Alaid TechThread
383 subscribers
6 photos
79 files
1.29K links
Vulnerability discovery, threat intelligence, reverse engineering, AppSec
Download Telegram
Securing_the_Software_Commons_keynote_by_Abhishek_Arya.pdf
3 MB
Securing the software
commons
Standards, Automation, and AI for a Resilient Open Source Future
Known Vulnerabilities of Open Source Projects: Where Are the Fixes?

https://ieeexplore.ieee.org/document/10381645
👍11
8_Исправлять_—_не_искать_Роман_Лебедь_вер_2.pdf
4.3 MB
Safeliner - AI решение для исправления уязвимостей в коде

#safeliner
2👍9🔥5
The plugin provides a custom navigation interface within IDA. It examines execution paths from entry points, breaks down the binary into clusters of related functions, and highlights downstream behaviors and artifacts for quicker insights. XRefer can incorporate external data (e.g., API traces, capa results, user-defined xrefs) and provides path graphs for richer context. It integrates with Google's Gemini model to produce natural language descriptions of code relationships and behaviors. Additionally, XRefer can provide cluster based labels for functions, aiming to accelerate the manual static analysis process.




https://github.com/mandiant/xrefer
3🔥11
👍5
ghidraMCP is an Model Context Protocol server for allowing LLMs to autonomously reverse engineer applications. It exposes numerous tools from core Ghidra functionality to MCP clients.

https://github.com/LaurieWired/GhidraMCP
🔥3
2409.16165v2-2.pdf
2.4 MB
Interactive Tools Substantially Assist LM Agents in Finding Security Vulnerabilities
2
KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities

https://i.blackhat.com/Asia-25/Asia-25-Ruan-KernJC.pdf
A Framework for Evaluating Emerging Cyberattack Capabilities of AI by Google DeepMind

https://arxiv.org/pdf/2503.11917
Page-Oriented Programming: Subverting Control-Flow
Integrity of Commodity Operating System Kernels
with Non-Writable Code Pages

https://www.usenix.org/system/files/usenixsecurity24-han-seunghun.pdf
🔥3