mastodontech.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Offen für alle (über 16) und bereitgestellt von Markus'Blog

Serverstatistik:

1,5 Tsd.
aktive Profile

#reverseengineering

8 Beiträge8 Beteiligte0 Beiträge heute
Kevin Thomas ✅<p>Reverse Engineering Data: 00-CLT: Central Limit Theorem - This chapter covers the Central Limit Theorem within Data Science. <a href="https://defcon.social/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://github.com/mytechnotalent/Reverse-Engineering-Data" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/mytechnotalent/Reve</span><span class="invisible">rse-Engineering-Data</span></a></p>
IT News<p>Hacking the Bluetooth-Enabled Anker Prime Power Bank - Selling power banks these days isn’t easy, as you can only stretch the reasonable ... - <a href="https://hackaday.com/2025/08/14/hacking-the-bluetooth-enabled-anker-prime-power-bank/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/08/14/hackin</span><span class="invisible">g-the-bluetooth-enabled-anker-prime-power-bank/</span></a> <a href="https://schleuss.online/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://schleuss.online/tags/bluetoothlowenergy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bluetoothlowenergy</span></a> <a href="https://schleuss.online/tags/customfirmware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>customfirmware</span></a> <a href="https://schleuss.online/tags/powerbank" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>powerbank</span></a></p>
hubertf<p>Mastered pwn.college's Orange Belt "Reverse Engineering" module - whew! Things learned include disassembling &amp; decompiling with x86 binaries, analysing, parsing and generating application logic, patching data and code in binaries. </p><p><a href="https://mastodon.social/tags/ctf" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ctf</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/pwncollege" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pwncollege</span></a> <a href="https://mastodon.social/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a></p>
:radare2: radare :verified:<p>🚀 Last iaito6 ships support for r2ai and Decai!</p><p>We are happy to hear from user's experience and ideas to improve the state of the whole :radare2: <a href="https://infosec.exchange/tags/radare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>radare</span></a> ecosystem. Check the post below to find out other interesting features included in this release!</p><p><a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/radare2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>radare2</span></a> <a href="https://infosec.exchange/tags/ai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ai</span></a> <a href="https://infosec.exchange/tags/ui" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ui</span></a></p><p>👉 <a href="https://infosec.exchange/@radareorg/115016417991894556" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec.exchange/@radareorg/11</span><span class="invisible">5016417991894556</span></a></p>
Kevin Thomas ✅<p>Working with an Embedded ARM STM32F4 series microcontroller, we see that the RCC GPIOAEN, GPIOA enable, is offset 0x01. <a href="https://defcon.social/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://github.com/mytechnotalent/Embedded-Reverse-Engineering" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/mytechnotalent/Embe</span><span class="invisible">dded-Reverse-Engineering</span></a></p>
Kevin Thomas ✅<p>Working with an Embedded ARM STM32F4 series microcontroller, the AHB1 bus is 0x20000 offset from the peripheral base as we know the peripheral base is 0x40000000. <a href="https://defcon.social/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://github.com/mytechnotalent/Embedded-Reverse-Engineering" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/mytechnotalent/Embe</span><span class="invisible">dded-Reverse-Engineering</span></a></p>
Alexandre Borges<p>So far, I have already written 15 articles (1045 pages), which have been published on my blog:</p><p>blog: <a href="https://exploitreversing.com" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">exploitreversing.com</span><span class="invisible"></span></a></p><p>ERS: Exploiting Reversing Series (currently at 439 pages, with continued progress underway): </p><p>[+] ERS 05: <a href="https://exploitreversing.com/2025/03/12/exploiting-reversing-er-series-article-05/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/03/1</span><span class="invisible">2/exploiting-reversing-er-series-article-05/</span></a><br>[+] ERS 04: <a href="https://exploitreversing.com/2025/02/04/exploiting-reversing-er-series-article-04/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/02/0</span><span class="invisible">4/exploiting-reversing-er-series-article-04/</span></a><br>[+] ERS 03: <a href="https://exploitreversing.com/2025/01/22/exploiting-reversing-er-series-article-03/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/01/2</span><span class="invisible">2/exploiting-reversing-er-series-article-03/</span></a><br>[+] ERS 02: <a href="https://exploitreversing.com/2024/01/03/exploiting-reversing-er-series-article-02/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2024/01/0</span><span class="invisible">3/exploiting-reversing-er-series-article-02/</span></a><br>[+] ERS 01: <a href="https://exploitreversing.com/2023/04/11/exploiting-reversing-er-series/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2023/04/1</span><span class="invisible">1/exploiting-reversing-er-series/</span></a></p><p>MAS: Malware Analysis Series (606 pages -- finished): </p><p>[+] MAS 10: <a href="https://exploitreversing.com/2025/01/15/malware-analysis-series-mas-article-10/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/01/1</span><span class="invisible">5/malware-analysis-series-mas-article-10/</span></a><br>[+] MAS 09: <a href="https://exploitreversing.com/2025/01/08/malware-analysis-series-mas-article-09/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/01/0</span><span class="invisible">8/malware-analysis-series-mas-article-09/</span></a><br>[+] MAS 08: <a href="https://exploitreversing.com/2024/08/07/malware-analysis-series-mas-article-08/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2024/08/0</span><span class="invisible">7/malware-analysis-series-mas-article-08/</span></a><br>[+] MAS 07: <a href="https://exploitreversing.com/2023/01/05/malware-analysis-series-mas-article-7/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2023/01/0</span><span class="invisible">5/malware-analysis-series-mas-article-7/</span></a><br>[+] MAS 06: <a href="https://exploitreversing.com/2022/11/24/malware-analysis-series-mas-article-6/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2022/11/2</span><span class="invisible">4/malware-analysis-series-mas-article-6/</span></a><br>[+] MAS 05: <a href="https://exploitreversing.com/2022/09/14/malware-analysis-series-mas-article-5/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2022/09/1</span><span class="invisible">4/malware-analysis-series-mas-article-5/</span></a><br>[+] MAS 04: <a href="https://exploitreversing.com/2022/05/12/malware-analysis-series-mas-article-4/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2022/05/1</span><span class="invisible">2/malware-analysis-series-mas-article-4/</span></a><br>[+] MAS 03: <a href="https://exploitreversing.com/2022/05/05/malware-analysis-series-mas-article-3/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2022/05/0</span><span class="invisible">5/malware-analysis-series-mas-article-3/</span></a><br>[+] MAS 02: <a href="https://exploitreversing.com/2022/02/03/malware-analysis-series-mas-article-2/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2022/02/0</span><span class="invisible">3/malware-analysis-series-mas-article-2/</span></a><br>[+] MAS 01: <a href="https://exploitreversing.com/2021/12/03/malware-analysis-series-mas-article-1/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2021/12/0</span><span class="invisible">3/malware-analysis-series-mas-article-1/</span></a></p><p>I'll soon begin writing the next articles in the Exploiting Reversing series, which will focus on vulnerability and exploitation, once I've laid all the necessary groundwork. </p><p>Enjoy reading and have a great day.</p><p><a href="https://infosec.exchange/tags/windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windows</span></a> <a href="https://infosec.exchange/tags/iOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iOS</span></a> <a href="https://infosec.exchange/tags/macOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>macOS</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/chrome" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chrome</span></a> <a href="https://infosec.exchange/tags/kernel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kernel</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/research" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>research</span></a> <a href="https://infosec.exchange/tags/hypervisor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hypervisor</span></a></p>
Marco Ivaldi<p><a href="https://infosec.exchange/tags/Rust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Rust</span></a> <a href="https://infosec.exchange/tags/Hypervisors" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hypervisors</span></a> for Memory Introspection and <a href="https://infosec.exchange/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a></p><p><a href="https://secret.club/2025/06/02/hypervisors-for-memory-introspection-and-reverse-engineering.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">secret.club/2025/06/02/hypervi</span><span class="invisible">sors-for-memory-introspection-and-reverse-engineering.html</span></a></p><p><a href="https://github.com/memN0ps/illusion-rs" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/memN0ps/illusion-rs</span><span class="invisible"></span></a></p><p><a href="https://github.com/memN0ps/matrix-rs" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/memN0ps/matrix-rs</span><span class="invisible"></span></a></p>
hubertf<p>Binary Reverse Engineering... da denkt man, man hat mit go- und rust-binaries alles gesehen... und dann kommt cobol daher und sagt: hold my beer!</p><p><a href="https://mastodon.social/tags/ctf" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ctf</span></a> <a href="https://mastodon.social/tags/why" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>why</span></a> <a href="https://mastodon.social/tags/why2025" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>why2025</span></a> <a href="https://mastodon.social/tags/whyctf2025" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>whyctf2025</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/pwn" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pwn</span></a> <a href="https://mastodon.social/tags/re" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>re</span></a> <a href="https://mastodon.social/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://mastodon.social/tags/ghidra" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ghidra</span></a></p>
DJ🌞:donor:<p>Hello and welcome to this installment of <a href="https://infosec.exchange/tags/nakeddiefriday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nakeddiefriday</span></a>! Today's guest of honour is one КР556РТ4, a Soviet clone of 82S126 the 256x4 TTL PROM.</p><p>A very short thread.</p><p>SiPron page: <a href="https://siliconpr0n.org/archive/doku.php?id=infosecdj:gamma:kr556rt4" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">siliconpr0n.org/archive/doku.p</span><span class="invisible">hp?id=infosecdj:gamma:kr556rt4</span></a></p><p><a href="https://infosec.exchange/tags/electronics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>electronics</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/icre" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>icre</span></a></p>
IT News<p>Exploring the TRS-80’s Color BASIC’s Random Number Function - Although these days we get to tap into many sources of entropy to give a pretty go... - <a href="https://hackaday.com/2025/08/08/exploring-the-trs-80s-color-basics-random-number-function/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/08/08/explor</span><span class="invisible">ing-the-trs-80s-color-basics-random-number-function/</span></a> <a href="https://schleuss.online/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://schleuss.online/tags/retrocomputing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>retrocomputing</span></a> <a href="https://schleuss.online/tags/pseudorandom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pseudorandom</span></a> <a href="https://schleuss.online/tags/trs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>trs</span></a>-80 <a href="https://schleuss.online/tags/basic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>basic</span></a></p>
Frida<p>🚀 Frida 17.2.15 release!<br>– iOS 26 &amp; palera1n support via dual-mapping 🍏<br>– ART offset lookup improved on Android 🤖<br>– Preliminary visionOS support 🥽<br>– FreeBSD 32-bit x86 joins the party 🧙<br>– NEON reg access on ARM/arm64 🎯<br>– uint now supported in NativeFunction/Callback<br>– BufferReader pointer bug squashed<br>Huge thanks to all contributors! 💪 <a href="https://fosstodon.org/tags/frida" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>frida</span></a> <a href="https://fosstodon.org/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a></p><p><a href="https://github.com/frida/frida/releases/tag/17.2.15" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/frida/frida/release</span><span class="invisible">s/tag/17.2.15</span></a></p>
dorotaC<p>This just in: my friends chucked out a shitty "CO2" <a href="https://fosstodon.org/tags/sensor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sensor</span></a>.</p><p>Actually a breathalyzer:</p><p><a href="https://hackaday.com/2023/02/18/anatomy-of-a-fake-co2-sensor/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2023/02/18/anatom</span><span class="invisible">y-of-a-fake-co2-sensor/</span></a></p><p>It's a really pretty design! And while the man in the video says it's useless, I actually started a CO2 sensor project this winter, but I didn't have a display or case.<br>Now I guess I do!</p><p>But it turns out driving a matrix of <a href="https://fosstodon.org/tags/LCD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LCD</span></a> segments is surprisingly difficult.</p><p>Here's a picture of connections. Wish me luck figuring out.</p><p><a href="https://fosstodon.org/tags/electronics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>electronics</span></a> <a href="https://fosstodon.org/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://fosstodon.org/tags/environment" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>environment</span></a></p>
nytpu<p>New gemlog post: Reverse-Engineering Game Boy Advance Games (and General Reverse-Engineering Advice)</p><p><a href="https://nytpu.com/gemlog/2025-08-06-2" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">nytpu.com/gemlog/2025-08-06-2</span><span class="invisible"></span></a><br><a href="gemini://nytpu.com/gemlog/2025-08-06-2" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible"></span><span class="ellipsis">gemini://nytpu.com/gemlog/2025</span><span class="invisible">-08-06-2</span></a></p><p><a href="https://tilde.zone/tags/GBA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GBA</span></a> <a href="https://tilde.zone/tags/GameBoyAdvance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GameBoyAdvance</span></a> <a href="https://tilde.zone/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a></p>
IT News<p>Microsoft’s new AI reverse-engineers malware autonomously, marking a shift in cybersecurity - Microsoft says its new system could eventually detect new types of malware direct... - <a href="https://www.geekwire.com/2025/microsofts-new-ai-reverse-engineers-malware-autonomously-marking-a-shift-in-cybersecurity/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">geekwire.com/2025/microsofts-n</span><span class="invisible">ew-ai-reverse-engineers-malware-autonomously-marking-a-shift-in-cybersecurity/</span></a> <a href="https://schleuss.online/tags/securefutureinitiative" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securefutureinitiative</span></a> <a href="https://schleuss.online/tags/largelanguagemodels" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>largelanguagemodels</span></a> <a href="https://schleuss.online/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://schleuss.online/tags/aimalwareanalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>aimalwareanalysis</span></a> <a href="https://schleuss.online/tags/microsoftdefender" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoftdefender</span></a> <a href="https://schleuss.online/tags/malwaredetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malwaredetection</span></a> <a href="https://schleuss.online/tags/threatdetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatdetection</span></a> <a href="https://schleuss.online/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://schleuss.online/tags/autonomousai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>autonomousai</span></a> <a href="https://schleuss.online/tags/zerodayquest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zerodayquest</span></a> <a href="https://schleuss.online/tags/microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoft</span></a></p>
Pyrzout :vm:<p>Project Ire: Microsoft’s autonomous malware detection AI agent <a href="https://www.helpnetsecurity.com/2025/08/05/project-ire-microsoft-autonomous-malware-detection-ai-agent/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">helpnetsecurity.com/2025/08/05</span><span class="invisible">/project-ire-microsoft-autonomous-malware-detection-ai-agent/</span></a> <a href="https://social.skynetcloud.site/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://social.skynetcloud.site/tags/MicrosoftDefender" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MicrosoftDefender</span></a> <a href="https://social.skynetcloud.site/tags/malwaredetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malwaredetection</span></a> <a href="https://social.skynetcloud.site/tags/automation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>automation</span></a> <a href="https://social.skynetcloud.site/tags/Don" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Don</span></a>'tmiss <a href="https://social.skynetcloud.site/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://social.skynetcloud.site/tags/Hotstuff" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hotstuff</span></a> <a href="https://social.skynetcloud.site/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://social.skynetcloud.site/tags/LLM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LLM</span></a> <a href="https://social.skynetcloud.site/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a></p>
Kevin Thomas ✅<p>Working with an Embedded ARM STM32F4 series microcontroller, when we CMD or CTRL click on the RCC definition, we see the RCC_BASE which we learned exists on AHB1 bus. <a href="https://defcon.social/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://github.com/mytechnotalent/Embedded-Reverse-Engineering" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/mytechnotalent/Embe</span><span class="invisible">dded-Reverse-Engineering</span></a></p>
IT News<p>The Scourge of Fake Retro Unijunction Transistors - We all know that it’s easy to get caught out by fake electronic components these d... - <a href="https://hackaday.com/2025/08/04/the-scourge-of-fake-retro-components-like-unijunction-transistors/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/08/04/the-sc</span><span class="invisible">ourge-of-fake-retro-components-like-unijunction-transistors/</span></a> <a href="https://schleuss.online/tags/unijunctiontransistor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>unijunctiontransistor</span></a> <a href="https://schleuss.online/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://schleuss.online/tags/transistor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>transistor</span></a> <a href="https://schleuss.online/tags/fakeparts" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fakeparts</span></a></p>
IT News<p>Reverse-Engineering the TDA7000 FM Radio Receiver IC - A wristwatch featuring the TDA7000 FM radio receiver IC. (Credit: Philips Technica... - <a href="https://hackaday.com/2025/08/03/reverse-engineering-the-tda7000-fm-radio-receiver-ic/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/08/03/revers</span><span class="invisible">e-engineering-the-tda7000-fm-radio-receiver-ic/</span></a> <a href="https://schleuss.online/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://schleuss.online/tags/fmradio" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fmradio</span></a> <a href="https://schleuss.online/tags/tda7000" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tda7000</span></a></p>
:radare2: radare :verified:<p>If you are focused on Apple software <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> you would proabbly like to know that r2-6.0 ships support for <a href="https://infosec.exchange/tags/ios26" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ios26</span></a> kernel and dylcaches. Improved swift demangler, optimized sideloading dwarf support, as well as suporting RISCV mach-o binaries <a href="https://infosec.exchange/tags/apple" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>apple</span></a> <a href="https://infosec.exchange/tags/ios" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ios</span></a> <a href="https://infosec.exchange/tags/macos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>macos</span></a></p>