An Introduction to Binary Ninja for Malware Analysis

Anuj Soni

An Introduction to Binary Ninja for Malware Analysis

1 year ago - 20:03

Time Travel Debugging in Binary Ninja with Xusheng Li

Invoke RE

Time Travel Debugging in Binary Ninja with Xusheng Li

5 days ago - 1:30:38

Learning Binary Ninja for Reverse Engineering - Workflows, UI  Patching and Scripting

ConsoleCowboys

Learning Binary Ninja for Reverse Engineering - Workflows, UI Patching and Scripting

1 year ago - 28:26

Reverse Engineering with Binary Ninja (Binja)

Off By One Security

Reverse Engineering with Binary Ninja (Binja)

Streamed 1 year ago - 1:15:06

Learning Binary Ninja for Reverse Engineering - Integrating AI workflows to Reverse Engineer Keygens

ConsoleCowboys

Learning Binary Ninja for Reverse Engineering - Integrating AI workflows to Reverse Engineer Keygens

9 months ago - 30:28

Can Binary Ninja Crack This Code?

Suit Up and Hack

Can Binary Ninja Crack This Code?

1 month ago - 8:33

Binary Ninja Scripting with Python!

John Hammond

Binary Ninja Scripting with Python!

5 months ago - 23:39

Building BinaryNinja type libraries for malware analysis!

サイバーカイダ

Building BinaryNinja type libraries for malware analysis!

11 months ago - 2:59:22

02 - Recording a TTD Trace with Binary Ninja

Dr Josh Stroschein - The Cyber Yeti

02 - Recording a TTD Trace with Binary Ninja

4 months ago - 8:28

Malware Analysis with capa & Binary Ninja Plugins (API Hashing)

Anuj Soni

Malware Analysis with capa & Binary Ninja Plugins (API Hashing)

1 month ago - 23:44

Learning Binary Ninja for Reverse Engineering - Scripting Basics and More Part 1

ConsoleCowboys

Learning Binary Ninja for Reverse Engineering - Scripting Basics and More Part 1

1 year ago - 32:47

Self-Learning Reverse Engineering in 2022

LiveOverflow

Self-Learning Reverse Engineering in 2022

2 years ago - 9:09

Learning Binary Ninja for Reverse Engineering - Scripting Basics and More Part 2

ConsoleCowboys

Learning Binary Ninja for Reverse Engineering - Scripting Basics and More Part 2

1 year ago - 17:31

IDA vs Binary Ninja vs Ghidra after 1.5 years using them

MalwareAnalysisForHedgehogs

IDA vs Binary Ninja vs Ghidra after 1.5 years using them

11 months ago - 11:09

Malware Information Collection Analysis with Binary Ninja (Course Preview)

Invoke RE

Malware Information Collection Analysis with Binary Ninja (Course Preview)

3 months ago - 4:18

BinaryNinja

BinaryNinja

@Zonfiree subscribers

Binary Ninja: 5.1 Feature Stream

VECTOR 35

Binary Ninja: 5.1 Feature Stream

Streamed 10 days ago - 1:31:00

BinaryNinja

BinaryNinja

@codewizard01 subscribers

Binary Ninja

Dulge

Binary Ninja

7 months ago - 0:30

Binary Ninja Dixie Code Scanner Plugin

3Flatline

Binary Ninja Dixie Code Scanner Plugin

1 year ago - 0:48

Binary Ninja Cloud on a tablet

VECTOR 35

Binary Ninja Cloud on a tablet

5 years ago - 0:48

Patching Binaries (with vim, Binary Ninja, Ghidra and radare2)

LiveOverflow

Patching Binaries (with vim, Binary Ninja, Ghidra and radare2)

5 years ago - 21:00

Nicholas Starke - BinaryNinja

SecDSM

Nicholas Starke - BinaryNinja

Streamed 8 years ago - 24:31

Binary Ninja Sidekick 2.0: Analyzing Ransomware with Large Language Models

Invoke RE

Binary Ninja Sidekick 2.0: Analyzing Ransomware with Large Language Models

8 months ago - 18:19

Malware Analysis - Ghidra vs Cutter vs Binary Ninja vs IDA Free

MalwareAnalysisForHedgehogs

Malware Analysis - Ghidra vs Cutter vs Binary Ninja vs IDA Free

2 years ago - 26:47

BinaryNinja Software

BinaryNinja Software

@binaryninjasoftware5038 subscribers

[E29] F'ing Around with Binary Ninja: Writing a Decompiler!

Syrillian

[E29] F'ing Around with Binary Ninja: Writing a Decompiler!

5 years ago - 3:12:16

how to remove bg from any pic #bgremove #background_change #binaryninja

Binary Ninja

how to remove bg from any pic #bgremove #background_change #binaryninja

1 year ago - 1:13

AI Malware Reverse Engineering with Binary Ninja MCP Server (Stream - 11/04/2025)

Invoke RE

AI Malware Reverse Engineering with Binary Ninja MCP Server (Stream - 11/04/2025)

2 months ago - 1:11:16

Opening Files: Binary Ninja Basics ep. 1

VECTOR 35

Opening Files: Binary Ninja Basics ep. 1

4 years ago - 3:31

F'ing around with Binary Ninja, Episode 5: Automated Deobfuscation!

Syrillian

F'ing around with Binary Ninja, Episode 5: Automated Deobfuscation!

6 years ago - 1:56:39

Binary Ninja Sidekick: Reverse Engineering Malware with Large Language Models

Invoke RE

Binary Ninja Sidekick: Reverse Engineering Malware with Large Language Models

1 year ago - 19:39

Finding Bugs with Binary Ninja by Jordan Wiens

Bugcrowd

Finding Bugs with Binary Ninja by Jordan Wiens

6 years ago - 23:11

F'ing Around with Binary Ninja, Episode 4: Emulator, and Deobfuscation!

Syrillian

F'ing Around with Binary Ninja, Episode 4: Emulator, and Deobfuscation!

6 years ago - 1:56:38

Recon 2018 Montreal - Malware Analysis and Automation using Binary Ninja by Erika Noerenberg

Recon Conference

Recon 2018 Montreal - Malware Analysis and Automation using Binary Ninja by Erika Noerenberg

2 years ago - 49:52

[E25] F'ing Around with Binary Ninja: Writing a Decompiler!

Syrillian

[E25] F'ing Around with Binary Ninja: Writing a Decompiler!

6 years ago - 2:21:12

Ep.1 - Jordan Wiens aka @psifertex, Co-Founder of Vector35, BinaryNinja

Hackers To Founders

Ep.1 - Jordan Wiens aka @psifertex, Co-Founder of Vector35, BinaryNinja

8 months ago - 1:45:10

Is my reverse engineering correct? | Binary Ninja

0xXploit

Is my reverse engineering correct? | Binary Ninja

2 months ago - 3:00

01 - Installing WinDbg and Configuring Binary Ninja

Dr Josh Stroschein - The Cyber Yeti

01 - Installing WinDbg and Configuring Binary Ninja

4 months ago - 10:59