BINARLY🔬
banner
binarly.bsky.social
BINARLY🔬
@binarly.bsky.social
⛓️Binarly is the world’s most advanced automated software supply chain security platform.
Reposted by BINARLY🔬
We're are happy to announce a new release of our #Rust bindings for idalib.

What's new:
- New APIs for working with IDBs, segments, and more
- Rust 2024 support
- New homepage: idalib.rs

H/T to our contributors @yeggor.bsky.social & @raptor.infosec.exchange.ap.brid.gy

github.com/binarly-io/i...
GitHub - binarly-io/idalib: Idiomatic Rust bindings for the IDA SDK, enabling the development of standalone analysis tools using IDA v9.x’s idalib
Idiomatic Rust bindings for the IDA SDK, enabling the development of standalone analysis tools using IDA v9.x’s idalib - binarly-io/idalib
github.com
May 21, 2025 at 10:28 PM
Reposted by BINARLY🔬
This research demonstrates how easily full persistence can be achieved on Supermicro BMC, allowing complete takeover of the server.

- CVE-2025-7937: bypassed “fix” for CVE-2024-10237.
- CVE-2025-6198: Supermicro RoT bypass.

www.binarly.io/blog/broken-...
September 24, 2025 at 9:23 PM
Reposted by BINARLY🔬
Another Crack in the Chain of Trust: Uncovering (Yet Another) #secureboot Bypass

https://www.binarly.io/blog/another-crack-in-the-chain-of-trust
Another Crack in the Chain of Trust: Uncovering (Yet Another) Secure Boot Bypass
Comments
www.binarly.io
June 11, 2025 at 5:13 AM
Reposted by BINARLY🔬
#hydroph0bia (CVE-2025-4275) - a trivial #secureboot bypass for UEFI-compatible firmware based on Insyde #h2o, part 1

https://coderush.me/hydroph0bia-part1/
Hydroph0bia (CVE-2025-4275) - a trivial SecureBoot bypass for UEFI-compatible firmware based on Insyde H2O, part 1
coderush.me
June 11, 2025 at 5:53 AM