#ReverseEngineering

WIP Modernized Disassembly of Aleksi Eeben's #GameBoy Carillon Player music engine github.com/coffeevalenb... #retrodev #retrogaming #gbdev #reverseengineering

GitHub - coffeevalenbat/carill...

2025-06-24

Sliver too mainstream? Cobalt Strike too patched? Say hello to Havoc.

@FortiGuardLabs just broke down a malicious Havoc C2 sample — and it’s bringing that open-source, post-exploitation energy with extra attitude.

Built for red teamers but abused by threat actors, this sample goes full dark mode:

  • Shellcode loader in C++
  • AES-encrypted payload
  • XOR junk code to slow reverse engineering
  • Dynamic API resolving
  • LOLBin delivery via regsvr32

It’s like someone asked: “What if malware devs went full GitHub?” (never go full GitHub)

🔗 Full breakdown:
fortinet.com/blog/threat-resea

TL;DR for blue teamers:

  • Havoc ≠ harmless just because it’s open source
  • Monitor regsvr32, rundll32, mshta — Havoc loves its LOLBins
  • Watch for process injection + thread creation anomalies
  • Memory analysis > file-based detection here
  • Don’t assume your EDR is catching every beacon on port 443

Is it threat emulation or a real attack?

— Blue teamer having a full-blown identity crisis at 2am

Shoutout to @xpzhang and team for their amazing work!

#ThreatIntel #MalwareAnalysis #HavocC2 #RedTeamTools #PostExploitation #Infosec #BlueTeam #ReverseEngineering #CyberSecurity

2025-06-24

🧵1/X Unboxing the #MSM8916 based M9S-E LCD Modem WiFi ("5G", but not really)

After the huge success of Debian on the #OpenStick LTE USB dongle three years ago, I wondered if you can still get MSM8916-based LTE routers to run Debian on. The search results on AliExpress piqued me: there is a new 17€ device with a color LCD screen!

Fast forward two weeks, it's here. Fasten your seatbelts to see how it works (and how it doesn't).

#ReverseEngineering #Qualcomm #Android

Photo of a black plastic device with rounded corners and a shitty LCD screen in the middle, with labels reading "Modem WiFi" and "5G".
2025-06-24

#Hacking #Windows Course (Chapter 3: Hacking Hello World x86) - This chapter covers the dynamic reverse engineering analysis, hacking, of the Hello World app in x86 Assembly.
#ReverseEngineering
github.com/mytechnotalent/Hack

Video Game Preservation Through Decompilation

lemmy.world/post/31892091

For those interested, below you can read more about this great moddable single-chip #Commodore64 hardware reimplementation known as #C64 Direct-to-TV (C64DTV) #retrodev #reverseengineering #emudev #retrocomputing #retrogaming #commodore

RE: https://bsky.app/profile/did:plc:kt7ghtqndlzvtrhtsenushk4/post/3lsauy7mg2s2p


C64 Direct-to-TV - Wikipedia

R.E.L.I.V.E. #opensource reimplementation of Abe's Oddysee / Exoddus for modern platforms (+improvements & level editor) based on #reverseengineering aliveteam.github.io #Modding support, see e.g. early version of Abe HD reddit.com/r/oddworld/c... #retrodev #psxdev #retrogaming #oddworld #psx

Oddworld: Abe's Exoddus HD Rem...

2025-06-23

#Hacking #Embedded #Rust Course (Chapter 4: How It Works (Step-By-Step)) - This chapter covers the project step-by-step of Reverse Engineering Rust Pico.
#ReverseEngineering
github.com/mytechnotalent/rust

2025-06-22

#Hacking #Windows Course (Chapter 2: Debugging Hello World x86) - This chapter covers the dynamic reverse engineering analysis, debugging, of the Hello World app in x86 Assembly.
#ReverseEngineering
github.com/mytechnotalent/Hack

2025-06-21

Unfortunately, most of the spicy file names in the NX mini firmware are dead ends - not referenced by any code.

There is code for USB PTP/MTP (not officially supported by the camera?!), and that code has a vendor extension to run (undocumented) "Samsung adjust scripts" over MTP. It just seems to not be called from anywhere either. Creating "i:\ptpconnect.txt" doesn't change how the camera is reporting over USB. Maybe there is another trick?

#ReverseEngineering #SamsungNX #USB

Ghidra screenshot, showing the beginning of USBPtpCmd_AdjustScript() with a bunch of debug outputs dumping the USB payload
2025-06-20

The Samsung NX mini firmware, once uncompressed, is full of ominous file name references on the SD card (drive I:\), each of them a story of in-camera debugging by the developers.

So far I only followed "makelog.txt", which will create detailed log files of the in-camera browser when uploading photos. But "iperf.txt" and "SampleProductOn.txt" and "zoom.txt" sound very exciting as well!

#SamsungNX #ReverseEngineering #Firmware

Listing of txt file names obtained from the NX mini firmware file:

I:\%04d_BLACK_PIXEL_BOTTOM_%04d.txt
I:\%04d_BLACK_PIXEL_CENTER_%04d.txt
I:\%04d_BLACK_PIXEL_TOP_%04d.txt
I:\%04d.txt
I:\ALT_LOG_%d.TXT
I:\ALT_LOG_err_log_%d_%d.TXT
I:\ALT_LOG_err_log_%d.TXT
I:\autoip.txt
I:\AwbCaptureGain.txt
I:\ccdassy.txt
I:\changecnurl.txt
I:\channel.txt
I:\check_afstep.txt
I:\cs_adj.txt
I:\disableautoexit.txt
I:\dot11certi.txt
I:\fwup.txt
I:\Gv.txt
I:\homepage.txt
I:\hufftbl.txt
I:\idle.txt
I:\iperf.txt
I:\lcd_copy_rec.txt
I:\lcd_copy_s1.txt
I:\lenslog.txt
I:\loadrawmode.txt
I:\makelog.txt
I:\makememlog.txt
I:\maketerm.txt
I:\maxtimebusy.txt
I:\mic.txt
I:\nolens_card.txt
I:\nolens.txt
I:\nxmini_adj.txt
I:\production.txt
I:\ptpconnect.txt
I:\QA.txt
I:\roaming.txt
I:\SampleProductOff.txt
I:\SampleProductOn.txt
I:\saverawmode.txt
I:\sdio-cmd53.txt
I:\snr.txt
I:\%s%s%s%s%s.txt
I:\UART_%03d.txt
I:\zoom.txt
2025-06-20

And the #nakeddiefriday comes back with a bang. Today's guest is a Philips product, p/n PCB83C851. This is a 8051 derivative, of which Philips made quite a few.

I'll do a short tour thread with a small bonus at the end.

SiPron page:siliconpr0n.org/archive/doku.p

#reverseengineering #electronics #microscopy

Die overview shot
2025-06-20

#Hacking #Embedded #Rust Course (Chapter 3: Project Structure) - This chapter covers the project structure of Reverse Engineering Rust Pico.
#ReverseEngineering
github.com/mytechnotalent/rust

2025-06-19

I'm spent, but strangely satisfied. Just need to put things in order now.

Here's a preview for tomorrow. #reverseengineering

A mystery circuit! Whatever could it be...
2025-06-19

Grabbed a highlight from Sunday's #pinball hacking #stream where I explain what I'm working on and how it fits into my project to a chatter who dropped in.

A good overview if you're interested in my work reverse-engineering Data East's Time Machine so I can add my own enhancements to the code.
twitch.tv/gandalfdagreat/v/248

#reverseEngineering #mc6800 #disassembly #pinMAME #MAME #C #Livestream #twitch #hacking #retroComputing

2025-06-19

#Hacking #Windows Course (Chapter 1: Hello World) - This chapter covers the basics of designing a very simple Windows Assembly Language message box program in pure Assembly for both x86 and x64 architectures. #ReverseEngineering
github.com/mytechnotalent/Hack

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst