87 Followers
51 Following
69 Posts
Security engineer, interested in mobile hacking, reversing and exploiting stuff....
#r2con2025 is back Oct 24–25, this time fully virtual! Expect talks on #mobilesecurity, malware analysis, AI-assisted RE, and more. It's not too late to be part of the agenda, the CFP is open until Oct 12! More details: https://loom.ly/eFyEuVY #radare @pancake @grepharder

Do you want to start using @radareorg and don’t know how to start? This is a good starting point where you have good autogenerated documentation from the latest changes from the repository:

https://deepwiki.com/radareorg/radare2

radareorg/radare2 | DeepWiki

Radare2 (r2) is a comprehensive open-source reverse engineering framework that provides a set of libraries, tools, and plugins for binary analysis, disassembly, debugging, and manipulation. It began a

DeepWiki

Here you can find the slides of my adventure playing with Unity Games on iOS with #r2Frida in the #r2con2024.

Enjoy!

https://github.com/radareorg/r2con2024/blob/main/day2-talks/1540-r2con2024-ReversingUnity-murphy.pdf

r2con2024/day2-talks/1540-r2con2024-ReversingUnity-murphy.pdf at main · radareorg/r2con2024

Contribute to radareorg/r2con2024 development by creating an account on GitHub.

GitHub
Hope I can give you more details on inactivity reboot in ~4 days 🤞
Kicking off #r2con2024 with @oleavr considered one of the best hackers talking about its new @radareorg integration on Frida! @fridadotre
Enjoying how @travisgoodspeed breaks chips in the #r2con2024. As always, it’s a pleasure to have real hacker minds besides you.
@radareorg

#r2con2024 is happening!

First workshop with @sha0coder fully-booked! Do not hesitate to say hello if you are around!

@radareorg
@fridadotre

The venue is ready for #r2con2024! What about you? 😎

After so much testing with different prompts and models, ended up wording a good query for decompiling with r2ai/decai.

The first screenshot shows the result for: Claude3.5, Gpt4o and Qwen2.5 (local) for a password checking function in Swift.

The second one is from r2ghidra, but GHIDRA/IDA/BN results are at the same level of uselessness

#radare2 #llm #ai #reverseengineering #swift

Great quizz by @therealsaumil on ARM64. What value will there be in x19, x20 etc after those instructions.
Pay attention to when the stack pointer is modified (before, after or not).

@hack_lu workshop