28 Followers
49 Following
46 Posts
Malware analysis can be hard, but learning it shouldn't be. Reversing engineering, automation and all things malware analysis at https://training.invokere.com
Traininghttps://training.invokere.com
Youtubehttps://www.youtube.com/@InvokeReversing
GitHubhttps://github.com/invoke-re
Twitchhttps://twitch.tv/invokereversing
A fantastic review of the Introduction to Malware Binary Triage course from Kelvin Winborne who recently completed the course https://grepstrength.dev/invoke-res-introduction-to-malware-binary-triage-review-ff482d5228be
Invoke RE’s Introduction to Malware Binary Triage Review

Put some respect on your own name!

Medium
We've uploaded our live stream from RE//verse 2026 where we sat down with Mason Reed from @binaryninja to discuss WARP signatures used for symbol and type information recovery. Mason is a wealth of knowledge and it was a pleasure speaking with him at this amazing event!
https://youtu.be/BgV2azB_ajk
Live From RE//verse 2026: WARP Signatures with Mason Reed (Stream - 06/03/2026)

YouTube
Our founder Joshua Reynolds will be attending RE//verse 2026! Come say hi during the conference to get some Invoke RE swag and talk to him about malware analysis and reverse engineering!
Addressing Common Misconceptions about .NET in the InfoSec World by @washi https://blog.washi.dev/posts/misconceptions-about-dotnet/
Addressing Common Misconceptions about .NET in the InfoSec World

Over the past couple years, I have come to know the .NET platform pretty well, from both a developer’s and a reverse engineer’s standpoint.

Washi
We've uploaded our stream from last Thursday where we analyzed the Avalon Linux bot with IDA Pro. Throughout this stream we reversed its persistence, C2 functionality, encryption and command dispatcher. Enjoy! https://youtu.be/IaWUq5K6HCc
Avalon Linux Bot Malware Analysis with IDA Pro (Stream - 05/02/2026)

YouTube
@xorhex thanks for posting this! Need to give mastodon more love
Our second Floxif file infector stream from Jan 13 is up! We continued analyzing Floxif with Binary Ninja and finished the custom string types and stack strings deobfuscation scripts: https://www.youtube.com/watch?v=vPNpYq67RnQ enjoy!
Floxif File Infector String Decryption and Analysis (Stream Part 2 - 13/01/2026)

YouTube
With our Binary Ninja MCP server, we were able to automate malware analysis and generate a Yara rule based on analysis conducted, which to our surprise was functional 🤯
We've uploaded our stream where we analyzed Stealc with Binary Ninja, wrote automation to decrypt its strings and dynamically analyzed it with x64dbg https://www.youtube.com/watch?v=zqVOhIK1cM8 enjoy! Notes and code can be found here: https://github.com/Invoke-RE/stream-notes/tree/main/stealc
Stealc Malware Analysis with Binary Ninja (Stream - 25/02/2025)

YouTube
We are excited to announce that we will be doing in-person training at NorthSec 2025! This will be an in-person adaptation of our Binary Ninja malware analysis course. It will primarily be hands on activities where you will learn to analyze real-world malware samples with Binary Ninja, x64dbg and other open source tools. More info here: https://nsec.io/training/2025-introduction-to-malware-binary-triage/
AI SecureOps: Attacking & Defending AI Applications & Agents

NorthSec 2026