#Ghidra v11.4 dropped:
https://github.com/NationalSecurityAgency/ghidra/releases/tag/Ghidra_11.4_build
#ghidra #decompiler #disassembler #reverseengineering #debugger
Check out the links in this thread as well, if you are interested how the games made with discrete components work: old.reddit.com/r/retrogamed...
#retrodev #retrogaming #emudev #emulation #fpga #reverseengineering #retrocomputing
RE: https://bsky.app/profile/did:plc:3jc4a37umreirp4z6rj37vgt/post/3lsevp4jkjj2x
Original Pong did not have any...
WIP Modernized Disassembly of Aleksi Eeben's #GameBoy Carillon Player music engine
github.com/coffeevalenb...
#retrodev #retrogaming #gbdev #reverseengineering
GitHub - coffeevalenbat/carill...
Sliver too mainstream? Cobalt Strike too patched? Say hello to Havoc.
@FortiGuardLabs just broke down a malicious Havoc C2 sample — and it’s bringing that open-source, post-exploitation energy with extra attitude.
Built for red teamers but abused by threat actors, this sample goes full dark mode:
It’s like someone asked: “What if malware devs went full GitHub?” (never go full GitHub)
🔗 Full breakdown:
https://www.fortinet.com/blog/threat-research/dissecting-a-malicious-havoc-sample
TL;DR for blue teamers:
Is it threat emulation or a real attack?
— Blue teamer having a full-blown identity crisis at 2am
Shoutout to @xpzhang and team for their amazing work!
#ThreatIntel #MalwareAnalysis #HavocC2 #RedTeamTools #PostExploitation #Infosec #BlueTeam #ReverseEngineering #CyberSecurity
🧵1/X Unboxing the #MSM8916 based M9S-E LCD Modem WiFi ("5G", but not really)
After the huge success of Debian on the #OpenStick LTE USB dongle three years ago, I wondered if you can still get MSM8916-based LTE routers to run Debian on. The search results on AliExpress piqued me: there is a new 17€ device with a color LCD screen!
Fast forward two weeks, it's here. Fasten your seatbelts to see how it works (and how it doesn't).
#Hacking #Windows Course (Chapter 3: Hacking Hello World x86) - This chapter covers the dynamic reverse engineering analysis, hacking, of the Hello World app in x86 Assembly.
#ReverseEngineering
https://github.com/mytechnotalent/Hacking-Windows
Video Game Preservation Through Decompilation
For those interested, below you can read more about this great moddable single-chip #Commodore64 hardware reimplementation known as #C64 Direct-to-TV (C64DTV)
#retrodev #reverseengineering #emudev #retrocomputing #retrogaming #commodore
RE: https://bsky.app/profile/did:plc:kt7ghtqndlzvtrhtsenushk4/post/3lsauy7mg2s2p
C64 Direct-to-TV - Wikipedia
R.E.L.I.V.E. #opensource reimplementation of Abe's Oddysee / Exoddus for modern platforms (+improvements & level editor) based on #reverseengineering
aliveteam.github.io
#Modding support, see e.g. early version of Abe HD
reddit.com/r/oddworld/c...
#retrodev #psxdev #retrogaming #oddworld #psx
Oddworld: Abe's Exoddus HD Rem...
#Hacking #Embedded #Rust Course (Chapter 4: How It Works (Step-By-Step)) - This chapter covers the project step-by-step of Reverse Engineering Rust Pico.
#ReverseEngineering
https://github.com/mytechnotalent/rust_embassy_pico_project/blob/main/Hacking_Embedded_Rust.pdf
#Hacking #Windows Course (Chapter 2: Debugging Hello World x86) - This chapter covers the dynamic reverse engineering analysis, debugging, of the Hello World app in x86 Assembly.
#ReverseEngineering
https://github.com/mytechnotalent/Hacking-Windows
And for those who are interested in how the original #arcade version of Space Invaders work, check out this #reverseengineering project:
computerarcheology.com/Arcade/Space...
#retrodev #retrogaming #assembler #coding #programming #gamedev
RE: https://bsky.app/profile/did:plc:io6owsze2yxsfsl2cd7znmik/post/3lrxu7v3lgk2h
Space Invaders
Unfortunately, most of the spicy file names in the NX mini firmware are dead ends - not referenced by any code.
There is code for USB PTP/MTP (not officially supported by the camera?!), and that code has a vendor extension to run (undocumented) "Samsung adjust scripts" over MTP. It just seems to not be called from anywhere either. Creating "i:\ptpconnect.txt" doesn't change how the camera is reporting over USB. Maybe there is another trick?
The Samsung NX mini firmware, once uncompressed, is full of ominous file name references on the SD card (drive I:\), each of them a story of in-camera debugging by the developers.
So far I only followed "makelog.txt", which will create detailed log files of the in-camera browser when uploading photos. But "iperf.txt" and "SampleProductOn.txt" and "zoom.txt" sound very exciting as well!
And the #nakeddiefriday comes back with a bang. Today's guest is a Philips product, p/n PCB83C851. This is a 8051 derivative, of which Philips made quite a few.
I'll do a short tour thread with a small bonus at the end.
SiPron page:https://siliconpr0n.org/archive/doku.php?id=infosecdj:philips:pcb83c851
#Hacking #Embedded #Rust Course (Chapter 3: Project Structure) - This chapter covers the project structure of Reverse Engineering Rust Pico.
#ReverseEngineering
https://github.com/mytechnotalent/rust_embassy_pico_project/blob/main/Hacking_Embedded_Rust.pdf
I'm spent, but strangely satisfied. Just need to put things in order now.
Here's a preview for tomorrow. #reverseengineering
Grabbed a highlight from Sunday's #pinball hacking #stream where I explain what I'm working on and how it fits into my project to a chatter who dropped in.
A good overview if you're interested in my work reverse-engineering Data East's Time Machine so I can add my own enhancements to the code.
https://www.twitch.tv/gandalfdagreat/v/2489738146?sr=a
#reverseEngineering #mc6800 #disassembly #pinMAME #MAME #C #Livestream #twitch #hacking #retroComputing
#Hacking #Windows Course (Chapter 1: Hello World) - This chapter covers the basics of designing a very simple Windows Assembly Language message box program in pure Assembly for both x86 and x64 architectures. #ReverseEngineering
https://github.com/mytechnotalent/Hacking-Windows