#decai

cryptaxcryptax
2025-02-28

Decai decompiling a malicious shellcode.
The instructions are not so readable, if you're not used to syscalls int 0x80. AI does it for you.

asciinema.org/a/4PY8wn2TPg2oBd

cryptaxcryptax
2025-01-30
cryptaxcryptax
2025-01-06

r2ai solves my CrackMe in a few seconds. It's both elegant and educational.

Read this: cryptax.medium.com/cracking-my

And view @dnakov video at r2con: youtube.com/watch?v=UxE5GNUBCXo

cc: @radareorg

cryptaxcryptax
2024-12-12

I've been running decai with Claude AI on a malware named Goldoon.

Ghidra is usually quite good to decompile, but just compare the decompiled output with r2 (@radareorg) decai/Claude and ghidra!
This is marvelous. So much clear and concise + Claude immediately thought this was malicious (I didn't hint anything).

NB. I will talk about this at @1ns0mn1h4ck

cryptaxcryptax
2024-12-10

@radareorg the program was implemented using Swift, which does not disassemble very nicely. So, I tried decai. Output in C wasn't nice, but output in Java is quite usable. At least, the password is very visible.

:radare2: radare :verified:radareorg@infosec.exchange
2024-11-09

When you find a method with a curious name and what to know what it’s doing with #decai.
(But don’t use it for cheating, you know 😜)
#r2con2024

:radare2: radare :verified:radareorg@infosec.exchange
2024-11-09

Once again #r2ai, #decai and #r2frida to the rescue!
They were really helpful in @as0ler’s, combining them in the process.
#r2con2024

:radare2: radare :verified:radareorg@infosec.exchange
2024-11-09

Tomorrow we’ll be able to see how #decai was really helpful to decompile the STM8 firmware. So don’t miss it!
#r2con2024

:radare2: radare :verified:radareorg@infosec.exchange
2024-11-09

Some more examples of #decai decompilation.
And with -Q command you can also ask if the code is vulnerable and where, and it will answer that! Isn’t it awesome?
#r2con2024

:radare2: radare :verified:radareorg@infosec.exchange
2024-11-09

Decompiling with #decai provides a really nice output, as you can see in the example below. But even with more complex binaries the results are surprising.
#r2con2024

:radare2: radare :verified:radareorg@infosec.exchange
2024-11-09

When dealing with python is a mess, you can write your own plugin in js, so that was how #decai was born. #ia
#r2con2024

:radare2: radare :verified:radareorg@infosec.exchange
2024-11-09

And now… surprise talk from @pancake! He will show us some of the #decai magic.
#r2con2024

cryptaxcryptax
2024-09-17

I got decai (radare2's AI-assisted decompiler) to work with a local model, and tried it over a basic Caesar implementation in C and in Dart.

To be honest, I think the conclusion is that the model I selected is not good enough ;) but and are really great tools. Read my post to understand how to install, configure and use. Or RTFM :P

cryptax.medium.com/using-ai-as

many thanks to @Pancake for his patience! "it's not working on my laptop", "try this then" etc

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst