
  <rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
      <title>Chaos and Order</title>
      <link>https://www.youngju.dev/blog</link>
      <description>천천히 올바르게. AI Researcher &amp; DevOps Engineer Youngju&#39;s tech blog. GPU/CUDA, LLM, MLOps, Kubernetes AI workloads, distributed training, and data engineering.</description>
      <language>ko</language>
      <managingEditor>fjvbn2003@gmail.com (Youngju Kim)</managingEditor>
      <webMaster>fjvbn2003@gmail.com (Youngju Kim)</webMaster>
      <lastBuildDate>Sat, 16 May 2026 00:00:00 GMT</lastBuildDate>
      <atom:link href="https://www.youngju.dev/tags/unicorn/feed.xml" rel="self" type="application/rss+xml"/>
      
  <item>
    <guid>https://www.youngju.dev/blog/culture/2026-05-16-reverse-engineering-tools-2026-ghidra-ida-pro-binary-ninja-radare2-frida-x64dbg-angr-deep-dive.en</guid>
    <title>Reverse Engineering Tools 2026 — Ghidra / IDA Pro / Binary Ninja / radare2 / Frida / x64dbg / angr Deep Dive</title>
    <link>https://www.youngju.dev/blog/culture/2026-05-16-reverse-engineering-tools-2026-ghidra-ida-pro-binary-ninja-radare2-frida-x64dbg-angr-deep-dive.en</link>
    <description>A precise breakdown of the 2026 reverse engineering tool landscape across disassemblers (Ghidra / IDA Pro / Binary Ninja / radare2+Cutter / Hopper), debuggers (x64dbg / OllyDbg / WinDbg / Pwndbg / GEF), dynamic instrumentation (Frida / Cheat Engine / Wireshark), symbolic execution (angr / Triton / KLEE), and the engine layer (Capstone / Keystone / Unicorn / QEMU). How Ghidras 2019 NSA open-source release broke IDA Pros pricing monopoly, why Binary Ninjas BNIL/HLIL became modern REs IR standard, how Frida redefined mobile RE, how far angr and KLEE symbolic execution really work, and where LLM-assisted RE — Binary Ninja Sidekick / IDA Decompiler AI / GhidraMCP — actually delivers in 2026. Plus the CTF toolchain (Pwntools + Pwndbg + GEF) and Korean (KAIST / KISA) and Japanese (AIST / JPCERT / FFRI Security) security research ecosystems.</description>
    <pubDate>Sat, 16 May 2026 00:00:00 GMT</pubDate>
    <author>fjvbn2003@gmail.com (Youngju Kim)</author>
    <category>reverse-engineering</category><category>ghidra</category><category>ida-pro</category><category>binary-ninja</category><category>radare2</category><category>cutter</category><category>x64dbg</category><category>ollydbg</category><category>hopper</category><category>plasma</category><category>angr</category><category>frida</category><category>cheat-engine</category><category>wireshark</category><category>pwntools</category><category>pwndbg</category><category>gef</category><category>capstone</category><category>keystone</category><category>unicorn</category><category>qemu</category><category>klee</category><category>triton</category><category>2026</category><category>deep-dive</category><category>english</category>
  </item>

  <item>
    <guid>https://www.youngju.dev/blog/culture/2026-05-16-reverse-engineering-tools-2026-ghidra-ida-pro-binary-ninja-radare2-frida-x64dbg-angr-deep-dive.ja</guid>
    <title>リバースエンジニアリングツール 2026 — Ghidra / IDA Pro / Binary Ninja / radare2 / Frida / x64dbg / angr 徹底解説</title>
    <link>https://www.youngju.dev/blog/culture/2026-05-16-reverse-engineering-tools-2026-ghidra-ida-pro-binary-ninja-radare2-frida-x64dbg-angr-deep-dive.ja</link>
    <description>2026年のリバースエンジニアリングツール地図を、ディスアセンブラ(Ghidra / IDA Pro / Binary Ninja / radare2+Cutter / Hopper)、デバッガ(x64dbg / OllyDbg / WinDbg / Pwndbg / GEF)、動的計装(Frida / Cheat Engine / Wireshark)、シンボリック実行(angr / Triton / KLEE)、そしてエンジン層(Capstone / Keystone / Unicorn / QEMU)に分けて精密に整理する。NSAが2019年に公開したGhidraがIDA Proの価格独占をどう崩したのか、Binary NinjaのBNIL/HLILがなぜモダンREの中間表現の事実上の標準になったのか、FridaがモバイルREをどう再定義したか、angrやKLEEのシンボリック実行が実際にどこまで動くのか、そしてLLM支援RE — Binary Ninja Sidekick / IDA Pro Decompiler AI / GhidraMCP — が2026年に本当に何を解決しているのか。CTFツールチェーン(Pwntools + Pwndbg + GEF)と韓国(KAIST / KISA)・日本(AIST / JPCERT / FFRIセキュリティ)のセキュリティ研究エコシステムまでまとめて扱う。</description>
    <pubDate>Sat, 16 May 2026 00:00:00 GMT</pubDate>
    <author>fjvbn2003@gmail.com (Youngju Kim)</author>
    <category>reverse-engineering</category><category>ghidra</category><category>ida-pro</category><category>binary-ninja</category><category>radare2</category><category>cutter</category><category>x64dbg</category><category>ollydbg</category><category>hopper</category><category>plasma</category><category>angr</category><category>frida</category><category>cheat-engine</category><category>wireshark</category><category>pwntools</category><category>pwndbg</category><category>gef</category><category>capstone</category><category>keystone</category><category>unicorn</category><category>qemu</category><category>klee</category><category>triton</category><category>2026</category><category>deep-dive</category><category>日本語</category>
  </item>

  <item>
    <guid>https://www.youngju.dev/blog/culture/2026-05-16-reverse-engineering-tools-2026-ghidra-ida-pro-binary-ninja-radare2-frida-x64dbg-angr-deep-dive</guid>
    <title>리버스 엔지니어링 도구 2026 — Ghidra / IDA Pro / Binary Ninja / radare2 / Frida / x64dbg / angr 심층 가이드</title>
    <link>https://www.youngju.dev/blog/culture/2026-05-16-reverse-engineering-tools-2026-ghidra-ida-pro-binary-ninja-radare2-frida-x64dbg-angr-deep-dive</link>
    <description>2026년 리버스 엔지니어링 도구 지형도를 디스어셈블러(Ghidra/IDA Pro/Binary Ninja/radare2+Cutter/Hopper), 디버거(x64dbg/OllyDbg/WinDbg/Pwndbg/GEF), 동적 계측(Frida/Cheat Engine/Wireshark), 심볼릭 실행(angr/Triton/KLEE), 그리고 엔진 레이어(Capstone/Keystone/Unicorn/QEMU)로 정밀하게 분해한다. NSA가 2019년에 풀어버린 Ghidra가 어떻게 IDA Pro의 가격 독점을 무너뜨렸는지, Binary Ninja의 BNIL/HLIL이 왜 모던 RE의 표준이 되었는지, Frida가 모바일 RE를 어떻게 재정의했는지, angr와 KLEE의 심볼릭 실행이 실제로 어디까지 작동하는지, 그리고 LLM-assisted RE — Binary Ninja AI / IDA Pro Decompiler AI / Sidekick — 가 2026년에 어디까지 진짜로 작동하는지. CTF 도구 체인(Pwntools + Pwndbg + GEF)과 한국(KAIST 해킹동아리·KISA)·일본(AIST·JPCERT·FFRI セキュリティ) 보안 연구 생태계까지 한 번에 정리한다.</description>
    <pubDate>Sat, 16 May 2026 00:00:00 GMT</pubDate>
    <author>fjvbn2003@gmail.com (Youngju Kim)</author>
    <category>reverse-engineering</category><category>ghidra</category><category>ida-pro</category><category>binary-ninja</category><category>radare2</category><category>cutter</category><category>x64dbg</category><category>ollydbg</category><category>hopper</category><category>plasma</category><category>angr</category><category>frida</category><category>cheat-engine</category><category>wireshark</category><category>pwntools</category><category>pwndbg</category><category>gef</category><category>capstone</category><category>keystone</category><category>unicorn</category><category>qemu</category><category>klee</category><category>triton</category><category>2026</category><category>deep-dive</category>
  </item>

    </channel>
  </rss>
