nicolodev (@nicolodev) 's Twitter Profile
nicolodev

@nicolodev

Reverse Engineer – Passion for decompiler, disassembler, and anything that breaks software

ID: 1696600820358250496

linkhttps://nicolo.dev calendar_today29-08-2023 19:08:57

51 Tweet

300 Followers

108 Following

Hex-Rays SA (@hexrayssa) 's Twitter Profile Photo

Attention, attention 📢 We are pleased to announce the winners of our #MyCreepyCodeContest 🎉 Huge thanks to all participants, and congratulations to Hex-Ray’s Choice Award 🏅x.com/LucaDAmico91/s… Community Choice Award🏅x.com/nicolodev/stat… #HalloweenChallenge #idapro

Attention, attention 📢 We are pleased to announce the winners of our #MyCreepyCodeContest 🎉 Huge thanks to all participants, and congratulations to
Hex-Ray’s Choice Award 🏅x.com/LucaDAmico91/s…
Community Choice Award🏅x.com/nicolodev/stat…

#HalloweenChallenge #idapro
nicolodev (@nicolodev) 's Twitter Profile Photo

Introducing IPA: Interactive PDF Analysis! 🔍 Dive deep into any PDF file to uncover hidden threats. Extract payloads, understand object relationships, and triage malicious content. github.com/seekbytes/IPA/

Introducing IPA: Interactive PDF Analysis! 🔍 

Dive deep into any PDF file to uncover hidden threats. Extract payloads, understand object relationships, and triage malicious content. 

github.com/seekbytes/IPA/
nicolodev (@nicolodev) 's Twitter Profile Photo

“About stack variables recognition and how to thwart it” is finally published! I have detailed how people use opaque predicates to add sensitive details to thwart stack analysis by decompilers. Be sure to check it out!

reverseame (@reverseame) 's Twitter Profile Photo

Disassembling a binary: linear sweep and recursive traversal #DisassemblingBinary #PEFileFormat #ReverseEngineering #InstructionSetArchitecture #InsPEctor nicolo.dev/en/blog/disass…

nicolodev (@nicolodev) 's Twitter Profile Photo

Excited to share that Tim Blazytko and I will be presenting our talk, "Breaking Mixed Boolean-Arithmetic Obfuscation in Real-World Applications," at REcon. Stay tuned for more details in the coming days!

nicolodev (@nicolodev) 's Twitter Profile Photo

Join us for an in-depth look at MBA deobfuscation! Tim Blazytko and I will unpack the intricacies of Mixed Boolean Arithmetic at REcon 2025.

Tim Blazytko (@mr_phrazer) 's Twitter Profile Photo

New #BinaryNinja plugin: Obfuscation Analysis Simplifies arithmetic obfuscation (MBA) directly in the decompiler (see demo below). Also identifies functions with corrupted disassembly. Co-authored by nicolodev; available in the plugin manager. github.com/mrphrazer/obfu…

nicolodev (@nicolodev) 's Twitter Profile Photo

Simplify the reverse engineering of obfuscated binaries using MBA expressions with our new plugin! Easy to use, and shows the results directly to Binary Ninja!

Tim Blazytko (@mr_phrazer) 's Twitter Profile Photo

Tomorrow at 3:30 pm, nicolodev and I will present our talk “Breaking Mixed Boolean-Arithmetic Obfuscation in Real-World Applications” at REcon ! Details: cfp.recon.cx/recon-2025/tal… Plugin release: github.com/mrphrazer/obfu…

nicolodev (@nicolodev) 's Twitter Profile Photo

We just presented our new Binary Ninja plugin for deobfuscation of Mixed Boolean Arithmetic expressions at REcon25. Check it out!