clearbluejar

208 Followers
43 Following
119 Posts
Security Researcher | Founder @clearseclabs |
Author of #ghidriff | Agentic #PatchDiffing |
Stuck in a loop: Build • Reverse • Learn • Share
twitterhttps://twitter.com/clearbluejar
bloghttps://clearbluejar.github.io/
Reverse Engineering Apple Security Updates

Apple’s security updates have long been a black box. CVE advisories offer vague descriptions, while the actual binary changes remain buried inside massive IPSW firmware images. This talk introduces a hybrid system that combines deterministic tools with agentic (LLM-powered) reasoning to reveal the real fixes behind each advisory. Building on manual patch-diffing techniques presented at Objective by the Sea v7, we’ll show how curated CVE data, IPSW extraction, and function-level diffs can be paired with reasoning agents to correlate binaries, explain mitigations, and classify vulnerabilities. The result is a reproducible pipeline that generates structured vulnerability reports within hours of release. We’ll walk through the methodology, demo the tooling (ipsw diff, Binary Ninja binary analysis, DSPy agents), and present case studies including: CVE-2025-43400 — FontParser out-of-bounds write CVE-2025-31325 — Audio double free CVE-2025-31201 — RPAC privilege escalation CVE-2025-43200 — Messages logic error If you’ve ever wondered what Apple really fixes each month, this talk will show you how to stop guessing and start knowing. Attendees will leave with a clear understanding of how to automate patch analysis, map CVEs to real code changes, and apply LLMs to uncover and detail the root causes of Apple’s latest vulnerabilities.

I've been actively avoiding using generative AI tools. After a recent conversation with some friends about their positive experiences with AI tools, I walked away feeling a bit grumpy. After some reflection, I came to the realization that I was afraid of AI tools. But then after writing down all the reasons I was afraid of AI tools, I discovered I'm actually afraid of something else.

https://www.richardosgood.com/posts/am-i-afraid-of-ai/

Am I Afraid of AI?

Am I Afraid of AI?I'm not afraid AI is going to take over the world and enslave us all. But recently I realized that I'm afraid to use AI tools. And I'm simultaneously afraid I'm missing the boat. I h…

Am I Afraid of AI?

@rickoooooo

Depends on your goals. This Nemotron model from nvidia needs at least 26GB VRAM, which I can provide with my 32GB MacBook Pro. That being said I’ve been looking at getting a 128GB. Localllm on Reddit is a good source to get an idea of what you need. Don’t have to use a Mac. GPT-oss-20b is also another good local small model

Patch diffing + RCA for clfs.sys can take awhile.

I gave the diff + binary to a local LLM.

It mapped the UAF path, race condition, all IOCTLs in <20 min

LLMs don't replace the work, they are momentum.

New blog post following the UAF trail of CVE-2025-29824:

https://clearbluejar.github.io/posts/how-llms-feed-your-re-habit-following-the-uaf-trail-in-clfs/

How LLMs Feed Your RE Habit: Following the Use-After-Free Trail in CLFS

Dive into how LLMs and pyghidra-mcp accelerate reverse engineering by tracing a UAF vulnerability in CLFS through a patch diff.

clearbluejar

🆕 PrivescCheck update!

New features:
- NTLM downgrade detection - Base
- Named Kernel device DACL check - Extended
- DPAPI enumeration rewritten (similar to WinPEAS implementation) - Extended
- BIOS install/update date check - Audit
- ClickOnce trust prompt behavior check - Audit

Note that PrivescCheck remains my main project. As such it is the only one I actively maintain (feature dev, bug fixing). :)

new blog post, new tool 👀

Unlock project-wide, multi-binary analysis with pyghidra-mcp, a headless Ghidra MCP server for automated, LLM-assisted reverse engineering.

https://clearbluejar.github.io/posts/pyghidra-mcp-headless-ghidra-mcp-server-for-project-wide-multi-binary-analysis/

pyghidra-mcp: Headless Ghidra MCP Server for Project-Wide, Multi-Binary Analysis

Unlock project-wide, multi-binary analysis with pyghidra-mcp, a headless Ghidra MCP server for automated, LLM-assisted reverse engineering.

clearbluejar
Been testing local LLM tool calling with openai/gpt-oss-20b (even at 4-bit) using pyghidra-mcp. It made 22 tool calls in a one-shot run to analyze multiple binaries and traced the call chain from user-mode through kernelbase.dll to the final syscall in ntdll! 🤯

📢 Incoming release: pyghidra‑mcp

🛠️ Meet your new RE best friend. Harness frontier models or a local gpt-oss-20b llm brain to power Ghidra multi‑binary, project‑wide analysis. You’ll be slicing through code like butter 🧈😆

ETA: imminent. Keep your shells warm 🔥🐙⚡🐉

New blog post! 🚀 Learn how to leverage a Ghidra AI assisted workflow by integrating local LLMs using GhidraMCP, Ollama, and OpenWebUI.

Read more here:

https://medium.com/@clearbluejar/supercharging-ghidra-using-local-llms-with-ghidramcp-via-ollama-and-openweb-ui-794cef02ecf7

Supercharging Ghidra: Using Local LLMs with GhidraMCP via Ollama and OpenWeb-UI

Reverse engineering binaries often resembles digital archaeology: excavating layers of compiled code, interpreting obscured logic, and painstakingly naming countless functions and variables. While…

Medium