Duncan Ogilvie 🍍
@mrexodia
Reverse engineer, creator of @x64dbg and 100+ other projects. Love binary analysis and Windows internals. Dreaming about doing open source full time...
📢 Calling all #CTF (Capture the Flag) Organizers and Competitors! Hex-Rays is now accepting applications for our Sponsorship Program—and we want to hear from you. Perks include FREE #IDA licenses, exclusive swag, and travel support. For more info, visit: eu1.hubs.ly/H0lZbN20
11.2k articles saved and counting 😅
How many times have you been coming back to read a blog post saved for later, only to see it's now gone? I developed a habit of saving every blog post catching my attention with Readeck and its Chrome extension. Also handy to have a tailored list of stuff to read somewhere!
Thanks to a lot of work put in by @mrexodia, IDACode has finally gotten an official update again after 3 years of inactivity! It features stability improvements as well as IDA 9 compatibility improvements! Thanks a lot to everyone involved <3 github.com/ioncodes/idaco…
People have asked me who are cool and badass people to follow. Here is the all-star roster of researchers I love to follow: - @domchell, he is less "researcher" now, but he runs MDSec and he has a collection of brilliant researchers. He retweets a lot of really cool papers and…
Using the UnpacMe byte-search IDA plugin we found some Scavenger related malware dating back to October 2024. At the time the malware was dubbed ExoTickler. Analysis follows...
📣 IDA 9.2 Beta is here! This release is packed with UI upgrades, smarter analysis, and expanded architecture support. ➥ Already a Beta user? Grab it now. ➥ Not enrolled? Sign up today. eu1.hubs.ly/H0lS6nv0
⌛ Let the countdown begin... IDA 9.2 is on the horizon and we thought we'd give you a sneak peek each week until the official launch. eu1.hubs.ly/H0lKYcZ0
Palo Alto Networks researchers explore the obfuscation techniques employed by the malware authors in the SLOW#TEMPEST campaign and highlight methods and code that can be used to detect and defeat these techniques. unit42.paloaltonetworks.com/slow-tempest-m…
Wrote a cross-platform library for rewriting / modifying code in executable files on a function level. Pretty simple to write advanced binary obfuscators using it. github.com/badhive/stitch Below shows what ~30 LOC using Stitch transforms a function into:
I just sponsored @mrexodia. No other tool I have been so much besides x64dbg for the past 4-5 years on a daily basis. Saved me countless hours, learned so much, and helped me solve a lot of problems quickly. The work & research he is putting out has been more then invaluable to…
@mrexodia announced a major new release of x64dbg. In previous versions, analyzing data structures was a tedious, manual process and many features were not supported. This release adds support for bitfields, enums and anonymous types Download: github.com/x64dbg/x64dbg/…
We're excited to announce a major new release of x64dbg! The main new feature is support for bitfields, enums and anonymous types, which allows all types in the Windows SDK to be represented and displayed 🔥
I posted a short 9-minute video on using MCP with IDA for vulnerability analysis. It's open to YouTube members now and will go public on Tuesday. Thanks! youtu.be/ZFABxmJTm6Y I'm using @mrexodia's IDA MCP Server which is the best I've seen yet. github.com/mrexodia/ida-p…
#Windows #x64 #Assembler with Visual Studio and #x64dbg @mrexodia - this will help you get started on digging into Windows Internals
We just presented our new Binary Ninja plugin for deobfuscation of Mixed Boolean Arithmetic expressions at REcon25. Check it out!
The slides from our @reconmtl talk, "Breaking Mixed Boolean-Arithmetic Obfuscation in Real-World Applications" (CC @nicolodev), are now online! Slides: synthesis.to/presentations/… Plugin: github.com/mrphrazer/obfu…
Power users are taking IDA headless with idalib. Think large-scale diffing, custom UIs, and CI pipelines... all without launching a GUI. 💡 Get inspired: eu1.hubs.ly/H0lkrQl0
Thanks to @snowyuwa we will soon have much more comprehensive type support. He was a massive help in testing the new CMake setup ♥ More updates soon!
It is now super easy to build x64dbg and start contributing, give it a try!🤓