Hex-rays has published a second CTF where we have to uncover the location of the traitors in the story of Madame de Maintenon (the IDA Lady)| Eduardo Blázquez’s Personal Webpage
Introducing the fix-stomped-imports Binary Ninja plugin, allowing you to reconstruct a stomped Import Address Table when reverse engineering.| LRQA Nettitude Labs
Custom cryptography and obfuscation are recurring patterns that we encounter during our engagements and research projects. Our experience shows that despite industry best practices and long history of failures these constructs are not getting fixed without clear demonstration of their flaws. Most of the time demonstration requires instrumenting the original software or reimplementing the algorithms from scratch. This way we can create specially crafted encrypted messages, find hash collisions...| Silent Signal Techblog
Binary Ninja is the new hotness in the reverse engineering world. It represents a new age of beautiful, programmatic reverse engineering. It's clear that if the IDA Disassembler is going to be the IDE of reversing, then Binary Ninja (or binja as most people call it) wants to be the| Kevin Chung