My PR to Binary Ninja to provide a “Pseudo Objective-C” representation of decompiled code was merged and is available in the latest 5.1-dev builds. For best results, use in conjunction with https://github.com/bdash/bn-objc-extras to hide Obj-C memory management noise and propagate more type information.

#binaryninja #reverseengineering #objectivec
https://social.bdash.net.nz/@mrowe/114468984084790336

GitHub - bdash/bn-objc-extras: Experimental improvements to Objective-C analysis for Binary Ninja

Experimental improvements to Objective-C analysis for Binary Ninja - bdash/bn-objc-extras

GitHub

New #BinaryNinja plugin: Obfuscation Analysis

Simplifies arithmetic obfuscation (MBA) directly in the decompiler (see demo below). Also identifies functions with corrupted disassembly.

Co-authored by @nicolodev ; available in the plugin manager.

Check it out: https://github.com/mrphrazer/obfuscation_analysis

#reverseengineering #malware #cybersecurity

#binaryninja doing the math for me

I managed to finally get BYUCTF's pwn/MIPS going. Ghidra gave me a wrong value for __stack_chk_guard and also didn't tell me about it being a pointer. Binary Ninja helped (but had some other issues).

I have updated my writeup, FWIW:
http://www.feyrer.de/redir/BYUCTF2025-Writeup.html

#BYUCTF #ctf #cybersecurity #ghidra #binja #binaryninja @binaryninja

Fixing Decompilation of Stack Clash Protected Binaries

How to fix decompilation when everything looks ugly, because stack probing breaks stack pointer tracking.

Intrigus' Security Lab

Crazy thought… what if your decompiled Objective-C code looked like Objective-C code?

Today's journey: implementing an Objective-C “pseudo-language” view for Binary Ninja.

#binaryninja #reverseengineering #objectivec

My plug-in providing this additional analysis is available at https://github.com/bdash/bn-objc-extras

#binaryninja #objectivec #reverseengineering

GitHub - bdash/bn-objc-extras: Experimental improvements to Objective-C analysis for Binary Ninja

Experimental improvements to Objective-C analysis for Binary Ninja - bdash/bn-objc-extras

GitHub

I've been experimenting with improving Binary Ninja's analysis of Objective-C code recently. Having the ability to hide Obj-C runtime reference counting calls, and apply type information based on [super init] and objc_alloc_init calls can dramatically improve the readability (and in some cases even accuracy!) of the decompiled code.

https://github.com/bdash/bn-objc-extras

#binaryninja #objectivec #reverseengineering

GitHub - bdash/bn-objc-extras: Experimental improvements to Objective-C analysis for Binary Ninja

Experimental improvements to Objective-C analysis for Binary Ninja - bdash/bn-objc-extras

GitHub
Control Flow Hijacking via Data Pointers

When performing process injection, one of the most important IOCs that make up behavioural signatures is passing execution to our shellcode. Whilst there are multiple techniques to doing so and this is certainly nothing purely “new” - in this post I want to showcase not just a “new proof-of-concept technique”, but the entire process I went through in hope that this can become a proper addition to a capability developer’s skill set.

Legacyy

🔍 Introducing MCP Server for Binary Ninja: Connect your AI assistants directly to @binaryninja for powerful reverse engineering! Get pseudo code, analyze functions, rename symbols, and more—all through the Model Context Protocol. Works with Claude Desktop, Cherry Studio and any other MCP Clients.

https://github.com/MCPPhalanx/binaryninja-mcp
#ReverseEngineering #BinaryNinja #LLM #MCP #AI

GitHub - MCPPhalanx/binaryninja-mcp: MCP Server for Binary Ninja

MCP Server for Binary Ninja. Contribute to MCPPhalanx/binaryninja-mcp development by creating an account on GitHub.

GitHub