Basic DLL for #Windows written in #Assembler to help create your own dynamic linkable libraries and to help #ReverseEngineer the process. https://github.com/mytechnotalent/UiDll
Basic DLL for #Windows written in #Assembler to help create your own dynamic linkable libraries and to help #ReverseEngineer the process. https://github.com/mytechnotalent/UiDll
my #sengled wifi "smart" lights have gone dark. or dumb. it seems like this is a universal phenomenon (see link below). there is some talk about workers at a factory in china going unpaid. seems like its lights out for sengled?
can some #electronics #hacker geek please #reverseengineer the bulb hardware or at least the protocol so we can free our bulbs? #opensource #smarthome #iot
https://www.reddit.com/r/SengledUS/comments/1lez0zo/sengled_down/
I guess all those folks that want to #ReverseEngineer #Apple #LogicBoard|s got a new "toy" to salivate about...
An #Xray - #CT - #Scanner with high-enough resolution to inspect ICs...
https://youtu.be/_qhcDLMCM18?feature=shared&t=1168
#ReverseEngineering #TechPorn #ToolPorn #LogicBoards #ComputerTomography #Electronics #Tech
The VTech Socratic Method (the teardown of a VTechβs computer from the 90Β΄s) https://www.leadedsolder.com/2025/04/22/vtech-socrates-pickup.html #teardown #retro #reverseengineer
2/2β¦the technology necessary to produce them . You can only #ReverseEngineer your way up to the edges of your own knowledge. The drop offs are usually steep.
There are a few things in all this that are extremely troubling. If you want to understand #NHI tech the most obvious thing would be to go to the source. So far the best the cave dwellers can come up with is retrieving crash materials or causing crashes and then retrieving. Not good but about what youβd expect.This will not end well
Excited to conduct my 5th guest lecture at George Mason University on February 14th 6pm where we have another juicy #Embedded #CTF where they are given the firmware in .uf2 format and will need to #ReverseEngineer the binary and figure out a way to attack its wireless access point. This is part of a larger #DEFCON #DC540 Chapter CTF series. Link below with the story and the binary! Hope to see you there! #ReverseEngineering https://github.com/mytechnotalent/dc540-0x00008
Tomorrow in our next episode of #GhidraBytes, we will dig into DAT_code_0043 and see what value exists at the value going into t hat function which is 0x9d! We will need to understanding our hex to binary conversion to make sense of how to #ReverseEngineer this in #Ghidra!
#GhidraBytes 0x01: Blinky - We begin with the simple #CPP blinky program to which we will #ReverseEngineer each piece step-by-step in #Ghidra! Read the code and get familiar with the basics.
How important is it for kids to learn #Python in 2025? With the explosion of #AgenticAI the abstractions will widen as the complexity of the #RAG and #Transformerarchiture grows. We need a generation that can successfully #ReverseEngineer these models when they begin to wreak havoc. https://youtu.be/b4V13Lvk_jM?feature=shared
Iβd love to try and #ReverseEngineer the Yoto Mini (https://uk.yotoplay.com/yoto-mini) β if anyone has/has access to a broken one, Iβd love to buy it off you βΊοΈ
This thing is asking me to #reverseengineer its outdated pairing app, not available anymore for newer android versions, to be able to use it. #walledgarden #obsolescence
After I got frustrated with the layout of my code, I took another crack at transcribing the open source portion of the project that's inspiring me. I came much further along in understanding the logic, all except for how they calculate what the top end of the progress bar should be. Their method was so off the wall and I plugged in a few test values to find out that it basically doesn't even work. So I came up with my own methodology and it turns out I almost perfectly nailed the way Excel calculates the maximum of an axis for a graph. I have yet to decide whether or not to be insulted by this. #cplusplus #arduino #reverseEngineer
broke the thread but https://www.catalog.update.microsoft.com/Search.aspx?q=KB5036909 it's not directly in https://catalog.s.download.windowsupdate.com/c/msdownload/update/software/secu/2024/04/windows10.0-kb5036909-x64_786040b0b0d000b17d6a727ea93ff77d733d1044.msu
I'll let a better #ReverseEngineer take over from here.
Michael Karcher (#OSINT #ReverseEngineer) about #xz #backdoor #obfuscating #regex:
"the code does not contain any ASCII strings, neither in clear text nor in obfuscated form. Instead, it recognizes all relevant strings using one single deterministic finite automaton..." (DFA ~= regex)
"... script that decodes the tables for the table-driven DFA and outputs the strings recognized by it accompanied with the "ID" assigned to the terminal accepting state"
https://github.com/karcherm/xz-malware
@natsume_shokogami @fuchsiii @gamingonlinux *nodds in agreement*
AFAIK all those #Projects are doing #Cleanroom #Emulation because that has been de-jure safe from litigation in terms of claims fo "using stolen IP/trade secrets/documentation" as they basically fuzz around to make stuff work.
In fact, even big corporations like #EA did that: In order to pressure #SEGA to give them a better #Licensing deal for #Megadrive / #Genesis game releases they did cleanroom-#ReverseEngineer the #CopyProtection system (unlike #Atari / #Tengen they didn't blatantly copy code!) and then basically went to SEGA and told them that if they don't get the deal the way they want it they'd release their compatible cartridges and not pay a single cent to the Platform Owner...
And SEGA did bow before them.
- - -
#Nintendo's arguments against #yuzu are as flimsy as those against the #GameGenie were:
Both neither allow #piracy of retail games nor allow running #homebrew on retail systems.
That happened due to fuckups by Nintendo & #nvidia:
https://www.youtube.com/watch?v=xQmN-cxg21M
Unlike the #MIGswitch which is basically a #piracy #cartridge allegedly made by #TeamXecuter...
https://www.youtube.com/watch?v=53ttoD8GYJE
Next Friday at #gmu #georgemasonuniversity I will present my 3rd guest lecture where we will #reverseengineer a real-world scenario which is an #OT #IT #hack on the #powergrid. We will use #ghidra and #reverse a stripped binary and undo a #vuln in #bonded and #encrypted #bluetooth #ble #bluetoothlowenergy. #reverseengineering