ir2re
RSS Feed
Welcome to ir2re — Interrupt Return to Reverse Engineering
Here, I share my experiments, tools, and thoughts on product security, binary analysis, vulnerability research, and exploitation.
Everything I build, write, and explore comes from real, hands-on work. Things don’t always go as planned. Stuff breaks. That’s how you learn — and how you get better.
let’s unpack some binaries — one opcode at a time.
Social Links:
Featured
-
Building a Jail for AI Agents: Sandbox Design on Linux
Published: at 07:00 PMA deep dive into sandboxing AI agents on Linux — namespaces, seccomp, capabilities, and a 3-ring isolation model to keep autonomous code from going rogue.
-
Mixed Boolean Arithmetic (MBA) Obfuscation: Breaking Down the Complexity
Published: at 07:00 PMExplores why Mixed Boolean-Arithmetic (MBA) obfuscation makes code tricky to analyze and reverse.
-
Unpacking the First Opcode: A New Beginning at ir2re
Published: at 07:00 PMAnnouncing ir2re — my personal space for exploring, writing, and sharing