Resurrecting Crimsonland
Resurrecting Crimsonland
Resurrecting Crimsonland https://lobste.rs/s/et8pfu #games #reversing
https://banteg.xyz/posts/crimsonland/
Defeating a 40-year-old copy protection dongle https://lobste.rs/s/lk7gze #retrocomputing #reversing
https://dmitrybrant.com/2026/02/01/defeating-a-40-year-old-copy-protection-dongle
Exploiting MediaTek's Download Agent https://lobste.rs/s/tyrur6 #reversing
https://blog.r0rt1z2.com/posts/exploiting-mediatek-datwo/
How Apple Hooks Fifty Thousand Methods https://lobste.rs/s/g9mizf #video #mac #reversing
https://www.youtube.com/watch?v=SuQGQ1vh9k0
Help #Reversing.works empower workers by testing our tool
Reversing.works is looking for technical beta testers. Help us test #WebUSB Unpinner, a tool critical for worker susveillance.
https://reversing.works/posts/2026/01/help-reversing.works-empower-workers-by-testing-our-tool/
Released v1.3.3. of #Yaralyzer, my surprisingly popular tool for visualizing YARA rule matches with colors (a lot of colors).
1. --export-png images lets you export images of the analysis
2. almost all command line options (including multi argument ones like --yara-rules-dir) can be permanently set via environment variables or .yaralyzer file
3. couple of small bug fixes and debugging related command line options
You can try it on the web here: https://yaratoolkit.securitybreak.io/
(I didn't build this website, Thomas Roccia from Microsoft just integrated Yaralyzer into his existing site)
- Github: https://github.com/michelcrypt4d4mus/yaralyzer
- Pypi: https://pypi.org/project/yaralyzer/
- on macOS you can also get it with #Homebrew by installing Pdfalyzer: brew install pdfalyzer
#ascii #asciiArt #blueteam #cybersecurity #detectionEngineering #DFIR #forensics #FOSS #GPL #hacking #infosec #KaliLinux #maldoc #malware #malwareAnalysis #malwareDetection #openSource #pypi #python #redteam #reverseEngineering #reversing #Threatassessment #threathunting #YARA #YARArule #YARArules
JuiceSSH - Give me my pro features back https://lobste.rs/s/luhxc7 #java #reversing
https://nproject.io/blog/juicessh-give-me-back-my-pro-features/
Gas Town’s Agent Patterns, Design Bottlenecks, and Vibecoding at Scale https://lobste.rs/s/au4xen #historical #reversing #vibecoding
https://maggieappleton.com/gastown
Tech behind bringing back games https://lobste.rs/s/hhspys #video #games #reversing
https://youtube.com/watch?v=1mqVEF-JRbE
Спасаем Бингус, и как я поправил ИИ помощника. Мануал для новичков
Ещё одна очередная задачка! На этот раз нам предстоит спасти нашего друга! Bingus'а! Давайте же спасём его! А ещё посмотрим на то как ИИ к сожалению, не смогла помочь нам. Спасти Bingus
https://habr.com/ru/articles/988732/
#реверсинжиниринг #декодирование #reverseengineering #reversing #ghidra #crackme #скриптинг #си
Notes on the Intel 8086 processor's arithmetic-logic unit https://lobste.rs/s/mjsevf #hardware #historical #reversing
http://www.righto.com/2026/01/notes-on-intel-8086-processors.html
📆 Are you looking to spend your training budget for 2026?
🦀 Are you struggling with reversing Rust binaries, and not even sure where to get started?
🇨🇦 Are you looking for high-quality technical training located in Canada?
Consider our 3-day training, "Deconstructing Rust Binaries", at @NorthSec from May 11-13 in Montréal: https://nsec.io/training/2026-deconstructing-rust-binaries/
This is the first comprehensive training course focused solely on reverse engineering Rust binaries. You will learn how to effectively triage Rust binaries, how to trace data flow through Rust binaries, and how to tackle common techniques found in the Rust malware ecosystem. Real Rust malware samples are used in the course, ensuring that you have the practical skills to tackle your next Rust sample.
Early bird pricing is available now until Feb. 28th! https://registrations.nsec.io/northsec/2026/
#rust #rustlang #ReverseEngineering #reversing #infosec #MalwareAnalysis #malware #InfosecTraining
Drone Hacking Part 1: Dumping Firmware and Bruteforcing ECC https://lobste.rs/s/xqsqsm #cryptography #hardware #reversing
https://neodyme.io/en/blog/drone_hacking_part_1
When we say "struct" we generally are referring to C structs. Now that Go, Rust, etc, implement structs that sort of act like classes, should we start explicitly calling them C structs to differentiate from Go/Rust structs?
V16 beacon full uplink conversation https://lobste.rs/s/fr9s2n #networking #reversing
https://destevez.net/2026/01/v16-beacon-full-uplink-conversation/
RustyWater (aka RUSTRIC, Archer RAT) has been added to the Rust Malware Sample Gallery: https://github.com/decoderloop/rust-malware-gallery#rustywater
#rust #rustlang #malware #infosec #ReverseEngineering #MalwareAnalysis #reversing #MuddyWater
Comparative Analysis of Low-Dimensional Features and Tree-Based Ensembles for Malware Detection Systems (2020) https://lobste.rs/s/2fejib #pdf #compsci #reversing
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9057637