zlacker

[parent] [thread] 0 comments
1. Alifat+(OP)[view] [source] 2026-02-04 16:10:53
I agree, I tried RE using multiple tools connected to MCP and a agent, it was tasked to recreate what the source code might have looked like from a binary and what possible vulnerabilities there could be. It did a incredible job when I compared it to the actual source.
[go to top]