social.tchncs.de is one of the many independent Mastodon servers you can use to participate in the fediverse.
A friendly server from Germany – which tends to attract techy people, but welcomes everybody. This is one of the oldest Mastodon instances.

Administered by:

Server stats:

3.8K
active users

#reverseengineering

16 posts15 participants1 post today
IT News<p>Modernizing an Enigma Machine - This project by [Miro] is awesome, not only did he build a replica Enigma machine ... - <a href="https://hackaday.com/2025/04/17/modernizing-an-enigma-machine/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/04/17/modern</span><span class="invisible">izing-an-enigma-machine/</span></a> <a href="https://schleuss.online/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://schleuss.online/tags/debruijnsequence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>debruijnsequence</span></a> <a href="https://schleuss.online/tags/retrocomputing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>retrocomputing</span></a> <a href="https://schleuss.online/tags/enigmamachine" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>enigmamachine</span></a> <a href="https://schleuss.online/tags/encryption" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>encryption</span></a> <a href="https://schleuss.online/tags/pogopin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pogopin</span></a> <a href="https://schleuss.online/tags/enigma" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>enigma</span></a></p>
Epieos<p>🎟️ WIN YOUR TICKET to <a href="https://infosec.exchange/tags/OffensiveCon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OffensiveCon</span></a> 2025!</p><p>👨‍💻 At Epieos, we only recruit highly technical profiles, experts passionate about <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a>, to find new <a href="https://infosec.exchange/tags/OSINT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSINT</span></a> techniques that will be used by law enforcement and government agencies in investigations related to child abuse, counter-terrorism, and more.</p><p>🎯 That’s why we’ll be attending OffensiveCon, a highly technical international security conference, AND because passion is meant to be shared, we’re giving away one <a href="https://infosec.exchange/tags/ticket" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ticket</span></a> to the event.</p><p>🎁 To enter: </p><p>✅ Follow <span class="h-card" translate="no"><a href="https://infosec.exchange/@epieos" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>epieos</span></a></span><br>👍 Like this post<br>💬 Comment "I’m in"</p><p>🗓️ The winner will be contacted on April 30.</p><p>🇩🇪 See you in Berlin, May 16-17, 2025.</p>
Kevin Thomas ✅<p>Today we broke 12k stars on <a href="https://defcon.social/tags/GitHub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitHub</span></a> remaining #1 on Reverse Engineering there and #1 for, “Reverse Engineering Tutorial” on Google. Thanks again for all of your continued support to help get new folks free training on <a href="https://defcon.social/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReverseEngineering</span></a> for everyone! <a href="https://github.com/mytechnotalent/Reverse-Engineering" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/mytechnotalent/Reve</span><span class="invisible">rse-Engineering</span></a></p>
HN Security<p>There’s a new entry in our <a href="https://infosec.exchange/tags/Rust" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Rust</span></a> tool suite designed to assist with <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> and <a href="https://infosec.exchange/tags/vulnerabilityresearch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilityresearch</span></a> against binary targets!<br> <br>Oneiromancer by <span class="h-card" translate="no"><a href="https://infosec.exchange/@raptor" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>raptor</span></a></span> uses the locally running aidapal LLM by <span class="h-card" translate="no"><a href="https://infosec.exchange/@atredis" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>atredis</span></a></span> to analyze and improve <a href="https://infosec.exchange/tags/IDA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IDA</span></a> pseudo-code.<br> <br><a href="https://security.humanativaspa.it/aiding-reverse-engineering-with-rust-and-a-local-llm" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">security.humanativaspa.it/aidi</span><span class="invisible">ng-reverse-engineering-with-rust-and-a-local-llm</span></a></p>
N-gated Hacker News<p>Ah yes, nothing screams "cutting-edge tech genius" like spending 68 minutes reverse engineering a fan to escape the tyranny of its app. 🌬️🔧 Instead of enjoying clean air, let's devote our weekends to making sure our air purifier can join the unified utopia of Home Assistant—because who needs a social life when you can have a cloud-free smart home? 😂🏠<br><a href="https://jmswrnr.com/blog/hacking-a-smart-home-device" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">jmswrnr.com/blog/hacking-a-sma</span><span class="invisible">rt-home-device</span></a> <a href="https://mastodon.social/tags/cuttingedge" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cuttingedge</span></a> <a href="https://mastodon.social/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://mastodon.social/tags/smarthome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>smarthome</span></a> <a href="https://mastodon.social/tags/HomeAssistant" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HomeAssistant</span></a> <a href="https://mastodon.social/tags/techhumor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>techhumor</span></a> <a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/ngated" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ngated</span></a></p>
Recon<p>Recon CFP ends in less than 2 weeks on April 28. Prices for the training and conference increase on May 1st. Register now to save with early bird price. We have already announced a few talks and workshops, and more videos from last year have been released. <a href="https://recon.cx" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">recon.cx</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/offensivesecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offensivesecurity</span></a> <a href="https://infosec.exchange/tags/hardwarehacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hardwarehacking</span></a> <span class="h-card" translate="no"><a href="https://infosec.exchange/@hackingump1" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>hackingump1</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@mr_phrazer" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>mr_phrazer</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@nicolodev" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>nicolodev</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@SinSinology" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>SinSinology</span></a></span> @hunterbr72 <span class="h-card" translate="no"><a href="https://infosec.exchange/@clearbluejar" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>clearbluejar</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@phLaul" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>phLaul</span></a></span> @oryair1999 <span class="h-card" translate="no"><a href="https://infosec.exchange/@hookgab" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>hookgab</span></a></span> @TheQueenofELF @So11Deo6loria <span class="h-card" translate="no"><a href="https://infosec.exchange/@i0n1c" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>i0n1c</span></a></span> @pedrib1337 @MalachiJonesPhD @Pat_Ventuzelo @KB_Intel @pinkflawd @Reverse_Tactics @OnlyTheDuck <span class="h-card" translate="no"><a href="https://infosec.exchange/@t0nvi" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>t0nvi</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@drch40s" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>drch40s</span></a></span> @BrunoPujos @mhoste1 @andreyknvl @texplained_RE <span class="h-card" translate="no"><a href="https://infosec.exchange/@jsmnsr" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>jsmnsr</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@pulsoid" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>pulsoid</span></a></span> @SpecterDev <span class="h-card" translate="no"><a href="https://infosec.exchange/@richinseattle" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>richinseattle</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@yarden_shafir" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>yarden_shafir</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@aionescu" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>aionescu</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@hackerschoice" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>hackerschoice</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@SinSinology" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>SinSinology</span></a></span> @sergeybratus <span class="h-card" translate="no"><a href="https://infosec.exchange/@SpecterOps" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>SpecterOps</span></a></span> @oryair1999 <span class="h-card" translate="no"><a href="https://infosec.exchange/@phLaul" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>phLaul</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@trailofbits" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>trailofbits</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@HexRaysSA" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>HexRaysSA</span></a></span> <span class="h-card" translate="no"><a href="https://infosec.exchange/@nostarch" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>nostarch</span></a></span></p>
Alexandre Borges<p>Unlocking secret ThinkPad functionality for emulating USB devices:</p><p><a href="https://xairy.io/articles/thinkpad-xdci" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">xairy.io/articles/thinkpad-xdci</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://infosec.exchange/tags/hardware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hardware</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Alexandre Borges<p>Unlocking secret ThinkPad functionality for emulating USB devices:</p><p><a href="https://xairy.io/articles/thinkpad-xdci" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">xairy.io/articles/thinkpad-xdci</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://mastodon.social/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.social/tags/hardware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hardware</span></a> <a href="https://mastodon.social/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
IT News<p>A Tricky Commodore PET Repair and a Lesson About Assumptions - The PET opened, showing the motherboard. (Credit: Ken Shirriff)<br>An unavoidable par... - <a href="https://hackaday.com/2025/04/14/a-tricky-commodore-pet-repair-and-a-lesson-about-assumptions/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/04/14/a-tric</span><span class="invisible">ky-commodore-pet-repair-and-a-lesson-about-assumptions/</span></a> <a href="https://schleuss.online/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://schleuss.online/tags/retrocomputing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>retrocomputing</span></a> <a href="https://schleuss.online/tags/computerrepair" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>computerrepair</span></a> <a href="https://schleuss.online/tags/commodorepet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>commodorepet</span></a> <a href="https://schleuss.online/tags/repairhacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>repairhacks</span></a></p>
IT News<p>Introducing Infrared Remote Control Protocols - Over on his YouTube channel [Electronic Wizard] has released a video that explains... - <a href="https://hackaday.com/2025/04/13/introducing-infrared-remote-control-protocols/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/04/13/introd</span><span class="invisible">ucing-infrared-remote-control-protocols/</span></a> <a href="https://schleuss.online/tags/hs0038infraredreceivermodule" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hs0038infraredreceivermodule</span></a> <a href="https://schleuss.online/tags/rigolds1102oscilloscope" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>rigolds1102oscilloscope</span></a> <a href="https://schleuss.online/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://schleuss.online/tags/wirelesshacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wirelesshacks</span></a> <a href="https://schleuss.online/tags/remotecontrol" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>remotecontrol</span></a> <a href="https://schleuss.online/tags/infrared" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infrared</span></a> <a href="https://schleuss.online/tags/ir" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ir</span></a></p>
Miguel Afonso Caetano<p>"Donald Trump’s tariffs demand a response. Around the world, that response has defaulted to retaliatory tariffs — a strategy with severe and obvious drawbacks. After years of pandemic shocks and greedflation, people around the globe have severe inflation fatigue, and few governments are eager to risk further price hikes. And while the world is rightly furious at Trump’s talk of annexation and other belligerent acts, that anger is unlikely to translate into popular support for higher prices on everyday goods. If there’s one lesson that politicians everywhere have metabolized over the past twenty-four months, it’s that any government that presides over inflationary price rises is likely to be out of a job come the next election.</p><p>Luckily there is another policy response to tariffs — one that will substantially lower prices for America’s tariff-clobbered trading partners while incubating profitable, export-oriented domestic tech firms. These firms could sell tools and services to local businesses, to the benefit of the world’s news and culture industries, software firms, and consumers alike.</p><p>That response? Repealing “anticircumvention laws” that prohibits domestic firms from reverse-engineering “digital locks.” These anticircumvention laws stop the world’s farmers from fixing their John Deere tractors; they stop mechanics from diagnosing your car; they stop technologists from creating their own app stores for phones and games consoles."</p><p><a href="https://jacobin.com/2025/04/ip-anticircumvention-tech-trump-tariffs" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">jacobin.com/2025/04/ip-anticir</span><span class="invisible">cumvention-tech-trump-tariffs</span></a></p><p><a href="https://tldr.nettime.org/tags/USA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>USA</span></a> <a href="https://tldr.nettime.org/tags/Trump" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Trump</span></a> <a href="https://tldr.nettime.org/tags/Tariffs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tariffs</span></a> <a href="https://tldr.nettime.org/tags/IP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IP</span></a> <a href="https://tldr.nettime.org/tags/Copyright" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Copyright</span></a> <a href="https://tldr.nettime.org/tags/Patents" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Patents</span></a> <a href="https://tldr.nettime.org/tags/AnticircumventionLaws" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AnticircumventionLaws</span></a> <a href="https://tldr.nettime.org/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://tldr.nettime.org/tags/DRM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DRM</span></a></p>
ilias :thepiratebay:<p>bookmarking this because one of my future ideas would be to attempt reverse engineering Hikvision cameras used in British supermarkets – after dealing with more urgent issues and having more relaxed schedule :eyes_opposite: </p><p><a href="https://www.youtube.com/playlist?list=PLuyjXiwnBIa3MNgOjzTqBc-_5t8bn94ub" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">youtube.com/playlist?list=PLuy</span><span class="invisible">jXiwnBIa3MNgOjzTqBc-_5t8bn94ub</span></a></p><p><a href="https://mstdn.social/tags/Embedded" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Embedded</span></a> <a href="https://mstdn.social/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReverseEngineering</span></a></p>
IT News<p>Hacking a Cheap Rechargeable Lamp With Non-Standard USB-C Connector - The “USB C” cable that comes with the Inaya Portable Rechargeable Lamp. (Credit: T... - <a href="https://hackaday.com/2025/04/12/hacking-a-cheap-rechargeable-lamp-with-non-standard-usb-c-connector/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/04/12/hackin</span><span class="invisible">g-a-cheap-rechargeable-lamp-with-non-standard-usb-c-connector/</span></a> <a href="https://schleuss.online/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://schleuss.online/tags/teardown" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>teardown</span></a> <a href="https://schleuss.online/tags/esp32" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>esp32</span></a> <a href="https://schleuss.online/tags/usbc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>usbc</span></a></p>
hubertf<p>Speaking of decompiling strings and registers: if you have larger registers like the modern x86 xmm/ymm/zmm 128/256/512 bit registers, you can put even longer strings into less "mov" instructions - see ghidra image.</p><p>More: <a href="https://en.wikipedia.org/wiki/Advanced_Vector_Extensions" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">en.wikipedia.org/wiki/Advanced</span><span class="invisible">_Vector_Extensions</span></a></p><p><a href="https://mastodon.social/tags/ctf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ctf</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://mastodon.social/tags/reverse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverse</span></a> <a href="https://mastodon.social/tags/xmm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>xmm</span></a> <a href="https://mastodon.social/tags/x86" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>x86</span></a></p>
Lenin alevski 🕵️💻<p>New Open-Source Tool Spotlight 🚨🚨🚨</p><p>Want a Windows VM tailored for malware analysis and reverse engineering? FLARE-VM automates setup with Chocolatey and Boxstarter, offering a curated toolbox. Just meet the requirements: Win10+, PowerShell5+, 60GB+ disk. Ideal for secure sandboxing. <a href="https://infosec.exchange/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://infosec.exchange/tags/MalwareAnalysis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MalwareAnalysis</span></a></p><p>🔗 Project link on <a href="https://infosec.exchange/tags/GitHub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitHub</span></a> 👉 <a href="https://github.com/fireeye/flare-vm" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/fireeye/flare-vm</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Software" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Software</span></a> <a href="https://infosec.exchange/tags/Technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Technology</span></a> <a href="https://infosec.exchange/tags/News" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>News</span></a> <a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CTF</span></a> <a href="https://infosec.exchange/tags/Cybersecuritycareer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecuritycareer</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/purpleteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>purpleteam</span></a> <a href="https://infosec.exchange/tags/tips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tips</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudsecurity</span></a></p><p>— ✨<br>🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️</p>
「ʀᴏʙᴇʀᴛ」<p><a href="https://c.im/tags/Remeha" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Remeha</span></a> R-Bus monitor, ready to hook up to sniff comms between my <a href="https://c.im/tags/Elga" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Elga</span></a> Ace heatpump and the <a href="https://c.im/tags/eTwist" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>eTwist</span></a> thermostat.</p><p>Hoping to help out with this project: <a href="https://github.com/pepijndevos/R-Bus/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/pepijndevos/R-Bus/</span><span class="invisible"></span></a></p><p><a href="https://c.im/tags/homeassistant" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>homeassistant</span></a> <a href="https://c.im/tags/homeautomation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>homeautomation</span></a> <a href="https://c.im/tags/esphome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>esphome</span></a> <a href="https://c.im/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a></p>
pancake :radare2:<p>Comparing <a href="https://infosec.exchange/tags/meta" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>meta</span></a> <a href="https://infosec.exchange/tags/llama" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>llama</span></a> 4 (maverick / scout) vs <a href="https://infosec.exchange/tags/qwen" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>qwen</span></a> 32b for decompilation purposes <a href="https://infosec.exchange/tags/r2ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>r2ai</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <br>PD: groq is the best place to try all these models if you don't have the hardware<br>PD: qwen-qwq reasoning takes more time, but improves the output, much better than openai/claude/meta for decompilation usecases</p>
pancake :radare2:<p>If anyone is curious about r2mcp, yes, it now runs in local with openwebui and mcpo <a href="https://infosec.exchange/tags/r2ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>r2ai</span></a> <a href="https://infosec.exchange/tags/radare2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>radare2</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/llm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>llm</span></a></p>
Breathing Retro<p>Don't forget to check out this Space Cadet <a class="hashtag" href="https://bsky.app/search?q=%23pinball" rel="nofollow noopener noreferrer" target="_blank">#pinball</a> <a class="hashtag" href="https://bsky.app/search?q=%23reverseengineering" rel="nofollow noopener noreferrer" target="_blank">#reverseengineering</a> effort and ports for platforms old and new: <a href="https://github.com/k4zmu2a/SpaceCadetPinball" rel="nofollow noopener noreferrer" target="_blank">github.com/k4zmu2a/Spac...</a> <a class="hashtag" href="https://bsky.app/search?q=%23retrodev" rel="nofollow noopener noreferrer" target="_blank">#retrodev</a> <a class="hashtag" href="https://bsky.app/search?q=%23homebrew" rel="nofollow noopener noreferrer" target="_blank">#homebrew</a> <a class="hashtag" href="https://bsky.app/search?q=%23windowsxp" rel="nofollow noopener noreferrer" target="_blank">#windowsxp</a> <a class="hashtag" href="https://bsky.app/search?q=%23retrocomputing" rel="nofollow noopener noreferrer" target="_blank">#retrocomputing</a> <a class="hashtag" href="https://bsky.app/search?q=%23gamedev" rel="nofollow noopener noreferrer" target="_blank">#gamedev</a> <a class="hashtag" href="https://bsky.app/search?q=%23coding" rel="nofollow noopener noreferrer" target="_blank">#coding</a> <a class="hashtag" href="https://bsky.app/search?q=%23programming" rel="nofollow noopener noreferrer" target="_blank">#programming</a> Also...<br><br>RE: <a href="https://bsky.app/profile/did:plc:lxj6fo7atoir35pvn3idij42/post/3lmerdmfnis2d" rel="nofollow noopener noreferrer" target="_blank">https://bsky.app/profile/did:plc:lxj6fo7atoir35pvn3idij42/post/3lmerdmfnis2d</a><br><br><a href="https://github.com/k4zmu2a/SpaceCadetPinball" rel="nofollow noopener noreferrer" target="_blank">GitHub - k4zmu2a/SpaceCadetPin...</a></p>
hubertf<p>When decompiling, function calls may not be immediately obvious due to compilers doing optimizations like built-in functions and unrolling loops. E.g. a strcpy() for a fixed string may become a series of x86 "mov" instructions to avoid function call and loop overhead.</p><p>See also: <a href="https://gcc.gnu.org/onlinedocs/gcc/Built-in-Functions.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">gcc.gnu.org/onlinedocs/gcc/Bui</span><span class="invisible">lt-in-Functions.html</span></a></p><p><a href="https://mastodon.social/tags/ctf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ctf</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://mastodon.social/tags/re" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>re</span></a> <a href="https://mastodon.social/tags/ghidra" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ghidra</span></a> <a href="https://mastodon.social/tags/decompile" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>decompile</span></a></p>