Introducing ida-free-mcp
February 15, 2026
How I used Claude to convert a Python IDA plugin to native C++ — because it sounded like a fun side project.
0xshlomil's cyber blog
February 15, 2026
How I used Claude to convert a Python IDA plugin to native C++ — because it sounded like a fun side project.
March 28, 2019
This post reviews how to achieve a full R/W (Read/Write) primitive which can ultimately lead to a RCE (Remote Code Execution).
February 19, 2019
Learn how CVE-2019-0539 was fixed in the Microsoft Edge Chakra Engine update for January 2019 via a Root Cause Analysis (RCA) report.
June 4, 2018
In this post we discuss advanced code reuse technique “COOP,” which uses an old vulnerability to conform to the theoretical boundaries of CFI.
February 22, 2018
As with any market where crime is lucrative, cybersecurity will always exist, and the more digital the world becomes, the more it will grow. This market is so dynamic because it follows a cat-and-mouse model where the defenders are continuously trying to catch up to the attackers. In this article, we’ll discuss how this has played out over the history of software exploitation techniques, which typically play a part in every major cyber attack, and what it means for how defensive technologies must be approached today.
March 1, 2017
In this post, we take inspiration from Kurt Gödel by looking at the system from an outsider’s point of view to detect malware.