AI Malware Reverse Engineering with Binary Ninja MCP Server (Stream - 11/04/2025)
Throughout this stream we look at reverse engineering malware with the a Binary Ninja MCP server we developed called BinjaLattice MCP. We use the MCP server to analyze and summarize functionality in a Stealc and Phorpiex malware sample with Cursor as our MCP client. This demonstrates the applicability of AI and LLMs in the reverse engineering process.
Learn how to reverse engineer malware: https://training.invokere.com/course/imbtbn
Notes: https://github.com/Invoke-RE/stream-notes/tree/main/mcp-malware-reversing
Blog: https://invokere.com/posts/2025/04/binja-lattice-mcp-server-reverse-engineering-with-ai/
Twitch: https://www.twitch.tv/InvokeReversing
Twitter: https://twitter.com/InvokeReversing
Mastodon: https://infosec.exchange/@invokereversing
Intro & Overview of Binja MCP Server 00:00
Running the Binja Plugin 04:04
Brief HLIL Discussion 07:01
Command-Line Interface 08:44
Using the MCP Server 13:32
Analyzing Sealc Sample with MCP 19:10
Discussion of Automation Taking Jobs 24:34
Analyzing Al Generated Script 26:14
Analyzing Phorpiex 30:47
MCP Commands Available 34:07
Phorpiex Analysis Continued 35:10
Trying out Delphos Labs 50:04
Phorpiex Analysis Continued 51:57
Renaming to Vibe Namespace 56:54
Discussion on Not Being Discouraged 1:00:48
Wrapping Up Analysis & Outro 1:02:18
Видео AI Malware Reverse Engineering with Binary Ninja MCP Server (Stream - 11/04/2025) канала Invoke RE
Learn how to reverse engineer malware: https://training.invokere.com/course/imbtbn
Notes: https://github.com/Invoke-RE/stream-notes/tree/main/mcp-malware-reversing
Blog: https://invokere.com/posts/2025/04/binja-lattice-mcp-server-reverse-engineering-with-ai/
Twitch: https://www.twitch.tv/InvokeReversing
Twitter: https://twitter.com/InvokeReversing
Mastodon: https://infosec.exchange/@invokereversing
Intro & Overview of Binja MCP Server 00:00
Running the Binja Plugin 04:04
Brief HLIL Discussion 07:01
Command-Line Interface 08:44
Using the MCP Server 13:32
Analyzing Sealc Sample with MCP 19:10
Discussion of Automation Taking Jobs 24:34
Analyzing Al Generated Script 26:14
Analyzing Phorpiex 30:47
MCP Commands Available 34:07
Phorpiex Analysis Continued 35:10
Trying out Delphos Labs 50:04
Phorpiex Analysis Continued 51:57
Renaming to Vibe Namespace 56:54
Discussion on Not Being Discouraged 1:00:48
Wrapping Up Analysis & Outro 1:02:18
Видео AI Malware Reverse Engineering with Binary Ninja MCP Server (Stream - 11/04/2025) канала Invoke RE
Комментарии отсутствуют
Информация о видео
17 апреля 2025 г. 18:15:59
01:11:16
Другие видео канала