![RE//verse Profile](https://pbs.twimg.com/profile_images/1834653882204450816/I1xgWvQb_x96.jpg)
RE//verse
@REverseConf
Followers
2K
Following
69
Statuses
124
A conference for all things in the reverse engineering universe... https://t.co/X54VHq2eD4
Orlando, FL
Joined August 2024
Streamline firmware analysis with inter-image call graphs! Robin David (@RobinDavid1) showcases graph-based methodologies for mapping cross-binary dependencies and integrating decompiled code. Expand your reversing toolkit. #REverse2025 #FirmwareAnalysis #ReverseEngineering
0
0
0
Unlock the complexities of automotive ECU reverse engineering. Martin Petran demonstrates AUTOSAR Classic firmware techniques and introduces a Binary Ninja plugin to enhance your automotive RE workflow. #REverse2025 #AUTOSAR #FirmwareAnalysis
0
1
1
RT @starlabs_sg: We would love to see submissions from anyone. Time is running out. Don’t let the ticket to @REverseConf go to waste. For…
0
14
0
A big shoutout to our friends at @Binarly_io, our Platinum Sponsor for RE//verse! They set the bar in vulnerability research & bring tools like Binary Risk Hunt: ✅ Free vulnerability scanning ✅ SBOM support ✅ Tackle binary risks Check it out here:
0
6
15
Static decompilation falls short on the JVM. Marc Schoenefeld introduces dynamic analysis techniques like custom event sensors, Java Agents, and profiling heat maps to unlock hidden insights in obfuscated bytecode. #REverse2025 #Java #ReverseEngineering
0
0
2
NIGHTWING: IN THE BUSINESS OF STAYING AHEAD Our nation relies on #Nightwing for leading #cybersecurity and intelligence solutions when the stakes are highest. Proud to be a Bronze #REverse Sponsor, Nightwing is ready to meet those looking for a career off the beaten path.
0
0
0
From hacking the Xbox kernel to acid-etching silicon: Markus Gaasedelen (@gaasedelen) takes you on a full-stack RE journey through the original Xbox. Hardware, software, and everything in between. Don’t miss this adventure! #REverse2025 #ReverseEngineering #HardwareHacking
0
1
12
Make sure you're joining us for the RE//verse kickoff reception on February 27th! We've updated the website to clarify that technical talks start the 28th but the kickoff event is the night before so make sure you don't miss out on that! The evening events are the best time to mingle and connect.
0
0
4
WebAssembly de-obfuscation with LLVM. Vikas Gupta & Peter Garba (@Blips_and_Chitz) reveal how to reverse Wasm obfuscation using compiler optimizations. Simplify complex code without pattern rules & tackle real-world scenarios. #REverse2025 #Wasm #ReverseEngineering
0
5
26
Dynamic binary instrumentation, simplified. Andrew Haberlandt (@_ndrewh) introduces Pyda: a Python-based framework for writing tools on top of DynamoRIO. Replace debugger scripts & explore advanced hooks for ARM64/X86. #REverse2025 #Instrumentation #DynamicAnalysis
0
1
6
Magnet Forensics, a Silver Sponsor of RE//verse 2025, provides cutting-edge data extraction and mobile forensic solutions, like GrayKey and Axiom, to help law enforcement, government agencies, and businesses. Join GrayKey Labs! They are #hiring: @MagnetForensics
0
3
3
Static analysis for iOS apps just got smarter! Florian Magin (@0x464D) & Angelo DeLuca (@AngDeLuca) reveal a Ghidra plugin leveraging heuristics & approximations to tackle Objective-C & Swift challenges. Don’t miss this dive into iOS research. #REverse2025 #SRE #Decompilation
0
3
13
Rehost embedded ARM firmware at near-native speeds! Lukas Seidel (@pr0me) introduces SAFIREFUZZ, achieving 690x fuzzing throughput with ARM Cortex-M firmware. Dive into instruction rewriting, emulation, and performance gains. #REverse2025 #Fuzzing #FirmwareSecurity
0
8
20
Bootkits: the ultimate stealth threat. Takahiro Haruyama (@cci_forensics) shares cutting-edge techniques to detect UEFI implants with code behavior analysis, YARA/FwHunt rules, and retrohunts. Learn how 6 new bootkits were uncovered! #REverse2025 #FirmwareSecurity #UEFI
0
21
80