A fantastic review of the Introduction to Malware Binary Triage course from Kelvin Winborne who recently completed the course
https://grepstrength.dev/invoke-res-introduction-to-malware-binary-triage-review-ff482d5228be
Invoke RE’s Introduction to Malware Binary Triage Review
Put some respect on your own name!
MediumWe've uploaded our live stream from RE//verse 2026 where we sat down with Mason Reed from
@binaryninja to discuss WARP signatures used for symbol and type information recovery. Mason is a wealth of knowledge and it was a pleasure speaking with him at this amazing event!
https://youtu.be/BgV2azB_ajk
Live From RE//verse 2026: WARP Signatures with Mason Reed (Stream - 06/03/2026)
YouTubeOur founder Joshua Reynolds will be attending RE//verse 2026! Come say hi during the conference to get some Invoke RE swag and talk to him about malware analysis and reverse engineering!
Addressing Common Misconceptions about .NET in the InfoSec World by
@washi https://blog.washi.dev/posts/misconceptions-about-dotnet/Addressing Common Misconceptions about .NET in the InfoSec World
Over the past couple years, I have come to know the .NET platform pretty well, from both a developer’s and a reverse engineer’s standpoint.
WashiWe've uploaded our stream from last Thursday where we analyzed the Avalon Linux bot with IDA Pro. Throughout this stream we reversed its persistence, C2 functionality, encryption and command dispatcher. Enjoy!
https://youtu.be/IaWUq5K6HCc
Avalon Linux Bot Malware Analysis with IDA Pro (Stream - 05/02/2026)
YouTube@xorhex thanks for posting this! Need to give mastodon more love
Our second Floxif file infector stream from Jan 13 is up! We continued analyzing Floxif with Binary Ninja and finished the custom string types and stack strings deobfuscation scripts:
https://www.youtube.com/watch?v=vPNpYq67RnQ enjoy!

Floxif File Infector String Decryption and Analysis (Stream Part 2 - 13/01/2026)
YouTubeWith our Binary Ninja MCP server, we were able to automate malware analysis and generate a Yara rule based on analysis conducted, which to our surprise was functional 🤯
We've uploaded our stream where we analyzed Stealc with Binary Ninja, wrote automation to decrypt its strings and dynamically analyzed it with x64dbg
https://www.youtube.com/watch?v=zqVOhIK1cM8 enjoy! Notes and code can be found here:
https://github.com/Invoke-RE/stream-notes/tree/main/stealc
Stealc Malware Analysis with Binary Ninja (Stream - 25/02/2025)
YouTubeWe are excited to announce that we will be doing in-person training at NorthSec 2025! This will be an in-person adaptation of our Binary Ninja malware analysis course. It will primarily be hands on activities where you will learn to analyze real-world malware samples with Binary Ninja, x64dbg and other open source tools. More info here:
https://nsec.io/training/2025-introduction-to-malware-binary-triage/
AI SecureOps: Attacking & Defending AI Applications & Agents
NorthSec 2026