REverseConf Profile Banner
RE//verse Profile
RE//verse

@REverseConf

Followers
2K
Following
69
Statuses
124

A conference for all things in the reverse engineering universe... https://t.co/X54VHq2eD4

Orlando, FL
Joined August 2024
Don't wanna be here? Send us removal request.
@REverseConf
RE//verse
1 month
Our 2025 RE//verse talk schedule is now live! Talks start Friday, but don't forget to check the Thursday schedule and arrive early enough for the kick-off event!
3
44
113
@REverseConf
RE//verse
1 day
Streamline firmware analysis with inter-image call graphs! Robin David (@RobinDavid1) showcases graph-based methodologies for mapping cross-binary dependencies and integrating decompiled code. Expand your reversing toolkit. #REverse2025 #FirmwareAnalysis #ReverseEngineering
Tweet media one
0
0
0
@REverseConf
RE//verse
1 day
Planning your RE//verse schedule? Meet some RIIsearchers and accept Caticus’ side quest at the Research Innovations Inc (RII) booth. Everyone is welcome, even if you’re not a cat lover 😸 Learn more about life at RII here:
Tweet media one
0
0
3
@REverseConf
RE//verse
1 day
Unlock the complexities of automotive ECU reverse engineering. Martin Petran demonstrates AUTOSAR Classic firmware techniques and introduces a Binary Ninja plugin to enhance your automotive RE workflow. #REverse2025 #AUTOSAR #FirmwareAnalysis
Tweet media one
0
1
1
@REverseConf
RE//verse
2 days
RT @starlabs_sg: We would love to see submissions from anyone. Time is running out. Don’t let the ticket to @REverseConf go to waste. For…
0
14
0
@REverseConf
RE//verse
2 days
A big shoutout to our friends at @Binarly_io, our Platinum Sponsor for RE//verse! They set the bar in vulnerability research & bring tools like Binary Risk Hunt: ✅ Free vulnerability scanning ✅ SBOM support ✅ Tackle binary risks Check it out here:
0
6
15
@REverseConf
RE//verse
2 days
Static decompilation falls short on the JVM. Marc Schoenefeld introduces dynamic analysis techniques like custom event sensors, Java Agents, and profiling heat maps to unlock hidden insights in obfuscated bytecode. #REverse2025 #Java #ReverseEngineering
Tweet media one
0
0
2
@REverseConf
RE//verse
5 days
NIGHTWING: IN THE BUSINESS OF STAYING AHEAD Our nation relies on #Nightwing for leading #cybersecurity and intelligence solutions when the stakes are highest. Proud to be a Bronze #REverse Sponsor, Nightwing is ready to meet those looking for a career off the beaten path.
0
0
0
@REverseConf
RE//verse
5 days
From hacking the Xbox kernel to acid-etching silicon: Markus Gaasedelen (@gaasedelen) takes you on a full-stack RE journey through the original Xbox. Hardware, software, and everything in between. Don’t miss this adventure! #REverse2025 #ReverseEngineering #HardwareHacking
Tweet media one
0
1
12
@REverseConf
RE//verse
5 days
Make sure you're joining us for the RE//verse kickoff reception on February 27th! We've updated the website to clarify that technical talks start the 28th but the kickoff event is the night before so make sure you don't miss out on that! The evening events are the best time to mingle and connect.
0
0
4
@REverseConf
RE//verse
9 days
Last chance to book your rooms at the Conference Hotel. Please do not delay! The room block will be closing soon.
0
1
4
@REverseConf
RE//verse
10 days
WebAssembly de-obfuscation with LLVM. Vikas Gupta & Peter Garba (@Blips_and_Chitz) reveal how to reverse Wasm obfuscation using compiler optimizations. Simplify complex code without pattern rules & tackle real-world scenarios. #REverse2025 #Wasm #ReverseEngineering
Tweet media one
0
5
26
@REverseConf
RE//verse
10 days
Dynamic binary instrumentation, simplified. Andrew Haberlandt (@_ndrewh) introduces Pyda: a Python-based framework for writing tools on top of DynamoRIO. Replace debugger scripts & explore advanced hooks for ARM64/X86. #REverse2025 #Instrumentation #DynamicAnalysis
Tweet media one
0
1
6
@REverseConf
RE//verse
10 days
Magnet Forensics, a Silver Sponsor of RE//verse 2025, provides cutting-edge data extraction and mobile forensic solutions, like GrayKey and Axiom, to help law enforcement, government agencies, and businesses. Join GrayKey Labs! They are #hiring: @MagnetForensics
0
3
3
@REverseConf
RE//verse
11 days
Static analysis for iOS apps just got smarter! Florian Magin (@0x464D) & Angelo DeLuca (@AngDeLuca) reveal a Ghidra plugin leveraging heuristics & approximations to tackle Objective-C & Swift challenges. Don’t miss this dive into iOS research. #REverse2025 #SRE #Decompilation
Tweet media one
0
3
13
@REverseConf
RE//verse
11 days
Rehost embedded ARM firmware at near-native speeds! Lukas Seidel (@pr0me) introduces SAFIREFUZZ, achieving 690x fuzzing throughput with ARM Cortex-M firmware. Dive into instruction rewriting, emulation, and performance gains. #REverse2025 #Fuzzing #FirmwareSecurity
Tweet media one
0
8
20
@REverseConf
RE//verse
12 days
Bootkits: the ultimate stealth threat. Takahiro Haruyama (@cci_forensics) shares cutting-edge techniques to detect UEFI implants with code behavior analysis, YARA/FwHunt rules, and retrohunts. Learn how 6 new bootkits were uncovered! #REverse2025 #FirmwareSecurity #UEFI
Tweet media one
0
21
80
@REverseConf
RE//verse
16 days
Practical Baseband Exploitation
0
0
0