plugin: github.com/mrphrazer/ob...
The new version of my #BinaryNinja plugin Obfuscation Analysis (v1.2) adds recursive function inlining in the decompiler.
It collapses call-heavy code into a single function; analysis, constant propagation, DCE and other analyses work across boundaries.
github.com/mrphrazer/ob...
Why is it so hard to get software over the last mile stone to make it usable for more than just me? I've a new #BinaryNinja ( #yarax ) plugin sitting in the wings needing to be polished for release and another release of #BinjaExtras with additional features close, but not close enough for release.
I’m forcing myself to learn #BinaryNinja, and using an LLM to search through the user manual and learn the basics is a game changer. Questions about fonts, theming, basic shortcuts, and considerations coming from IDA all answered easily.
New #BinaryNinja plugin: Obfuscation Analysis
Simplifies arithmetic obfuscation (MBA) directly in the decompiler (see demo below). Also identifies functions with corrupted disassembly.
Co-authored by @nicolo.dev; available in the plugin manager.
github.com/mrphrazer/ob...
[RSS] Fixing Decompilation of Stack Clash Protected Binaries
intrigus.org ->
#Ghidra #BinaryNinja #ReverseEngineering
Original->
Before: Decompilation of Objective-C code with minimal language-specific analysis
After: Decompiled Objective-C code with language-specific analysis and transformations applied, displayed as pseudo-Objective-C
Crazy thought… what if your decompiled Objective-C code looked like Objective-C code?
Today's journey: implementing an Objective-C “pseudo-language” view for Binary Ninja.
#binaryninja #reverseengineering #objectivec
Before: decompilation of an Objective-C class initializer showing the results given by Binary Ninja out of the box. Retain / release calls clutter the function and the lifted code that initializes instance variables does not make any sense due to missing type information.
After: Decompilation of the same function, but with retain / release calls removed and the type of [super init] propagated to the local variable. As a result, access to instance variables are correctly recognized and field names are displayed.
Before: decompilation of an Objective-C function showing the results given by Binary Ninja out of the box. Reference counting function calls clutter the code so much that it’s hard to see the actual structure of the code.
After: The same Objective-C function but with reference counting function calls hidden. The structure of the function is clear!
I've been experimenting with improving Binary Ninja's analysis of Objective-C. By hiding reference counting calls and applying types based on [super init] and objc_alloc_init calls, the structure of the decompiled code becomes clearer.
github.com/bdash/bn-obj...
#binaryninja #reverseengineering
Control Flow Hijacking via Data Pointers
CC: Jordan Jay
www.legacyy.xyz/defenseevasi...
#infosec #hijacking #windows #binaryninja #reverseengineering
At @reconmtl.bsky.social, @nicolo.dev and I discuss the current state of MBA (de)obfuscation and their applications. We’ll also introduce a new #BinaryNinja plugin for simplifying MBAs in the decompiler.
Details: cfp.recon.cx/recon-2025/f...
I'll also give a training: recon.cx/2025/trainin...
New heuristic in my #BinaryNinja plugin obfuscation_detection:
Duplicated Subgraphs uses iterative context hashing to spot repeated multi-block code. We merge each block’s signature with its successors over multiple rounds for efficiency.
Link: github.com/mrphrazer/ob...
A 🦄 is coming soon to #BinjaExtras
#binaryninja