<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Development on NTNINJA</title><link>https://ntninja.com/categories/development/</link><description>Recent content in Development on NTNINJA</description><generator>Hugo -- gohugo.io</generator><language>en</language><copyright>© 2026 Ryan Johnson</copyright><lastBuildDate>Thu, 05 Mar 2026 01:00:00 +0000</lastBuildDate><atom:link href="https://ntninja.com/categories/development/index.xml" rel="self" type="application/rss+xml"/><item><title>dnre-mcp 0.1.0 — .NET Reverse Engineering via MCP</title><link>https://ntninja.com/posts/dnre-mcp-release/</link><pubDate>Thu, 05 Mar 2026 01:00:00 +0000</pubDate><guid>https://ntninja.com/posts/dnre-mcp-release/</guid><description>&lt;p&gt;I just released &lt;a href="https://ntninja.com/dnre-mcp/" &gt;dnre-mcp&lt;/a&gt; 0.1.0, a standalone MCP server for .NET assembly reverse engineering and decompilation.&lt;/p&gt;

&lt;h2 class="relative group"&gt;What It Does
 &lt;div id="what-it-does" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#what-it-does" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h2&gt;
&lt;p&gt;dnre-mcp lets AI assistants load, inspect, and decompile .NET assemblies directly through the Model Context Protocol. It exposes 10 tools covering assembly loading, type and method discovery, namespace browsing, and full C# source decompilation. Under the hood it uses ICSharpCode.Decompiler, the same engine that powers ILSpy.&lt;/p&gt;</description></item><item><title>WEDP 1.0.0-rc1 and dbgeng-mcp 0.1.0</title><link>https://ntninja.com/posts/wedp-and-dbgeng-mcp-releases/</link><pubDate>Thu, 12 Feb 2026 01:00:00 +0000</pubDate><guid>https://ntninja.com/posts/wedp-and-dbgeng-mcp-releases/</guid><description>&lt;p&gt;Quick update on two projects that have been getting a lot of my attention lately.&lt;/p&gt;

&lt;h2 class="relative group"&gt;WEDP 1.0.0-rc1
 &lt;div id="wedp-100-rc1" class="anchor"&gt;&lt;/div&gt;
 
 &lt;span
 class="absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none"&gt;
 &lt;a class="text-primary-300 dark:text-neutral-700 !no-underline" href="#wedp-100-rc1" aria-label="Anchor"&gt;#&lt;/a&gt;
 &lt;/span&gt;
 
&lt;/h2&gt;
&lt;p&gt;&lt;a href="https://ntninja.com/wedp/" &gt;WEDP (Windows Exploit Development Plugin)&lt;/a&gt; has hit its first release candidate.
If you are not familiar with it, WEDP is a native WinDbg extension I built for exploit development workflows.
It provides ROP/SEH/stack-pivot gadget search, cyclic pattern utilities, module protection enumeration, inline assembly, and a bunch of other stuff you would normally need multiple tools for.
I wrote a &lt;a href="https://ntninja.com/posts/windbg-mcp-with-wedp/" &gt;post&lt;/a&gt; recently on using it with an MCP server and that really pushed me to clean things up and get a proper release out.&lt;/p&gt;</description></item><item><title>WinDBG MCP with WEDP</title><link>https://ntninja.com/posts/windbg-mcp-with-wedp/</link><pubDate>Fri, 06 Feb 2026 09:00:00 -0500</pubDate><guid>https://ntninja.com/posts/windbg-mcp-with-wedp/</guid><description>&lt;p&gt;I have been late to the game with adopting GenAI into my workflow, but we are at full steam now.
I have slowly been adding it into my daily routines to see where I can gain efficiency leveraging this new tech.
One of the big areas I am playing with right now is for writing Windows based CTF challenges, and now in the past few days, seeing how I can leverage GenAI for writing POCs for these new challenges.
In this post we are going to walk through my initial setup for using the &lt;a href="https://github.com/NadavLor/windbg-ext-mcp" target="_blank" rel="noreferrer"&gt;WinDbg EXT MCP&lt;/a&gt; to control a windbg instance that has the extension I wrote a long time ago, &lt;a href="https://gitlab.com/ntninja-dev/windows-exploit-development/wedp" target="_blank" rel="noreferrer"&gt;WEDP (Windows Exploit Development Plugin)&lt;/a&gt;, to improve the process of going from crash to POC.&lt;/p&gt;</description></item><item><title>Protecting Repos with Encrypted GIT</title><link>https://ntninja.com/posts/encrypted-git/</link><pubDate>Mon, 21 Nov 2022 15:00:00 -0500</pubDate><guid>https://ntninja.com/posts/encrypted-git/</guid><description>&lt;p&gt;Open source software development is great, and there exists an abundance of difference git solutions to create public and private repositories for collaboration and distribution.
Private repos give you an extra layer of control by not allowing your code base to be seen by the public.
Occasionally you may have a project that you want to be able to collaborate with a limited set of remote people, and want restrict the possiblity of your source being viewed, even by the git service provider.
None of the commercial git providers have a good solution for this currently, at least that I know of.&lt;/p&gt;</description></item><item><title>rundll... more like fundll</title><link>https://ntninja.com/posts/rundll-fundll/</link><pubDate>Sun, 25 Sep 2022 09:00:00 -0500</pubDate><guid>https://ntninja.com/posts/rundll-fundll/</guid><description>&lt;p&gt;Have you ever written a DLL that had standalone functionality and wasn&amp;rsquo;t meant to be used as a library?
Considering that library is in the name, this idea seems contrary to what a library should be.
Well, you can thank Microsoft for providing a way to execute standalone functionality from a DLL.
Not only did they do that, they also provide DLLs with functionality that you need this utility to run!!!
Say hello to rundll32, pronounced run dull all smashed as one word in some circles.&lt;/p&gt;</description></item></channel></rss>