Building Agentic RE: Automating Reverse Engineering & Vulnerability Research with AI


Instructor:  John McIntosh
Dates:  June 15 to 18 2026
Capacity:  30


Reverse engineering is entering the Agentic Era. In this four-day, hands-on course, you'll learn to build private AI stacks, develop custom MCP servers, and orchestrate workflows where LLMs act as autonomous collaborators in reverse engineering and vulnerability research. By the end, you'll have the skills to design integrated agentic workflows that help analyze binaries, surface vulnerabilities, validate, and triage results in a reproducible, extensible system.


Overview


Reverse engineering is evolving beyond static tools and manual workflows. This four-day, hands-on course introduces a new paradigm: Agentic Workflows for RE. By combining cutting-edge large language models (LLMs), the Model Context Protocol (MCP), and reverse engineering tools like Ghidra, you'll learn how to design, train, and orchestrate AI-powered systems that automate and accelerate complex RE and VR tasks.

In this course, you'll learn how to design and deploy LLM-powered agents that work alongside your reverse engineering workflow — not just as passive tools, but as autonomous collaborators capable of reasoning, adapting, and acting.

The course blends foundational concepts, the latest practices in AI server hosting, configuration, programming, and workflow design, custom MCP development, and advanced orchestration—culminating in LLM-powered agents that act as autonomous collaborators in reverse engineering and vulnerability research.

Through a systematic progression, you'll move from fundamentals to advanced orchestration:

By the end of the course, you will have built an integrated agentic AI workflow that assists in your reverse engineering and vulnerability research tasks—capable of analyzing binaries, surfacing potential vulnerabilities, validating, and triaging results.


Why This Matters


By combining human expertise with agentic AI, you can:

This course equips you to move beyond brittle prompts into orchestration, where AI becomes a programmable, composable part of your workflow.


Course Highlights



Course Outline


Part 1 – Foundations of Agentic RE

AI here is a computational and systems layer.

You'll learn the fundamentals of how LLMs operate — tokenization, embeddings, quantization — and what those mean for reverse engineering tasks. We'll cover considerations for system design, how to enhance LLMs with MCP-exposed tools, and the client–server architecture that makes interfacing with models possible.


Part 2 – Extending the Stack: Custom MCP Servers

AI here is an environment you control.

With the foundational stack running, you'll move from being a user to a builder. This section focuses on extending your private AI ecosystem by creating custom Model Context Protocol (MCP) servers that expose powerful static analysis and reverse engineering tools to your LLMs.


Part 3 – Custom MCPs & Training LLMs

AI here is a programmable collaborator.

LLMs alone can't introspect binaries the way RE demands, but MCP lets you expose structured tools and data. You'll learn to build advanced MCP servers and then train your models to better understand the RE/VR domain.


Part 4 – Orchestration, HUDs & Integrated Capstone

AI here is a workflow partner.

Beyond prompts, you'll explore how to build advanced workflows that combine traditional RE tools with MCP-exposed services or direct execution. You'll design RE HUDs that visualize and coordinate these workflows, inserting agentic RE agents where they add value, and integrating validation steps to improve reliability. Ultimately, you'll learn to build a hybrid architecture that combines deterministic RE tools with reasoning agents — grounding generative AI in the outputs of real analysis tools to prevent hallucinations and ensure trustworthy results.


Who Should Attend



Prerequisites


No prior experience with LLMs or AI frameworks is required—we'll cover the fundamentals before diving into advanced orchestration.


Technology Stack



Practical Takeaways


By the end of this course, participants will walk away with:


Related AI/RE/VR Content




BIO


John McIntosh John McIntosh, @clearbluejar, is a security researcher at Clearseclabs. His area of expertise lies within reverse engineering and offensive security, where he demonstrates proficiency in binary analysis, patch diffing, and vulnerability discovery. Notably, John has developed multiple open-source security tools for vulnerability research, all of which are accessible on his GitHub page. Additionally, his website, https://clearbluejar.github.io/, features detailed write-ups on reversing recent CVEs and building RE tooling with Ghidra. Boasting over a decade of experience in offensive security, John is a distinguished presenter and educator at prominent security conferences internationally. He maintains a fervent commitment to sharing his latest research, acquiring fresh perspectives on binary analysis, and engaging in collaborative efforts with fellow security enthusiasts.

https://www.clearseclabs.com/
https://clearbluejar.github.io/



To Register

Click here to register.


Hex-Rays Magnet Forensics Trail of Bits