A lot of practical UI work landed in Binary Ninja 5.3. We replaced the old MachO slice selection flow with a dedicated picker, expanded Container Browser coverage across a wide range of container formats, and significantly extended command palette behavior. https://lnkd.in/e2bfvb9B
About us
We are hackers, reverse engineers, developers, teachers, game-players, problem solvers, and pranksters. We are nerf-collectors and technology junkies who love a cool breeze in the hammock or a quiet hike up a mountain. Reverse Engineering: It is more than just mastering tools—it’s about truly understanding how an application works, often even better than its original creator. That’s why we developed Binary Ninja, a powerful RE tool. Vulnerability Research: With extensive experience in vulnerability research, we excel at identifying weaknesses across a wide range of code bases, whether through source code analysis or binary examination. Custom Software: Our expertise spans diverse code bases, whether or not the source code is available. Whatever your development needs, we have the skills to deliver. Trainings: We’ve developed comprehensive courses on assembly programming, reverse engineering, and vulnerability research. Our unique background allows us to teach both seasoned security experts and those just starting their journey. CTF Consulting: Leveraging our experience with LiveCTF and four years of supporting the HackASat initiative, we offer expertise in game design and live broadcast experiences for Capture The Flag (CTF) competitions. Data Visualization: We’ve dedicated ourselves to making CTFs more accessible through innovative data visualization. We believe that new ways of visualizing and understanding CTFs can make following professional CTF players as engaging as watching professional gamers.
- Website
-
http://vector35.com/
External link for Vector 35
- Industry
- Computer and Network Security
- Company size
- 11-50 employees
- Headquarters
- Melbourne, FL
- Type
- Privately Held
- Founded
- 2015
Locations
-
Primary
Get directions
Melbourne, FL 32901, US
Employees at Vector 35
Updates
-
Binary Ninja 5.3 (Jotunheim) adds new architecture APIs for full function level lifting. We are already using them for upcoming TMS320C6x work, and plugin authors should be able to put them to good use too. Also new: NDS32 and AArch64 ILP32 ABI updates. Check out the latest blog: https://lnkd.in/e6cGD9Se
-
-
Join us tomorrow, April 17th @ 4pm ET, for some live pwn! We'll be using Binary Ninja's shell coding compiler, patching binaries to make them easier to debug, analyzing data moving from globals to the stack to the heap, and finishing by popping shells live with pwntools: https://lnkd.in/eHf_KGfH
Pwn'ing like it's 2016 - Binary Ninja Live Stream
https://www.youtube.com/
-
Binary Ninja 5.3 (Jotunheim) is released: https://lnkd.in/e88anaXT Major highlights: NDS32 support, AArch64 ILP32 ABI, new Universal MachO UI, command palette upgrade, new type library helpers, ghidra export, updated IDB import, HW and conditional breakpoints, and much more!
-
Join us tomorrow, Wednesday April 8th @ 3pm ET, for a sneak peak at Binary Ninja 5.3! We'll take a look at all the new major features coming to 5.3, from expanded architecture and platform support, core analysis features, new debugger features, brand new UIs, and so much more. Follow along with latest dev, or join us tomorrow to see what's worth all the hype: https://lnkd.in/e2tsnR7j
Binary Ninja: 5.3 Feature Stream!
https://www.youtube.com/
-
Tired of unzipping your password-protected malware samples just to analyze them? We've got you covered. Our latest blog post covers Container Transforms and how Binja now handles nested binary formats with structure and provenance intact. Read it here: https://lnkd.in/ep3B2wVn
-
-
Who needs containers? You do! If you reverse firmware, macho files, malware, or many other formats! Come see what's unlocked in Binary Ninja by this feature in our latest blog post from Brian: https://lnkd.in/ep3B2wVn
-
-
T-10 minutes until the bots battle to find different bug classes, break keygens, decrypt strings, extract private keys, analyze malware, and win some games! We'll be pitting agent vs agent, assistant vs assistant, using both local and remote models to see who comes out on top. Featuring our multi-time guest, Tim Blazytko, this is one you won't want to miss! https://lnkd.in/eaKuM6pJ
AI vs AI - Binary Ninja Live Stream
https://www.youtube.com/
-
Sludge?! In Binary Ninja? Happy April 1st! (Yes, the plugin is real though) https://lnkd.in/exts99WD Now available in the plugin manager.
-
Join Tim Blazytko with us on Thursday @4pm ET to pit machine versus machine! We'll be comparing LLM options for both assisted and fully-automatic reverse engineering, including different CLI interfaces, MCP servers, plugins, and agents. Get notified so you don't miss who comes out on top of reversing's biggest battle yet: https://lnkd.in/e55cpVXJ
AI vs AI - Binary Ninja Live Stream
https://www.youtube.com/