Reverse Engineering a Mysterious UDP Stream in My Hotel (2016)
https://www.gkbrk.com/hotel-music
#HackerNews #ReverseEngineering #UDPStream #HotelMystery #TechExploration #NetworkAnalysis
Reverse Engineering a Mysterious UDP Stream in My Hotel (2016)
https://www.gkbrk.com/hotel-music
#HackerNews #ReverseEngineering #UDPStream #HotelMystery #TechExploration #NetworkAnalysis
AMD entered the CPU market with reverse-engineered Intel 8080 clone 50 years ago
#HackerNews #AMD #Intel #CPU #History #ReverseEngineering #TechAnniversary
🦀 Looking for Rust malware samples to practice analyzing? Our Rust Malware Sample Gallery just received a major update, with 20 new families added! https://github.com/decoderloop/rust-malware-gallery
The Sample Gallery collects links to articles about malware written in Rust, organizes them by malware family, and includes a download link to a publicly available sample for every malware family. This is a resource for any malware analyst who wants to get hands-on with real Rust malware.
The last time the Sample Gallery was updated was almost 2 years ago, in January 2024. Since then, there's been an explosive growth in new Rust malware, including all of the following families that are now in the Sample Gallery:
SPICA, KrustyLoader, RustDoor, SSLoad, Fickle Stealer, Cicada3301 Ransomware, RustyClaw, Embargo Ransomware, RustyAttr, Akira Ransomware (both the Akira_v2 and Megazord variants), Banshee (Rust variant), RALord Ransomware, RustoBot, Tetra Loader, EDDIESTEALER, Myth Stealer, Rustonotto, RustyPages, ChaosBot
This is nearly one new Rust malware family observed in the wild, every month. Rust as a programming language for malware is here to stay!
#rust #rustlang #malware #infosec #ReverseEngineering #MalwareAnalysis #reversing
🦀 Looking for Rust malware samples to practice analyzing? Our Rust Malware Sample Gallery just received a major update, with 20 new families added! https://github.com/decoderloop/rust-malware-gallery
The Sample Gallery collects links to articles about malware written in Rust, organizes them by malware family, and includes a download link to a publicly available sample for every malware family. This is a resource for any malware analyst who wants to get hands-on with real Rust malware.
The last time the Sample Gallery was updated was almost 2 years ago, in January 2024. Since then, there's been an explosive growth in new Rust malware, including all of the following families that are now in the Sample Gallery:
SPICA, KrustyLoader, RustDoor, SSLoad, Fickle Stealer, Cicada3301 Ransomware, RustyClaw, Embargo Ransomware, RustyAttr, Akira Ransomware (both the Akira_v2 and Megazord variants), Banshee (Rust variant), RALord Ransomware, RustoBot, Tetra Loader, EDDIESTEALER, Myth Stealer, Rustonotto, RustyPages, ChaosBot
This is nearly one new Rust malware family observed in the wild, every month. Rust as a programming language for malware is here to stay!
#rust #rustlang #malware #infosec #ReverseEngineering #MalwareAnalysis #reversing
Reverse engineering a $1B Legal AI tool exposed 100k+ confidential files
https://alexschapiro.com/security/vulnerability/2025/12/02/filevine-api-100k
#HackerNews #ReverseEngineering #LegalAI #ConfidentialFiles #Security #Vulnerability #DataBreach
A Reverse Engineer's Anatomy of the macOS Boot Chain and Security Architecture
https://stack.int.mov/a-reverse-engineers-anatomy-of-the-macos-boot-chain-security-architecture/
#HackerNews #ReverseEngineering #macOS #BootChain #SecurityArchitecture #TechInsights #CyberSecurity
Just dropped: my RECON 2025 talk on Rust library recognition in malware! 🦀
I present RIFT—a tool that tackles one of the trickier problems in modern malware analysis, rust library recognition in malicious software.
https://youtu.be/_JiuYkFzVgg?si=7GAVhfyNOzLjPZnS
Worth a watch if you're into RE or malware research.
#malware #reverseengineering #cybersecurity #rift #microsoft
Reversing a Cinema Camera's Peripherals Port
https://3nt3.de/blog/reversing-fs7-comms
#HackerNews #Reversing #Cinema #Camera #Peripherals #Port #FilmTech #ReverseEngineering #CameraHacks
Reverse Engineering Yaesu FT-70D Firmware Encryption
https://landaire.net/reversing-yaesu-firmware-encryption/
#HackerNews #ReverseEngineering #Yaesu #FT70D #Firmware #Encryption #Hacking #Technology #RadioCommunications
I didn't reverse-engineer the protocol for my blood pressure monitor in 24 hours
https://james.belchamber.com/articles/blood-pressure-monitor-reverse-engineering/
#HackerNews #reverseengineering #bloodpressuremonitor #techstories #hackinghealthcare
Reverse engineering Codex CLI to get GPT-5-Codex-Mini to draw me a pelican
https://simonwillison.net/2025/Nov/9/gpt-5-codex-mini/
#HackerNews #ReverseEngineering #CodexCLI #GPT5 #CodexMini #Pelican #AIArt
Reverse engineering a neural network's clever solution to binary addition (2023)
https://cprimozic.net/blog/reverse-engineering-a-small-neural-network/
#HackerNews #ReverseEngineering #NeuralNetworks #BinaryAddition #AIResearch #2023 #Insights
Reverse-engineered CUPS driver for Phomemo receipt/label printers
https://github.com/vivier/phomemo-tools
#HackerNews #ReverseEngineering #CUPS #Phomemo #Printers #GitHub #OpenSource
Hello! Hello. It's #nakeddiefriday today, and I wanted to show you one of the older works. This is an automotive ASIC fabbed for Toyota, part number DF028. I do not know the function of this particular device.
SiPron page: https://siliconprawn.org/archive/doku.php?id=infosecdj:toyota:d028f
Hello! Hello. It's #nakeddiefriday today, and I wanted to show you one of the older works. This is an automotive ASIC fabbed for Toyota, part number DF028. I do not know the function of this particular device.
SiPron page: https://siliconprawn.org/archive/doku.php?id=infosecdj:toyota:d028f
My employer is doing a CTF and a lot of the remaining challenges involve #reverseengineering binaries. Any suggestions on a crash course I can put myself through to try and get some of these flags? The binaries are all Linux.
My employer is doing a CTF and a lot of the remaining challenges involve #reverseengineering binaries. Any suggestions on a crash course I can put myself through to try and get some of these flags? The binaries are all Linux.
Just dropped: my RECON 2025 talk on Rust library recognition in malware! 🦀
I present RIFT—a tool that tackles one of the trickier problems in modern malware analysis, rust library recognition in malicious software.
https://youtu.be/_JiuYkFzVgg?si=7GAVhfyNOzLjPZnS
Worth a watch if you're into RE or malware research.
#malware #reverseengineering #cybersecurity #rift #microsoft
And hey, since the weather is absolutely abysmal today, I will treat you to another die shot as an extension of #nakeddiefriday.
This is КР1810ВМ86, an otherwise identical clone of Intel 8086 made by Soviets at an unknown plant.
The 8086 was extensively reverse-engineered by @kenshirriff -- give his blog a read!
SiPron page: https://siliconprawn.org/archive/doku.php?id=infosecdj:unknown:kr1810vm86