mstdn.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A general-purpose Mastodon server with a 500 character limit. All languages are welcome.

Administered by:

Server stats:

12K
active users

#reverseengineering

10 posts10 participants1 post today
psf<p>It's always a good feeling getting to rename a struct field from something like "12listfunc" to, say, "widget_type". Roughly a million of these to go. <a href="https://oldbytes.space/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a></p>
Kevin Thomas ✅<p>Working with an Embedded ARM STM32F4 series microcontroller, we see that the RCC GPIOAEN, GPIOA enable, is offset 0x01. <a href="https://defcon.social/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://github.com/mytechnotalent/Embedded-Reverse-Engineering" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/mytechnotalent/Embe</span><span class="invisible">dded-Reverse-Engineering</span></a></p>
Habr<p>Как воссоздать код DOS-игры: пошаговое дизассемблирование ретро-игр (часть 2)</p><p>Что, если всё, что вы знали о регистрах - неполная правда? В этой части я не даю готовых ответов. Вместо этого, показываю, как я сам перестал верить упрощённым определениям после десятков споров на Хабре. Почему? Потому что регистры, стек и сегменты - это не просто "ячейки памяти" или "переменные процессора". Это архитектурные решения, меняющиеся от поколения к поколению. Я делюсь своим решением: отказаться от субъективных трактовок и привести вас к первоисточникам - официальной документации Intel, от самого первого процессора - 4004 до 486. Вы найдёте здесь не просто ссылки, а путешествие по истории x86, с цитатами от Рэя Доббса, Рэндалла Хайды и Ralf Brown. Их книги - не просто руководства, а библии, на которых выросли поколения разработчиков. И, как просили читатели, — будет много кода: на C и на ассемблере, от mov ax, 13h до ручной сборки COM-файлов. Этот раздел - приглашение не просто читать, а думать. И задать себе вопрос: а вы точно понимаете, что видите в коде, когда пишете int 21h ? Исследовать</p><p><a href="https://habr.com/ru/articles/935154/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">habr.com/ru/articles/935154/</span><span class="invisible"></span></a></p><p><a href="https://zhub.link/tags/dos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dos</span></a> <a href="https://zhub.link/tags/retro" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>retro</span></a> <a href="https://zhub.link/tags/assembler" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>assembler</span></a> <a href="https://zhub.link/tags/ghidra" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ghidra</span></a> <a href="https://zhub.link/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://zhub.link/tags/games" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>games</span></a></p>
Kevin Thomas ✅<p>Working with an Embedded ARM STM32F4 series microcontroller, the AHB1 bus is 0x20000 offset from the peripheral base as we know the peripheral base is 0x40000000. <a href="https://defcon.social/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://github.com/mytechnotalent/Embedded-Reverse-Engineering" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/mytechnotalent/Embe</span><span class="invisible">dded-Reverse-Engineering</span></a></p>
Alexandre Borges<p>So far, I have already written 15 articles (1045 pages), which have been published on my blog:</p><p>blog: <a href="https://exploitreversing.com" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">exploitreversing.com</span><span class="invisible"></span></a></p><p>ERS: Exploiting Reversing Series (currently at 439 pages, with continued progress underway): </p><p>[+] ERS 05: <a href="https://exploitreversing.com/2025/03/12/exploiting-reversing-er-series-article-05/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/03/1</span><span class="invisible">2/exploiting-reversing-er-series-article-05/</span></a><br>[+] ERS 04: <a href="https://exploitreversing.com/2025/02/04/exploiting-reversing-er-series-article-04/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/02/0</span><span class="invisible">4/exploiting-reversing-er-series-article-04/</span></a><br>[+] ERS 03: <a href="https://exploitreversing.com/2025/01/22/exploiting-reversing-er-series-article-03/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/01/2</span><span class="invisible">2/exploiting-reversing-er-series-article-03/</span></a><br>[+] ERS 02: <a href="https://exploitreversing.com/2024/01/03/exploiting-reversing-er-series-article-02/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2024/01/0</span><span class="invisible">3/exploiting-reversing-er-series-article-02/</span></a><br>[+] ERS 01: <a href="https://exploitreversing.com/2023/04/11/exploiting-reversing-er-series/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2023/04/1</span><span class="invisible">1/exploiting-reversing-er-series/</span></a></p><p>MAS: Malware Analysis Series (606 pages -- finished): </p><p>[+] MAS 10: <a href="https://exploitreversing.com/2025/01/15/malware-analysis-series-mas-article-10/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/01/1</span><span class="invisible">5/malware-analysis-series-mas-article-10/</span></a><br>[+] MAS 09: <a href="https://exploitreversing.com/2025/01/08/malware-analysis-series-mas-article-09/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/01/0</span><span class="invisible">8/malware-analysis-series-mas-article-09/</span></a><br>[+] MAS 08: <a href="https://exploitreversing.com/2024/08/07/malware-analysis-series-mas-article-08/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2024/08/0</span><span class="invisible">7/malware-analysis-series-mas-article-08/</span></a><br>[+] MAS 07: <a href="https://exploitreversing.com/2023/01/05/malware-analysis-series-mas-article-7/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2023/01/0</span><span class="invisible">5/malware-analysis-series-mas-article-7/</span></a><br>[+] MAS 06: <a href="https://exploitreversing.com/2022/11/24/malware-analysis-series-mas-article-6/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2022/11/2</span><span class="invisible">4/malware-analysis-series-mas-article-6/</span></a><br>[+] MAS 05: <a href="https://exploitreversing.com/2022/09/14/malware-analysis-series-mas-article-5/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2022/09/1</span><span class="invisible">4/malware-analysis-series-mas-article-5/</span></a><br>[+] MAS 04: <a href="https://exploitreversing.com/2022/05/12/malware-analysis-series-mas-article-4/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2022/05/1</span><span class="invisible">2/malware-analysis-series-mas-article-4/</span></a><br>[+] MAS 03: <a href="https://exploitreversing.com/2022/05/05/malware-analysis-series-mas-article-3/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2022/05/0</span><span class="invisible">5/malware-analysis-series-mas-article-3/</span></a><br>[+] MAS 02: <a href="https://exploitreversing.com/2022/02/03/malware-analysis-series-mas-article-2/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2022/02/0</span><span class="invisible">3/malware-analysis-series-mas-article-2/</span></a><br>[+] MAS 01: <a href="https://exploitreversing.com/2021/12/03/malware-analysis-series-mas-article-1/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2021/12/0</span><span class="invisible">3/malware-analysis-series-mas-article-1/</span></a></p><p>I'll soon begin writing the next articles in the Exploiting Reversing series, which will focus on vulnerability and exploitation, once I've laid all the necessary groundwork. </p><p>Enjoy reading and have a great day.</p><p><a href="https://infosec.exchange/tags/windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windows</span></a> <a href="https://infosec.exchange/tags/iOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iOS</span></a> <a href="https://infosec.exchange/tags/macOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>macOS</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/chrome" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chrome</span></a> <a href="https://infosec.exchange/tags/kernel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kernel</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/research" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>research</span></a> <a href="https://infosec.exchange/tags/hypervisor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hypervisor</span></a></p>
Marco Ivaldi<p><a href="https://infosec.exchange/tags/Rust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Rust</span></a> <a href="https://infosec.exchange/tags/Hypervisors" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hypervisors</span></a> for Memory Introspection and <a href="https://infosec.exchange/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a></p><p><a href="https://secret.club/2025/06/02/hypervisors-for-memory-introspection-and-reverse-engineering.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">secret.club/2025/06/02/hypervi</span><span class="invisible">sors-for-memory-introspection-and-reverse-engineering.html</span></a></p><p><a href="https://github.com/memN0ps/illusion-rs" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/memN0ps/illusion-rs</span><span class="invisible"></span></a></p><p><a href="https://github.com/memN0ps/matrix-rs" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/memN0ps/matrix-rs</span><span class="invisible"></span></a></p>
NG (he/they)<p>OpenJam v0.3.0 is out, now with limited <a href="https://mstdn.ca/tags/Robocraft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Robocraft</span></a> multiplayer <a href="https://git.ngram.ca/OpenJam/servers/releases/tag/v0.3.0" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">git.ngram.ca/OpenJam/servers/r</span><span class="invisible">eleases/tag/v0.3.0</span></a></p><p><a href="https://mstdn.ca/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <a href="https://mstdn.ca/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://mstdn.ca/tags/stopkillinggames" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>stopkillinggames</span></a></p>
DJ🌞:donor:<p>Hello and welcome to this installment of <a href="https://infosec.exchange/tags/nakeddiefriday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nakeddiefriday</span></a>! Today's guest of honour is one КР556РТ4, a Soviet clone of 82S126 the 256x4 TTL PROM.</p><p>A very short thread.</p><p>SiPron page: <a href="https://siliconpr0n.org/archive/doku.php?id=infosecdj:gamma:kr556rt4" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">siliconpr0n.org/archive/doku.p</span><span class="invisible">hp?id=infosecdj:gamma:kr556rt4</span></a></p><p><a href="https://infosec.exchange/tags/electronics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>electronics</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/icre" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>icre</span></a></p>
IT News<p>Exploring the TRS-80’s Color BASIC’s Random Number Function - Although these days we get to tap into many sources of entropy to give a pretty go... - <a href="https://hackaday.com/2025/08/08/exploring-the-trs-80s-color-basics-random-number-function/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/08/08/explor</span><span class="invisible">ing-the-trs-80s-color-basics-random-number-function/</span></a> <a href="https://schleuss.online/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://schleuss.online/tags/retrocomputing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>retrocomputing</span></a> <a href="https://schleuss.online/tags/pseudorandom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pseudorandom</span></a> <a href="https://schleuss.online/tags/trs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>trs</span></a>-80 <a href="https://schleuss.online/tags/basic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>basic</span></a></p>
Frida<p>🚀 Frida 17.2.15 release!<br>– iOS 26 &amp; palera1n support via dual-mapping 🍏<br>– ART offset lookup improved on Android 🤖<br>– Preliminary visionOS support 🥽<br>– FreeBSD 32-bit x86 joins the party 🧙<br>– NEON reg access on ARM/arm64 🎯<br>– uint now supported in NativeFunction/Callback<br>– BufferReader pointer bug squashed<br>Huge thanks to all contributors! 💪 <a href="https://fosstodon.org/tags/frida" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>frida</span></a> <a href="https://fosstodon.org/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a></p><p><a href="https://github.com/frida/frida/releases/tag/17.2.15" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/frida/frida/release</span><span class="invisible">s/tag/17.2.15</span></a></p>
dorotaC<p>This just in: my friends chucked out a shitty "CO2" <a href="https://fosstodon.org/tags/sensor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sensor</span></a>.</p><p>Actually a breathalyzer:</p><p><a href="https://hackaday.com/2023/02/18/anatomy-of-a-fake-co2-sensor/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2023/02/18/anatom</span><span class="invisible">y-of-a-fake-co2-sensor/</span></a></p><p>It's a really pretty design! And while the man in the video says it's useless, I actually started a CO2 sensor project this winter, but I didn't have a display or case.<br>Now I guess I do!</p><p>But it turns out driving a matrix of <a href="https://fosstodon.org/tags/LCD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LCD</span></a> segments is surprisingly difficult.</p><p>Here's a picture of connections. Wish me luck figuring out.</p><p><a href="https://fosstodon.org/tags/electronics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>electronics</span></a> <a href="https://fosstodon.org/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://fosstodon.org/tags/environment" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>environment</span></a></p>
nytpu<p>New gemlog post: Reverse-Engineering Game Boy Advance Games (and General Reverse-Engineering Advice)</p><p><a href="https://nytpu.com/gemlog/2025-08-06-2" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">nytpu.com/gemlog/2025-08-06-2</span><span class="invisible"></span></a><br><a href="gemini://nytpu.com/gemlog/2025-08-06-2" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible"></span><span class="ellipsis">gemini://nytpu.com/gemlog/2025</span><span class="invisible">-08-06-2</span></a></p><p><a href="https://tilde.zone/tags/GBA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GBA</span></a> <a href="https://tilde.zone/tags/GameBoyAdvance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GameBoyAdvance</span></a> <a href="https://tilde.zone/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a></p>
ReynardSec<p>„Under the Hood of AFD.sys Part 4: Receiving TCP packets”</p><p><a href="https://leftarcode.com/posts/afd-reverse-engineering-part4/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">leftarcode.com/posts/afd-rever</span><span class="invisible">se-engineering-part4/</span></a></p><p><a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windows</span></a> <a href="https://infosec.exchange/tags/programming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>programming</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
Habr<p>Как воссоздать код DOS-игры: пошаговое дизассемблирование ретро-игр</p><p>Устаревшие технологии не исчезают. Они просто уходят в подполье: в архивы, на дискеты, в память тех, кто помнит, как это было. DOS-игры не просто программы. Это произведения инженерного искусства, созданные в эпоху, когда каждый байт имел значение, а каждый такт процессора, вес. Они работали на железе, которое сегодня кажется примитивным, но при этом умели то, что многим современным системам не под силу: дышать. Моя первая игра была на дискете. Она называлась Syndicate (1993, Bullfrog Productions ), и я не понимал, как она работает. Я видел, как агенты стреляют, как взрываются здания, как звучит саундтрек, но не имел ни малейшего представления, что за этим стоит. Я знал C. Я знал, что такое переменные, циклы, указатели. Но я не мог объяснить, как в игре реализован путь юнита, как обрабатывается урон, как генерируется уровень. Тогда я не понимал кода, но код уже управлял мной. Спустя годы я вернулся к этим играм не как игрок, а как исследователь. И понял: они — лучшая школа программирования, которую только можно себе представить. Современные игры скрывают свою архитектуру за слоями абстракций: виртуальные машины, движки, фреймворки. Чтобы понять, как они работают, нужно разобраться в десятках технологий. DOS-игры - другое дело: нет виртуальных машин; нет сборщиков мусора; нет драйверов. Есть только процессор, память и код, написанный на C/C++ или ассемблере. Это делает их идеальной школой для изучения реального программирования. Дизассемблирование таких игр — это не про взлом. Это археология программирования: вы не ломаете систему, а восстанавливаете её логику по обломкам машинного кода, как археолог, собирающий мозаику из черепков. Исследовать</p><p><a href="https://habr.com/ru/articles/934490/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">habr.com/ru/articles/934490/</span><span class="invisible"></span></a></p><p><a href="https://zhub.link/tags/dos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dos</span></a> <a href="https://zhub.link/tags/retro" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>retro</span></a> <a href="https://zhub.link/tags/assembler" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>assembler</span></a> <a href="https://zhub.link/tags/ghidra" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ghidra</span></a> <a href="https://zhub.link/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://zhub.link/tags/games" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>games</span></a></p>
IT News<p>Microsoft’s new AI reverse-engineers malware autonomously, marking a shift in cybersecurity - Microsoft says its new system could eventually detect new types of malware direct... - <a href="https://www.geekwire.com/2025/microsofts-new-ai-reverse-engineers-malware-autonomously-marking-a-shift-in-cybersecurity/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">geekwire.com/2025/microsofts-n</span><span class="invisible">ew-ai-reverse-engineers-malware-autonomously-marking-a-shift-in-cybersecurity/</span></a> <a href="https://schleuss.online/tags/securefutureinitiative" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securefutureinitiative</span></a> <a href="https://schleuss.online/tags/largelanguagemodels" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>largelanguagemodels</span></a> <a href="https://schleuss.online/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://schleuss.online/tags/aimalwareanalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>aimalwareanalysis</span></a> <a href="https://schleuss.online/tags/microsoftdefender" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoftdefender</span></a> <a href="https://schleuss.online/tags/malwaredetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malwaredetection</span></a> <a href="https://schleuss.online/tags/threatdetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatdetection</span></a> <a href="https://schleuss.online/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://schleuss.online/tags/autonomousai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>autonomousai</span></a> <a href="https://schleuss.online/tags/zerodayquest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zerodayquest</span></a> <a href="https://schleuss.online/tags/microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoft</span></a></p>
Pyrzout :vm:<p>Project Ire: Microsoft’s autonomous malware detection AI agent <a href="https://www.helpnetsecurity.com/2025/08/05/project-ire-microsoft-autonomous-malware-detection-ai-agent/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">helpnetsecurity.com/2025/08/05</span><span class="invisible">/project-ire-microsoft-autonomous-malware-detection-ai-agent/</span></a> <a href="https://social.skynetcloud.site/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://social.skynetcloud.site/tags/MicrosoftDefender" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MicrosoftDefender</span></a> <a href="https://social.skynetcloud.site/tags/malwaredetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malwaredetection</span></a> <a href="https://social.skynetcloud.site/tags/automation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>automation</span></a> <a href="https://social.skynetcloud.site/tags/Don" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Don</span></a>'tmiss <a href="https://social.skynetcloud.site/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://social.skynetcloud.site/tags/Hotstuff" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hotstuff</span></a> <a href="https://social.skynetcloud.site/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://social.skynetcloud.site/tags/LLM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LLM</span></a> <a href="https://social.skynetcloud.site/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a></p>
Pyrzout :vm:<p>Microsoft’s Project Ire Autonomously Reverse Engineers Software to Find Malware <a href="https://www.securityweek.com/microsofts-project-ire-autonomously-reverse-engineers-software-to-find-malware/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/microsofts-pr</span><span class="invisible">oject-ire-autonomously-reverse-engineers-software-to-find-malware/</span></a> <a href="https://social.skynetcloud.site/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://social.skynetcloud.site/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a>&amp;Threats <a href="https://social.skynetcloud.site/tags/ProjectIre" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ProjectIre</span></a> <a href="https://social.skynetcloud.site/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a></p>
Pyrzout :vm:<p>Microsoft’s Project Ire Autonomously Reverse Engineers Software to Find Malware <a href="https://www.securityweek.com/microsofts-project-ire-autonomously-reverse-engineers-software-to-find-malware/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/microsofts-pr</span><span class="invisible">oject-ire-autonomously-reverse-engineers-software-to-find-malware/</span></a> <a href="https://social.skynetcloud.site/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://social.skynetcloud.site/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a>&amp;Threats <a href="https://social.skynetcloud.site/tags/ProjectIre" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ProjectIre</span></a> <a href="https://social.skynetcloud.site/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a></p>
Kevin Thomas ✅<p>Working with an Embedded ARM STM32F4 series microcontroller, when we CMD or CTRL click on the RCC definition, we see the RCC_BASE which we learned exists on AHB1 bus. <a href="https://defcon.social/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://github.com/mytechnotalent/Embedded-Reverse-Engineering" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/mytechnotalent/Embe</span><span class="invisible">dded-Reverse-Engineering</span></a></p>
Pyrzout :vm:<p>The Scourge of Fake Retro Unijunction Transistors <a href="https://hackaday.com/2025/08/04/the-scourge-of-fake-retro-components-like-unijunction-transistors/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/08/04/the-sc</span><span class="invisible">ourge-of-fake-retro-components-like-unijunction-transistors/</span></a> <a href="https://social.skynetcloud.site/tags/unijunctiontransistor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>unijunctiontransistor</span></a> <a href="https://social.skynetcloud.site/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://social.skynetcloud.site/tags/transistor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>transistor</span></a> <a href="https://social.skynetcloud.site/tags/fakeparts" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fakeparts</span></a></p>