Duncan Ogilvie 🍍 Profile
Duncan Ogilvie 🍍

@mrexodia

Followers
7K
Following
511
Statuses
1K

Reverse engineer, creator of @x64dbg and 100+ other projects. Love binary analysis and Windows internals. Dreaming about doing open source full time...

Poland
Joined January 2011
Don't wanna be here? Send us removal request.
@mrexodia
Duncan Ogilvie 🍍
2 years
Gave a guest lecture "Windows Internals Crash Course" at the Ruhr-UniversitΓ€t Bochum today. No novel research, but might be interesting for people getting into started. Thanks to @mr_phrazer for the invite!
3
192
586
@mrexodia
Duncan Ogilvie 🍍
2 days
@5unKn0wn @BackEngineerLab How did you approach the deobfuscation process?
1
0
1
@mrexodia
Duncan Ogilvie 🍍
2 days
RT @expend20: BinaryShield a bin2bin x86-64 code virtualizer crackme solution
0
25
0
@mrexodia
Duncan Ogilvie 🍍
2 days
0
2
6
@mrexodia
Duncan Ogilvie 🍍
4 days
RT @unpacme: UNPACME 8.7.0 Malicious Python analysis, AI safety, binary signature hunting, and much more!
0
15
0
@mrexodia
Duncan Ogilvie 🍍
4 days
RT @0xNemi: Had a great interview with @GuidedHacking and @husseinmuhaisen earlier this year. Happy to see it finally drop. Let me know if…
0
3
0
@mrexodia
Duncan Ogilvie 🍍
4 days
RT @x86matthew: Just released another project that I created a few weeks ago - a NES emulator for Windows written in C/C++ using pure WinAP…
0
155
0
@mrexodia
Duncan Ogilvie 🍍
4 days
They added an integration for Visual Studio code as well!
Tweet media one
@lauriewired
LaurieWired
4 days
Ghidra 11.3 is OUT! PyGhidra is the new feature to be excited about. It’s a Python library providing direct access to the Ghidra API. I expect this to massively increase Reverse Engineering tool development, as it significantly reduces the barrier to entry.
2
7
42
@mrexodia
Duncan Ogilvie 🍍
4 days
RT @mahal0z: It's finally here! Ghidra 11.3 dropped with built-in support for Python 3 through Pyhidra. Let's go!
0
141
0
@mrexodia
Duncan Ogilvie 🍍
4 days
RT @herrcore: UPX -> PyInstaller -> PS -> Xworm Full triage with UNPACME πŸš€
0
37
0
@mrexodia
Duncan Ogilvie 🍍
5 days
RT @_ringzer0: Lifting Binaries, Part 0: Devirtualizing VMProtect and Themida: It’s Just Flattening?:
0
32
0
@mrexodia
Duncan Ogilvie 🍍
6 days
Indirect branches are also a very interesting topic, here is a nice follow-up:
@nicolodev
nicolodev
8 days
Disassembly algorithms are often a trade-off. My new blog post analyzes linear sweep and recursive traversal, exploring their strengths and weaknesses in a self-built disassemblers.
2
13
61
@mrexodia
Duncan Ogilvie 🍍
7 days
RT @johnrushx: I've tried all (24) AI coding agents & IDEs πŸ˜΅β€πŸ’« [Cursor, Softgen, Windsurf, Wrapifai, Copilot, Lovable, Bolt, v0, Replit, M…
0
2K
0
@mrexodia
Duncan Ogilvie 🍍
7 days
@williballenthin Did python bindings for it a while back, works pretty well!
0
0
4
@mrexodia
Duncan Ogilvie 🍍
8 days
RT @_nnaci: I discuss the creation of Mergen, VM based obfuscations, and explore how compiler techniques are used for reverse engineering a…
0
70
0
@mrexodia
Duncan Ogilvie 🍍
9 days
RT @WerWolv: After @mrexodia's recent PR to the Pattern Language, I was now able to make ImHex fully compile with Visual Studio on Windows!…
0
3
0
@mrexodia
Duncan Ogilvie 🍍
12 days
@samrussellnz It doesn’t block updates, but the LTSC IoT edition has a much slower update cadence (and more relaxed installation requirements)
1
0
1
@mrexodia
Duncan Ogilvie 🍍
12 days
RT @REverseConf: WebAssembly de-obfuscation with LLVM. Vikas Gupta & Peter Garba (@Blips_and_Chitz) reveal how to reverse Wasm obfuscation…
0
5
0
@mrexodia
Duncan Ogilvie 🍍
12 days
Very disappointed I cannot make it this year πŸ˜” Last year was absolutely amazing, highly recommended!
@bsidesprg
Security BSides Prague
13 days
πŸš€ BSides Prague 2025 – Program Loading… ⏳ πŸš€ The Call for Papers selection is wrapping up, and the lineup is coming together! Expect cutting-edge talks, hands-on workshops, and deep tech insights. Stay tuned for the big reveal! #bsides
1
0
2