BINARLY🔬
@binarly.bsky.social
📤 31
📥 6
📝 0
⛓️Binarly is the world’s most advanced automated software supply chain security platform.
reposted by
BINARLY🔬
OpenSecurityTraining2
about 1 month ago
This year
@binarly.bsky.social
has also expanded their sponsorship to the creation of a new
#OST2
Firmware Security Learning Path!
ost2.fyi/OST2_LP_FWSE...
1
3
2
reposted by
BINARLY🔬
Xeno Kovah
about 1 month ago
It's awesome to see companies like
@binarly.bsky.social
helping support OST2 so it can keep bringing free training to the world! (This could/should be your company too! :))
add a skeleton here at some point
0
3
2
reposted by
BINARLY🔬
Sam Thomas
7 months ago
We're are happy to announce a new release of our
#Rust
bindings for idalib. What's new: - New APIs for working with IDBs, segments, and more - Rust 2024 support - New homepage:
idalib.rs
H/T to our contributors
@yeggor.bsky.social
&
@raptor.infosec.exchange.ap.brid.gy
github.com/binarly-io/i...
loading . . .
GitHub - binarly-io/idalib: Idiomatic Rust bindings for the IDA SDK, enabling the development of standalone analysis tools using IDA v9.x’s idalib
Idiomatic Rust bindings for the IDA SDK, enabling the development of standalone analysis tools using IDA v9.x’s idalib - binarly-io/idalib
https://github.com/binarly-io/idalib
0
5
9
reposted by
BINARLY🔬
Alex Matrosov
3 months ago
This research demonstrates how easily full persistence can be achieved on Supermicro BMC, allowing complete takeover of the server. - CVE-2025-7937: bypassed “fix” for CVE-2024-10237. - CVE-2025-6198: Supermicro RoT bypass.
www.binarly.io/blog/broken-...
1
2
2
reposted by
BINARLY🔬
Marco Ivaldi
6 months ago
Another Crack in the Chain of Trust: Uncovering (Yet Another)
#secureboot
Bypass
https://www.binarly.io/blog/another-crack-in-the-chain-of-trust
loading . . .
Another Crack in the Chain of Trust: Uncovering (Yet Another) Secure Boot Bypass
Comments
https://www.binarly.io/blog/another-crack-in-the-chain-of-trust
0
2
3
reposted by
BINARLY🔬
Marco Ivaldi
6 months ago
#Hydroph0bia (CVE-2025-4275) - a trivial
#secureboot
bypass for UEFI-compatible firmware based on Insyde
#h2o
#hydroph0bia
part 1
https://coderush.me/hydroph0bia-part1/
loading . . .
Hydroph0bia (CVE-2025-4275) - a trivial SecureBoot bypass for UEFI-compatible firmware based on Insyde H2O, part 1
https://coderush.me/hydroph0bia-part1/
0
1
5
you reached the end!!
feeds!
log in