Jordan Wiens

662 Followers
459 Following
171 Posts
Binary.Ninja dev, cuber, CTF sportscaster, has-been CTF player and exploit writer
Workhttps://binary.ninja
Twitterhttps://twitter.com/psifertex
Cubinghttps://www.worldcubeassociation.org/persons/2022WIEN01
LiveCTFhttps://livectf.com/

This is quite awesome - successful Xbox One ROM glitching, by Markus "doom" Gaasedelen: https://www.youtube.com/watch?v=FTFn4UZsA5U

Congratulations!

RE//verse 2026: Hacking the Xbox One

YouTube

Please welcome the #DefCon 34 #CTF organizers, Benevolent Bureau of Birds!

We're excited to have them on board. Your first chance to see what they're bringing to the table will be in the #DC34CTF Qualifier Round, scheduled for May 22-24, 2026.

The Birds are online at https://bbbirds.org. Info about our legendary CTF can be found at https://www.defcon.org/html/links/dc-ctf.html.

We hope we'll see you in the arena.

PSA: Did you know that it’s **unsafe** to put code diffs into your commit messages?

Like https://github.com/i3/i3/pull/6564 for example

Such diffs will be applied by patch(1) (also git-am(1)) as part of the code change!

This is how a sleep(1) made it into i3 4.25-2 in Debian unstable.

Alright, I couldn’t resist: Here’s the #KnightRider theme as 8-bit #chiptune for the NES. Hope you like it! 😊

🔊Sound on!

#music #chipmusic #furnace #nes #retro #8bit

EDIT: I tweaked it some more, here’s the download link:
🎵 https://www.sephcarissa.com/music/knight-rider-8bit-nes/ Have fun!

I'm excited to be starting a new gig tomorrow, working full-time on Binary Ninja https://infosec.exchange/@binaryninja
Binary Ninja (@[email protected])

379 Posts, 790 Following, 1.15K Followers · Makers of fine reverse engineering tools and technologies.

Infosec Exchange

ok so you know how windows 11 has a mandatory microsoft login screen?

i was annoyed at it just now and so i held shift+ctrl and swiped the entire Fn row in one broad stroke

the VM rebooted and logged into the Administrator account without further complaints.

incredible

Podcast with @jstrosch and @psifertex about:
binary ninja, CTFs, AI, the future of cyber security

https://open.spotify.com/episode/6tMYu7g7P9LuMoehALiCsL

EP07 Jordan Wiens - Inside the Mind of a Binary Ninja: CTFs, AI and the Future of Cyber Security

Behind the Binary by Google Cloud Security · Episode

Spotify

This was my favourite talk from @REverseConf! @mahaloz made an intimidating (to me) topic really accessible, and I feel like I now have a better understanding of the decompilers I use every day. He is a great presenter too :D Would recommend checking it out!

#reverseengineering #decompilation #infosec https://infosec.exchange/@REverseConf/114241453480617211

RE//verse Conference (@[email protected])

Another must-watch talk from RE//verse 2025 is live! Zion Basque challenges decompilers to step up their game and introduces a roadmap for a practical solution to solve some of the trickiest compiler behavior's to analyze. Check it out here: https://youtu.be/VP29biKLoSw

Infosec Exchange

The keynote from Andrew Ruef at @REverseConf on how we (humans) use tools was one of the most thought-provoking talks I've heard in a while.

Core idea: when we use tools, it changes how we perceive the world, to include making the tool part of ourselves.

Like if you use a fork to eat, you don't think "I used the fork I held in my hand to put food in my mouth", you think "I put the food in my mouth."

Really cool thoughts on RE and practical advice for tool makers all in one talk.

i should make a page that's like "RISC-V extension or randomly generated bottom keymashing"