clearbluejar

Write | Code | Learn | Repeat | #InfoSec mostly...

2025-05-06

New blog post! 🚀 Learn how to leverage a Ghidra AI assisted workflow by integrating local LLMs using GhidraMCP, Ollama, and OpenWebUI.

Read more here:

medium.com/@clearbluejar/super

2025-04-28

New #ghidriff release! v0.9.0

- Set custom analysis options
- Set custom base address (bootloaders, etc)

github.com/clearbluejar/ghidri

clearbluejar boosted:
2025-04-14

Recon CFP ends in less than 2 weeks on April 28. Prices for the training and conference increase on May 1st. Register now to save with early bird price. We have already announced a few talks and workshops, and more videos from last year have been released. recon.cx #reverseengineering #cybersecurity #offensivesecurity #hardwarehacking @hackingump1 @mr_phrazer @nicolodev @SinSinology @hunterbr72 @clearbluejar @phLaul @oryair1999 @hookgab @TheQueenofELF @So11Deo6loria @i0n1c @pedrib1337 @MalachiJonesPhD @Pat_Ventuzelo @KB_Intel @pinkflawd @Reverse_Tactics @OnlyTheDuck @t0nvi @drch40s @BrunoPujos @mhoste1 @andreyknvl @texplained_RE @jsmnsr @pulsoid @SpecterDev @richinseattle @yarden_shafir @aionescu @hackerschoice @SinSinology @sergeybratus @SpecterOps @oryair1999 @phLaul @trailofbits @HexRaysSA @nostarch

2025-04-01

Wrapped up an incredible time teaching #PatchDiffingInTheDark in Austin, TX with
@_ringzer0
! The city didn’t disappoint—amazing food, friendly people, and my first autonomous vehicle ride!🤖 🚗✨ #waymo

2025-03-16

#EverydayGhidra virtual course with
@_ringzer0
just wrapped up! 😅 Huge shoutout to my stellar students 🤓 who crushed a jam-packed CTF. Next stop: Austin, TX for my in-person #PatchDiffingInTheDark course next week. See you at #Bootstrap25 Conference next weekend! 🤠🎯

2025-02-28

"Running #Ghidra on the same platform as the binaries you’re analyzing isn’t just convenient — it’s strategic."
medium.com/@clearbluejar/every

2025-02-14

One more this week!

#CVE-2025-21418 2025-Feb Windows Ancillary Function Driver for WinSock 7.8 EoP Heap-based Buffer Overflow

This time in AfdAccept... 🧐
gist.github.com/clearbluejar/9

Side by side: diffpreview.github.io/?9c33282 👀

#patchdiffinginthedark #Ghidra

2025-02-12

Just released #ghidriff v0.8.0 - Ghidra 11.3 Support + PyGhidra 🔥👀

This release uses the latest PyGhidra now officially supported by Ghidra 🤓💪

github.com/clearbluejar/ghidri

🔋 included!

2025-02-07

The new check previously checked for a null value, but now the free will only be called if the buffer was used based on the result of the RndisDevHostSetBuffers API 🤓

2025-02-07

A new check was introduced to protect a call to a function that eventually calls free...

2025-02-07

An ideal diff... only one function changed!

2025-02-07

CVE-2024-43625 - 2024-Nov - Microsoft Windows VMSwitch Elevation of Privilege - Use After Free - CVSS 8.1

#ghidriff vmwsitch diff
gist.github.com/clearbluejar/b
👀🔥

Side-by-side view: diffpreview.github.io/?b5c1261 🧐

A patch diffing 🧵...

2025-01-30

CVE-2025-21325 - 2025-Jan - ARM64 - Windows Secure Kernel Mode Elevation of Privilege

#ghidriff full diff 👀 gist.github.com/clearbluejar/3

Incorrect permission assignment? 🧐 gist.github.com/clearbluejar/3

2025-01-29

@buherator @tmr232

Hey! Just posted an update on the pull request. github.com/clearbluejar/ghidri

clearbluejar boosted:
2025-01-20

POC for CVE-2025-21298 (Windows OLE RCE CVSS 9.8): github.com/ynwarcs/CVE-2025-21

I'll publish some details about the PoC later, but the vulnerability is pretty boring, a double-free (UAF more generally) with a narrow window of time between the two operations so you'd need a miracle to exploit it.

2024-12-21

Exciting! My talk recording just dropped from #OBTS v7! 🗣️✨ Learn how to patch diff on Apple with #Ghidra, #ghidriff, and #ipsw: "Patch Different on *OS": youtube.com/watch?v=Ellb76t7nr

2024-12-03

Slides set, bags packed—heading to my first #OBTS! Let's gooo! 🌴💻📱

2024-11-22

In an ideal world for reverse engineering, every function would have a name, and every variable would be correctly typed. Take a step towards that world, learn to build your own custom Ghidra Data Types in my latest post: medium.com/@clearbluejar/every

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst