<feed xmlns="http://www.w3.org/2005/Atom"> <id>https://clearbluejar.github.io/</id><title>clearbluejar</title><subtitle>blog, code, and research</subtitle> <updated>2026-02-09T05:26:03+00:00</updated> <author> <name>clearbluejar</name> <uri>https://clearbluejar.github.io/</uri> </author><link rel="self" type="application/atom+xml" href="https://clearbluejar.github.io/feed.xml"/><link rel="alternate" type="text/html" hreflang="en" href="https://clearbluejar.github.io/"/> <generator uri="https://jekyllrb.com/" version="4.4.1">Jekyll</generator> <rights> © 2026 clearbluejar </rights> <icon>/assets/img/favicons/favicon.ico</icon> <logo>/assets/img/favicons/favicon-96x96.png</logo> <entry><title>How LLMs Feed Your RE Habit: Following the Use-After-Free Trail in CLFS</title><link href="https://clearbluejar.github.io/posts/how-llms-feed-your-re-habit-following-the-uaf-trail-in-clfs/" rel="alternate" type="text/html" title="How LLMs Feed Your RE Habit: Following the Use-After-Free Trail in CLFS" /><published>2026-02-03T06:15:00+00:00</published> <updated>2026-02-04T10:13:55+00:00</updated> <id>https://clearbluejar.github.io/posts/how-llms-feed-your-re-habit-following-the-uaf-trail-in-clfs/</id> <content type="text/html" src="https://clearbluejar.github.io/posts/how-llms-feed-your-re-habit-following-the-uaf-trail-in-clfs/" /> <author> <name>clearbluejar</name> </author> <category term="ghidra" /> <category term="LLMs" /> <summary>Dive into how LLMs and pyghidra-mcp accelerate reverse engineering by tracing a UAF vulnerability in CLFS through a patch diff.</summary> </entry> <entry><title>pyghidra-mcp: Headless Ghidra MCP Server for Project-Wide, Multi-Binary Analysis</title><link href="https://clearbluejar.github.io/posts/pyghidra-mcp-headless-ghidra-mcp-server-for-project-wide-multi-binary-analysis/" rel="alternate" type="text/html" title="pyghidra-mcp: Headless Ghidra MCP Server for Project-Wide, Multi-Binary Analysis" /><published>2025-08-19T15:56:00+00:00</published> <updated>2026-01-20T21:31:44+00:00</updated> <id>https://clearbluejar.github.io/posts/pyghidra-mcp-headless-ghidra-mcp-server-for-project-wide-multi-binary-analysis/</id> <content type="text/html" src="https://clearbluejar.github.io/posts/pyghidra-mcp-headless-ghidra-mcp-server-for-project-wide-multi-binary-analysis/" /> <author> <name>clearbluejar</name> </author> <category term="ghidra" /> <category term="MCP" /> <summary>Unlock project-wide, multi-binary analysis with pyghidra-mcp, a headless Ghidra MCP server for automated, LLM-assisted reverse engineering.</summary> </entry> <entry><title>Supercharging Ghidra Using Local LLMs with GhidraMCP via Ollama and OpenWeb-UI</title><link href="https://clearbluejar.github.io/posts/supercharging-ghidra-using-local-llms/" rel="alternate" type="text/html" title="Supercharging Ghidra Using Local LLMs with GhidraMCP via Ollama and OpenWeb-UI" /><published>2025-04-30T00:00:00+00:00</published> <updated>2026-02-03T00:36:25+00:00</updated> <id>https://clearbluejar.github.io/posts/supercharging-ghidra-using-local-llms/</id> <content type="text/html" src="https://clearbluejar.github.io/posts/supercharging-ghidra-using-local-llms/" /> <author> <name>clearbluejar</name> </author> <category term="ghidra" /> <category term="LLMs" /> <summary>Reverse engineering binaries often resembles digital archaeology: excavating layers of compiled code, interpreting obscured logic, and painstakingly naming countless functions and variables.</summary> </entry> <entry><title>Everyday Ghidra: Symbols — Automatic Symbol Acquisition with Ghidra — Part 2</title><link href="https://clearbluejar.github.io/posts/everyday-ghidra-symbols-automatic-symbol-acquisition-with-ghidra-part-2/" rel="alternate" type="text/html" title="Everyday Ghidra: Symbols — Automatic Symbol Acquisition with Ghidra — Part 2" /><published>2024-05-28T00:00:00+00:00</published> <updated>2024-12-21T14:09:58+00:00</updated> <id>https://clearbluejar.github.io/posts/everyday-ghidra-symbols-automatic-symbol-acquisition-with-ghidra-part-2/</id> <content type="text/html" src="https://clearbluejar.github.io/posts/everyday-ghidra-symbols-automatic-symbol-acquisition-with-ghidra-part-2/" /> <author> <name>clearbluejar</name> </author> <category term="everydayghidra" /> <category term="symbols" /> <summary>This post, another lesson from the “Everyday Ghidra” series, walks through the process of configuring Ghidra to automatically download symbols from well known public symbol servers</summary> </entry> <entry><title>Everyday Ghidra: Symbols — Prescription Lenses for Reverse Engineers — Part 1</title><link href="https://clearbluejar.github.io/posts/everyday-ghidra-symbols-prescription-lenses-for-reverse-engineers-part-1/" rel="alternate" type="text/html" title="Everyday Ghidra: Symbols — Prescription Lenses for Reverse Engineers — Part 1" /><published>2024-05-07T00:00:00+00:00</published> <updated>2024-12-26T14:26:51+00:00</updated> <id>https://clearbluejar.github.io/posts/everyday-ghidra-symbols-prescription-lenses-for-reverse-engineers-part-1/</id> <content type="text/html" src="https://clearbluejar.github.io/posts/everyday-ghidra-symbols-prescription-lenses-for-reverse-engineers-part-1/" /> <author> <name>clearbluejar</name> </author> <category term="everydayghidra" /> <category term="symbols" /> <summary>In reverse engineering a closed-source binary using Ghidra or other software reverse engineering frameworks, a key objective is to retrieve information that clarifies the disassembled code. This involves identifying function names, prototypes, data types, constants, and enums. These elements, symbolized as human-readable identifiers, simplify both programming and reverse engineering by providing a more intuitive representation of the program’s state, akin to using a high level language versus assembly code. Leveraging these symbols within Ghidra can significantly aid in understanding the program’s behavior.</summary> </entry> </feed>
