Jordan Wiens
@psifertex
Worst developer among many good ones making https://binary.ninja Posting over on https://bsky.app/profile/psifertex.bsky.social as well.
Me and the homies are dropping browser exploits on the red team engagement 😎. Find out how to bypass WDAC + execute native shellcode using this one weird trick -- exploiting the V8 engine of a vulnerable trusted application. ibm.com/think/x-force/…
I miss pervasive blog culture. Highlight your favorite blogs! I just found fabiensanglard.net from @fabynou which is fantastic.
Binary Ninja 5.1 is now released: binary.ninja/2025/07/24/5.1… - New WARP function matching - Pseudo Objective-C - Binexport plugin built-in - IL Rewriting Examples, APIs, and Docs - Arch: PPC VLE, mips-r5900, x32 + Much more!
Exciting! @vector35's excellent #BinaryNinja ships with built-in BinExport in the latest dev version! Here's how to use it with #BinDiff: dev-docs.binary.ninja/guide/binexpor…
Excited? Ready?! Ticket sales start in under an hour! Set an alarm and head over to re-verse.io at 12pm ET!
My wife loves her Rivian and while I prefer the FSD on my Tesla, there's one thing that Rivian is _unquestionably_ better at: range estimation. It's not even a close comparison. Tesla is almost useless given how bad its estimates are and Rivian is spot on.
I’m at @reconmtl if you’ve written a plugin or are otherwise a Binary Ninja super fan find me or @psifertex for some shwag!
I loved writing exploits for it too ;)
I really miss .swf (shockwave flash) as a format. Literally a chain of bezier paths. Scale to any resolution. Oh, and it loads progressively with its own virtual machine (ActionScript Bytecode). No modern filetype comes close. Vector video was a special era.
A lone Boston coder rewrote BIOS in 1984. IBM wanted to sue. The programmer's clever loophole became the model for legally defensible reverse engineering. You’ve probably been booting his descendants ever since. This is how Phoenix Technologies got away with it:
Thrilled to share that Corellium is being acquired by Cellebrite! I'm excited to join Cellebrite as CTO and continue pushing the boundaries of mobile security and digital forensics. Big things ahead. forbes.com/sites/thomasbr…
We had a team of 4 (could have up to 5) but 2 of us finished so fast the others didn't even have time to look at the problems. I was on a top CTF team for a couple years but based on the fact I got 5th and started an hour late, there were VERY few top CTFers
We had reserved the entire weekend for it but were disappointed with how easy it was. We finished everything in 1.5 hours. They only had rev + crypto and a few web I think.
Huh, interesting. I have many questions: the-decoder.com/ai-agents-outp… - Could the teams also use AI? - Where the teams all individuals or groups? - Did they invite actual top CTF players? - Who wrote the challenges, did they know AI would be solving? (IE, how unique/new were they)
New #BinaryNinja plugin: Obfuscation Analysis Simplifies arithmetic obfuscation (MBA) directly in the decompiler (see demo below). Also identifies functions with corrupted disassembly. Co-authored by @nicolodev; available in the plugin manager. github.com/mrphrazer/obfu…
I’ve developed a Binary Ninja plugin to load encrypted riscy-business bytecode. It locates the encryption key, decrypts the bytecode, auto-renames initial functions, resolves import table entries, and annotates VM-specific syscalls. An example binary is included in the repository
Do you use or exploit WebSockets? Check out our new blog post to see how modern browsers may (or may not) be protecting you from Cross-Site WebSocket Hijacking! blog.includesecurity.com/2025/04/cross-…