Blog

Latest posts from Invoke RE

In this blog post we explore using Binary Ninja and emulation to address obfuscation implemented by an open source obfuscator named Garble that is used by red team operators and malware authors to inhibit reverse engineering efforts.

The Binary Ninja edition of the Introduction to malware Binary Triage course has officially launched!

Throughout this blog post we provide Binary Ninja automation strategies for analyzing obfuscation techniques implemented by Qakbot.

We are excited to officially launch the Introduction to Malware Binary Triage course!

Cookies