#reverseEngineering

2025-07-11

☀️ This summer, put your #reverseengineering skills to work and earn money 💰 with Epieos!

🎯 Are you a student or a graduate with experience in reverse engineering, especially in mobile apps?

Get in touch with us at:
👉 contact[@]epieos[.]com

🔄 Receive missions, solve them, and get paid.

🏖️ Tag your contacts who would rather #earnmoney doing #reverse engineering than lounging on the beach this #summer.

#ReverseToEarn by Epieos.

2025-07-11

With that said, welcome to another installment of #nakeddiefriday. What I have for you today is one p/n TMP47C420AF by Toshiba. This is a "high-speed and high-performance 4-bit single chip microcomputer" which is part of the TLCS-47 series and has an LCD controller circuit, together with 4Kx8 mask ROM and 256x4 RAM.

siliconpr0n.org/archive/doku.p

Let's explore! 🧵

#electronics #reverseengineering #icre

Die overview shot, showing the whole thing.
Mike Coats 🏴󠁧󠁢󠁳󠁣󠁴󠁿🇪🇺🌍♻️mike@mikecoats.social
2025-07-10

Another board from the same night light.

#reverseEngineering #electronics

Another PCB with nets overlaid in a number of colours.
No Starch Pressnostarch
2025-07-10

For experienced hardware hackers: an advanced guide to fun with microcontrollers. Learn to pull firmware from single-chip computers, even when they're configured against extraction.

This book details a wide variety of techniques, so you can reproduce real-world chip exploits in your own lab. Plus, find encyclopedic coverage of vulnerabilities for your hardware security work.

nostarch.com/microcontroller-e

A rectangular book with a dark brown cover, "Microcontroller Exploits" by Travis Goodspeed, is vertically centered on a textured background with swirling patterns of gold, black, and white. Overhead, yellow text states, "A master-level guide to microchip firmware." Below the book, white text says, "Exploit real-world chips and tap into microcontroller vulnerabilities."
Futuristic Robert [KJ5ELX] :donor:0xF21D@infosec.exchange
2025-07-10

WTF

That's a lot of PADDINGXXPADDINGXXPADDINGXX...........

#reverseengineering #cybersecurity

The end of an exectuable with many bytes of "PADDINGXX" repeated.
Mike Coats 🏴󠁧󠁢󠁳󠁣󠁴󠁿🇪🇺🌍♻️mike@mikecoats.social
2025-07-09

Not bad for an evening's absent minded reverse engineering while watching zombie movies. Now to translate these chicken scratches into a minimally reproducible circuit diagram and connect a broken, e-waste, night light to the internet of (shit) things.

#reverseEngineering #electronics

A PCB with nets overlaid in a number of bright, garish, colours.
2025-07-09

Alien squigglies!

#reverseengineering

A fragment of a mask-programmed ROM, with bits clearly visible. Bits are formed by the presence/absence of an active region of MOSFET transistors.
2025-07-09

Flare-On 11: Task 7 (2024) – Анализ и криптовзлом

В этом разборе подробно рассматривается решение седьмого задания, сочетающего реверс-инжиниринг и анализ .NET Native AOT-приложения, создание FLIRT-сигнатур и криптоанализ эллиптической кривой. Порядок генераторной точки оказался составным, что позволило применить метод Полига–Хеллмана и восстановить приватные ключи. После расшифровки сетевого трафика был извлечён флаг. Эта задача удачно объединяет технический анализ исполняемого файла с практическим применением методов криптоанализа.

habr.com/ru/articles/926266/

#flareon #ctf #reverseengineering #реверсинжиниринг #ida #elliptic_curve #криптография

Christoff, the humandeadbeef@oldbytes.space
2025-07-08

Installing Windows 11. Not for pleasure, but for work. Pwnage of a fat client app for the next two weeks, woot!

#reverseengineering #pentesting #blackbox

Screenshot showing installing of Windows 11 operating system.
2025-07-08

Computer engineer interested on #cybersecurity and #reverseengineering looking for job.
Maybe I do not have the skills, but one thing i can say is that I’m pretty good on getting my shit done, even if is something new to me.
#jobsearch

2025-07-07

In this hashtag#Splunk Threat Research Team (STRT) blog, we take a close look at a malicious campaign that used a weaponized Inno Setup installer. This malicious installer runs Pascal scripts to download and install malware on victims’ computers.

We show how the attackers use services like TinyURL and Rentry to hide their activity and avoid detection. Our analysis follows the campaign up to the point where it uses the HijackLoader, a sophisticated shellcode, to load or deliver the final payload, which in this case is the Redline Stealer.

We also share the tactics, techniques, and procedures (TTPs) we identified, along with Splunk detection ideas to help spot events related to this threat. 😊
#malwareanalysis #blueteam #reverseengineering #detectionengineering #incidentresponse

lnkd.in/dCTc6GZV

infection chainhijackloader
NG (he/they)ngram@mstdn.ca
2025-07-05

Got to a new loading screen for multiplayer matches in #Robocraft #ReverseEngineering

A screenshot of the Robocraft player loading screen which displays all the users in the match and their loading progress. Only one user is shown and they are 50% loaded in.
2025-07-04

I found this old TL866II chip programmer. These aren't sold anymore. It's been reverse engineered so that you can flash your own firmware onto it -- it's based around a PIC24F microcontroller. github.com/radiomanV/TL866/ contains the schematic (although I noted a few errors on it).

You can't test 7400-series chips with it, so I wrote some firmware to do that. I also have a Retro Chip Tester (americanretro.shop/), but I really dislike its interface.

Anyway, I'll release the code on github once I'm satisfied that it has all the features I want. The code is destructive, in that it completely overwrites the existing firmware, so you wouldn't be able to restore the original functionality. No big loss :>

#ReverseEngineering #hardware

A TL866II device on the left, with a ZIF socket and two LEDs. There's a programming interface cable attached to the side on its left. On the right is an MPLAB PICKit5 programmer device.

The DEC Rainbow 100, released in 1982, had graphics capabilities that weren't well documented in the official manuals. While most users ran it in monochrome mode, the Rainbow supported a color graphics card that could output RGB signals, but its proprietary DB15 connector and sync-on-green signal made it incompatible with standard monitors. Hackers and enthusiasts discovered you could access additional graphics modes by directly manipulating the hardware registers. The discovery came from reverse-engineering enthusiasts who noticed the advanced capabilities hidden behind compatibility issues. Some of the best Rainbow software used these enhanced modes, creating visuals that many users never knew were possible.
#decrainbow #hiddengraphics #retrocomputing #reverseengineering #vintagecomputers

2025-07-04

🚨 RIFT Update:
We’ve boosted our compiler detection! 🛠️
Now with sharper insights into binaries built using GNU, MinGW, and MSVC toolchains.
More enhancements are on the way—stay tuned! 🔍✨
#ReverseEngineering #MalwareAnalysis #RIFT #malware #msft

github.com/microsoft/RIFT

2025-07-04

#ICEBlock is not open source.

ICEBlock makes claims of 100% anonymity with Apple, and that Android cannot provide it.

ICEBlock literally said "trust me bro" - a red flag to privacy nerds. Verbatim: "... but please trust that we know what we're doing to keep people safe."

Has _anyone_ performed a technical analysis of this app? This would cure skepticism.

Apologies for the Blue Sky link, but here's some reaction by @GrapheneOS:

bsky.app/profile/grapheneos.or
#Privacy #ICE #ReverseEngineering

2025-07-03

A guide to get you started with #Windows #Kernel #Debugging walking you through the complete setup and usage of #WinDbg to trace Windows process creation at the kernel level, from boot to PspCreateProcess, using VMware Workstation. #ReverseEngineering github.com/mytechnotalent/wind

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst