Currently testing Bluesky. Otherwise on Mastodon.social.
Cet atelier est accessible à ceux qui ne connaissent ni Radare2 ni Ghidra.
Mais il est conseillé d'avoir des bases en assembleur ou d'avoir déjà décompilé des binaires (qq soit le logiciel utilisé).
C'est un peu technique qd meme...
Cet atelier est accessible à ceux qui ne connaissent ni Radare2 ni Ghidra.
Mais il est conseillé d'avoir des bases en assembleur ou d'avoir déjà décompilé des binaires (qq soit le logiciel utilisé).
C'est un peu technique qd meme...
It demonstrates the automatic mode of r2ai, where we can ask a question whose answer requires to read/understand several functions of the binary.
#radare2 #r2ai #AI #LLM
It demonstrates the automatic mode of r2ai, where we can ask a question whose answer requires to read/understand several functions of the binary.
#radare2 #r2ai #AI #LLM
I think that's the goal of r2ai: give malware analysts a nice tip when they need one + speed up their work.
n=3
I think that's the goal of r2ai: give malware analysts a nice tip when they need one + speed up their work.
n=3
And, to be honest, that wouldn't even be good, it would devalue the profession.
The same applies to anti-virus research.
2/n
And, to be honest, that wouldn't even be good, it would devalue the profession.
The same applies to anti-virus research.
2/n
How about asking for a confirmation password before sharing the password database perhaps?
How about asking for a confirmation password before sharing the password database perhaps?
This blog post sparked special interest research.checkpoint.com/2025/ai-evas...
Although after this interesting read, I still wondered how the prompt was launched, exactly what for, and also what the malware did globally. So, did my own research.
This blog post sparked special interest research.checkpoint.com/2025/ai-evas...
Although after this interesting read, I still wondered how the prompt was launched, exactly what for, and also what the malware did globally. So, did my own research.