Sam Thomas's Avatar

Sam Thomas

@xorpse.ghost.sh

Program Analysis / Reverse Engineering Chief Scientist @ BINARLY Website: https://xv.ax

129
Followers
147
Following
11
Posts
18.08.2023
Joined
Posts Following

Latest posts by Sam Thomas @xorpse.ghost.sh

Linux/macOS: curl --proto '=https' --tlsv1.2 -sSfL https://sh.vulhunt.re | sh

Windows: irm https://ps.vulhunt.re | iex

Linux/macOS: curl --proto '=https' --tlsv1.2 -sSfL https://sh.vulhunt.re | sh Windows: irm https://ps.vulhunt.re | iex

Our aim is to build a community and ecosystem around VulHunt to provide a comprehensive toolkit and rule collection that aids researchers and practitioners performing any kind of binary analysis. Give it a try!

07.03.2026 23:22 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Video thumbnail

VulHunt is the culmination of 4 years of R&D with a goal to scale vulnerability detection in binaries. While the foundation is built on tried and true static analysis techniques, we’ve embraced the AI era and expose VulHunt’s capabilities to agents and tools via MCP and skills.

07.03.2026 23:22 πŸ‘ 2 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Preview
VulHunt Vulnerability Detection Framework by Binarly's REsearch Team

We @binarly.bsky.social just open-sourced our VulHunt framework at RE//verse!

GitHub: github.com/vulhunt-re/v...
Documentation: vulhunt.re/docs
Slack: join.slack.com/t/vulhunt/sh...

vulhunt.re

07.03.2026 23:22 πŸ‘ 11 πŸ” 6 πŸ’¬ 1 πŸ“Œ 0
Preview
GitHub - idalib-rs/idalib: Idiomatic Rust bindings for the IDA SDK, enabling the development of standalone analysis tools using IDA v9.x’s idalib Idiomatic Rust bindings for the IDA SDK, enabling the development of standalone analysis tools using IDA v9.x’s idalib - idalib-rs/idalib

I'm pleased to announce a new release of the Rust bindings for
@hex-rays.bsky.social IDA SDK! This release includes v9.3 compatibility.
Code: git.idalib.rs
Docs: docs.idalib.rs
Thank you to @yeggor.bsky.social who contributed to this release, and to @hex-rays.bsky.social for their support.

20.02.2026 04:13 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

We conducted the first public third-party security assessment of EVerest, an open-source firmware stack for electric vehicle charging stations, deployed in hundreds of thousands of charging points worldwide.
The audit was mandated by @ostifofficial.bsky.social πŸ™

blog.quarkslab.com/everest-secu...

20.01.2026 16:45 πŸ‘ 2 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0
GitHub - blacktop/ida-mcp-rs: Headless IDA MCP Server Headless IDA MCP Server. Contribute to blacktop/ida-mcp-rs development by creating an account on GitHub.

Created a single binary headless IDA MCP server in Rust using the awesome idalib by @binarly.bsky.social πŸ¦€πŸ‘©β€πŸ”¬

It adds tool discovery to not pollute your context (before @claudeai fixed it on their side 😏)

github.com/blacktop/ida...

17.01.2026 22:40 πŸ‘ 3 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0

Rust bindings for Apple's on-device LLM just dropped πŸ¦€πŸŽ

fm-rs lets you use Apple Intelligence from Rust - streaming, tool calling, structured output, all running locally

https://github.com/blacktop/fm-rs

17.01.2026 21:39 πŸ‘ 2 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0

🚨 Blog Post: ""Idioms: A Simple and Effective Framework for Turbo-Charging Local Neural Decompilation with Well-Define... https://edmcman.github.io/blog/2026-01-15--idioms-a-simple-and-effective-framework-for-turbo-charging-local-neural-decompilation-with-well-defined-types-accepted-to-ndss-2026/

15.01.2026 19:31 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Post image

πŸ”„In case you missed it...

IDA Domain API.
This new open-source Python API is designed to make scripting in IDA simpler, more consistent, and more natural.

Check out the key features, code examples, documentation and more:
ida-domain.docs.hex-rays.com

05.11.2025 22:44 πŸ‘ 4 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0

Talk Tomorrow: "Scalable Static Analysis and High-Performance Logic Programming" (github.com/kmicinski/mi...)

28.10.2025 18:58 πŸ‘ 17 πŸ” 7 πŸ’¬ 1 πŸ“Œ 0
Video thumbnail

πŸ“’ The Hex-Rays IDA Plugin Contest is open!

We've updated the submission process, added more prizes, and IDA Free users can now enter to win.

πŸ“… Submissions close: January 15, 2026

Get the full update here: hex-rays.com/plugin-contest

Good luck!

23.10.2025 19:36 πŸ‘ 3 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0

🚨 EURECOM is recruiting a PhD student (and master-level interns) on verification and testing at the hardware-software boundary

πŸŒ„ Amazing location between sea & mountain
πŸ’‘ 3-year position
🌍 International environment (no French required!)

You're a curious and motivated student? Reach out!

22.09.2025 09:50 πŸ‘ 5 πŸ” 4 πŸ’¬ 0 πŸ“Œ 0
Post image

I'm happy to share that LIEF 0.17.0 is out: lief.re/blog/2025-09...

15.09.2025 03:49 πŸ‘ 12 πŸ” 5 πŸ’¬ 0 πŸ“Œ 0
Preview
GitHub - binarly-io/idalib: Idiomatic Rust bindings for the IDA SDK, enabling the development of standalone analysis tools using IDA v9.x’s idalib Idiomatic Rust bindings for the IDA SDK, enabling the development of standalone analysis tools using IDA v9.x’s idalib - binarly-io/idalib

I'm pleased to announce a new release of the Rust bindings for
@hex-rays.bsky.social IDA SDK! This release includes v9.2 compatibility, and a number of new features and fixes.
Code: git.idalib.rs
Thank you to our contributors: @withzombies.bsky.social Cole Leavitt Irate-Walrus @yeggor.bsky.social

12.09.2025 23:07 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Snakemake

This looks like a cool way to declaratively orchestrate data processing: snakemake.github.io

How haven't I heard of this before?

11.09.2025 14:21 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Post image Post image

At USENIX Security? Then check out:

Studying the Use of CVEs in Academia, won distinguished paper award www.usenix.org/conference/u...

Discovering and Exploiting Vulnerable Tunnelling Hosts, won most innovative research Pwnie @ DEFCON www.usenix.org/conference/u...

Big thanks to all co-authors!!

13.08.2025 22:30 πŸ‘ 15 πŸ” 7 πŸ’¬ 0 πŸ“Œ 1
vx-underground Black Mass Volume III zine print edition, cover

vx-underground Black Mass Volume III zine print edition, cover

Article β€œEFI Byte Code Virtual Machine, A Monster Emerges” in vx-underground Black Mass Volume III zine print edition

Article β€œEFI Byte Code Virtual Machine, A Monster Emerges” in vx-underground Black Mass Volume III zine print edition

seeing my @vxundergroundre.bsky.social Black Mass article β€œEFI Byte Code Virtual Machine - A Monster Emerges” in the print copy of vol III at long last has me verklempt.
All the blood,sweat+tears that I poured into writing the first UEFI EBC virus were v worth it. πŸ–€

26.07.2025 21:03 πŸ‘ 6 πŸ” 2 πŸ’¬ 1 πŸ“Œ 0
My GitHub contribution graph for the past year

My GitHub contribution graph for the past year

Today I’m celebrating one year of #Rust! πŸ¦€

I started learning it last summer, and since then, I’ve pretty much stopped programming in any other language. Over the past year, I’ve gone from playing with the basics to building some (hopefully 😜) useful […]

[Original post on infosec.exchange]

15.07.2025 20:47 πŸ‘ 3 πŸ” 3 πŸ’¬ 0 πŸ“Œ 0
idalib documentation

I'm pleased to announce a new version of the Rust bindings for IDA Pro! With:

- Improved strings, metadata, and core APIs.
- Support for the names API.

Thank you to @raptor.infosec.exchange.ap.brid.gy & Willi Ballenthin for contributing!

Docs: idalib.rs
Code: git.idalib.rs

15.07.2025 01:12 πŸ‘ 9 πŸ” 7 πŸ’¬ 0 πŸ“Œ 0
Post image

Our research on open tunneling servers got nominated for the Most Innovative Research award :)

The work will be presented by Angelos Beitis at Black Hat and also at USENIX Security

Brief summary and code: github.com/vanhoefm/tun...
Paper: papers.mathyvanhoef.com/usenix2025-t...

12.07.2025 20:17 πŸ‘ 7 πŸ” 6 πŸ’¬ 0 πŸ“Œ 0
Preview
GitHub - sandialabs/ctadl: CTADL is a static taint analysis tool CTADL is a static taint analysis tool. Contribute to sandialabs/ctadl development by creating an account on GitHub.

CTADL - a Datalog-based interprocedural static taint analysis engine for Java/Android bytecode (via JADX) and Pcode (via Ghidra)

Code: github.com/sandialabs/c...

Talk (via @krismicinski.bsky.social): youtu.be/3ec9VfMUVa8?...

09.07.2025 10:10 πŸ‘ 11 πŸ” 2 πŸ’¬ 1 πŸ“Œ 0
Minnowbrook Logic Programming Seminar (Supercut w/ Extras)
Minnowbrook Logic Programming Seminar (Supercut w/ Extras) YouTube video by Kristopher Micinski

May 25-27, 2025, I hosted an event, the "Minnowbrook Logic Programming Seminar," in Blue Mountain Lake, NY. I recorded 11 talks on Datalog-related interests, totaling over 9+ hours of video, which I have just now published on YouTube youtu.be/3ec9VfMUVa8

07.07.2025 18:50 πŸ‘ 18 πŸ” 5 πŸ’¬ 2 πŸ“Œ 1
Original post on infosec.exchange

Exploring fault injection on ESP32 V3!

Inspired by Delvaux work, we tested voltage #glitching as an attack vector. With advanced triggers & GDB, we achieved a ~1.5% success rate. #Hardware #FaultInjection is becoming more practical! […]

18.06.2025 08:23 πŸ‘ 1 πŸ” 3 πŸ’¬ 0 πŸ“Œ 0

🚨 Blog Post: ""A Human Study of Automatically Generated Decompiler Annotations" Published at DSN 2025" https://edmcman.github.io/blog/2025-06-16--a-human-study-of-automatically-generated-decompiler-annotations-published-at-dsn-2025/

16.06.2025 16:46 πŸ‘ 3 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
placard saying protesting is our human right, with split image showing Westminister in the background

placard saying protesting is our human right, with split image showing Westminister in the background

ONLY 5 DAYS LEFT

🚨 The Crime and Policing Bill is in the House of Commons on Tuesday 17.06.

We have 5 days left to email MPs to act.

MPs right now have the power to protect our protest rights.

We can’t let them ignore us.

πŸ“ Take action: www.amnesty.org.uk/actions/emai...

12.06.2025 14:09 πŸ‘ 25 πŸ” 20 πŸ’¬ 0 πŸ“Œ 0
Preview
Another Crack in the Chain of Trust: Uncovering (Yet Another) Secure Boot Bypass Comments

Another Crack in the Chain of Trust: Uncovering (Yet Another) #SecureBoot Bypass

https://www.binarly.io/blog/another-crack-in-the-chain-of-trust

11.06.2025 05:12 πŸ‘ 2 πŸ” 3 πŸ’¬ 0 πŸ“Œ 0
Hydroph0bia (CVE-2025-4275) - a trivial SecureBoot bypass for UEFI-compatible firmware based on Insyde H2O, part 1

#Hydroph0bia (CVE-2025-4275) - a trivial #SecureBoot bypass for UEFI-compatible firmware based on Insyde #H2O, part 1

https://coderush.me/hydroph0bia-part1/

11.06.2025 05:53 πŸ‘ 1 πŸ” 5 πŸ’¬ 0 πŸ“Œ 0
Preview
ELF Linking and Symbol Resolution A summary on how linkers resolve symbols on Unix-like platforms

New blog post: noratrieb.dev/blog/posts/e...

09.06.2025 20:27 πŸ‘ 33 πŸ” 4 πŸ’¬ 0 πŸ“Œ 1

My greatest achievement so far in the #rust ecosystem: the β€œsecurity” category in crates.io is gaining traction πŸ˜‰

https://crates.io/search?q=category%3Asecurity&sort=downloads

05.06.2025 19:46 πŸ‘ 2 πŸ” 2 πŸ’¬ 0 πŸ“Œ 0