techhub.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A hub primarily for passionate technologists, but everyone is welcome

Administered by:

Server stats:

4.6K
active users

#reverseengineering

14 posts14 participants0 posts today
Mäh W.<p>Hi Android <a href="https://chaos.social/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> friends. I am new in this field and wanted to try something out... it's probably pure basics. I got an APK and ran `strings` on the `classes.dex` file. There's an interesting URL embedded which might be related to downloading firmware. When running curl, I get two `301 Moved Permanently`. Manually resolving to the new location results in an HTML file with a "Page not found" message so I guess that there's basic auth. How can I decompile the code around that string?</p>
IT News<p>Fusing Cheap eBay Find Into a Digital Rangefinder - One of the earliest commercially-successful camera technologies was the rangefinde... - <a href="https://hackaday.com/2025/07/23/fusing-cheap-ebay-find-into-a-digital-rangefinder/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/07/23/fusing</span><span class="invisible">-cheap-ebay-find-into-a-digital-rangefinder/</span></a> <a href="https://schleuss.online/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://schleuss.online/tags/reangefinder" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reangefinder</span></a> <a href="https://schleuss.online/tags/photography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>photography</span></a> <a href="https://schleuss.online/tags/hardware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hardware</span></a> <a href="https://schleuss.online/tags/camera" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>camera</span></a> <a href="https://schleuss.online/tags/leica" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>leica</span></a></p>
Breathing Retro<p>GTA 2 PC version re-implementation project <a href="https://github.com/CriminalRETeam/gta2_re" rel="nofollow noopener" target="_blank">github.com/CriminalRETe...</a> (there is also Discord) <a class="hashtag" rel="nofollow noopener" href="https://bsky.app/search?q=%23retrodev" target="_blank">#retrodev</a> <a class="hashtag" rel="nofollow noopener" href="https://bsky.app/search?q=%23reverseengineering" target="_blank">#reverseengineering</a> <a class="hashtag" rel="nofollow noopener" href="https://bsky.app/search?q=%23retrogaming" target="_blank">#retrogaming</a> <a class="hashtag" rel="nofollow noopener" href="https://bsky.app/search?q=%23gamedev" target="_blank">#gamedev</a> <a class="hashtag" rel="nofollow noopener" href="https://bsky.app/search?q=%23programming" target="_blank">#programming</a> <a class="hashtag" rel="nofollow noopener" href="https://bsky.app/search?q=%23windows95" target="_blank">#windows95</a> <a class="hashtag" rel="nofollow noopener" href="https://bsky.app/search?q=%23windows98" target="_blank">#windows98</a></p>
Biohacking Village<p>🎤 The <a href="https://mastodon.social/tags/BiohackingVillage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BiohackingVillage</span></a> speaker lineup is 🔥 this year!</p><p>🗓️ Plan your visit! The full speaker schedule is live on our site.<br><a href="https://www.villageb.io/speaker-lab" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">villageb.io/speaker-lab</span><span class="invisible"></span></a></p><p>Come learn, connect, and challenge what’s possible in healthcare + cybersecurity. 💻🧠❤️‍🩹</p><p><span class="h-card" translate="no"><a href="https://defcon.social/@defcon" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>defcon</span></a></span> </p><p><a href="https://mastodon.social/tags/DEFCON33" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DEFCON33</span></a> <a href="https://mastodon.social/tags/HealthTech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HealthTech</span></a> <a href="https://mastodon.social/tags/DigitalHealth" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalHealth</span></a> <a href="https://mastodon.social/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://mastodon.social/tags/MedTech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MedTech</span></a> <a href="https://mastodon.social/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://mastodon.social/tags/PatientSafety" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PatientSafety</span></a>#PublicHealthSecurity <a href="https://mastodon.social/tags/MedicalCybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MedicalCybersecurity</span></a></p>
Pyrzout :vm:<p>Reverse Engineering a ‘Tony’ 6502-based Mini Arcade Machine <a href="https://hackaday.com/2025/07/21/reverse-engineering-a-tony-6502-based-mini-arcade-machine/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/07/21/revers</span><span class="invisible">e-engineering-a-tony-6502-based-mini-arcade-machine/</span></a> <a href="https://social.skynetcloud.site/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://social.skynetcloud.site/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://social.skynetcloud.site/tags/arcademachine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>arcademachine</span></a> <a href="https://social.skynetcloud.site/tags/Games" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Games</span></a> #6502</p>
IT News<p>Reverse Engineering a ‘Tony’ 6502-based Mini Arcade Machine - The mainboard of the mini arcade unit with its blob chip and EEPROM. (Credit: Poki... - <a href="https://hackaday.com/2025/07/21/reverse-engineering-a-tony-6502-based-mini-arcade-machine/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/07/21/revers</span><span class="invisible">e-engineering-a-tony-6502-based-mini-arcade-machine/</span></a> <a href="https://schleuss.online/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://schleuss.online/tags/arcademachine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>arcademachine</span></a> <a href="https://schleuss.online/tags/games" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>games</span></a></p>
Cindʎ Xiao 🍉<p>Great analysis of the malware distributed with the esling-config-prettier NPM package compromise on Friday: <a href="https://c-b.io/2025-07-20+-+Install+Linters%2C+Get+Malware+-+DevSecOps+Speedrun+Edition" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">c-b.io/2025-07-20+-+Install+Li</span><span class="invisible">nters%2C+Get+Malware+-+DevSecOps+Speedrun+Edition</span></a></p><p>By <a href="https://bsky.app/profile/c-b.io" rel="nofollow noopener" target="_blank">c-b.io on Bluesky</a> / <a href="https://x.com/cyb3rjerry" rel="nofollow noopener" target="_blank">cyb3rjerry on Twitter</a> :D</p><p><a href="https://infosec.exchange/tags/malwareanalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malwareanalysis</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/npm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>npm</span></a> <a href="https://infosec.exchange/tags/npmsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>npmsecurity</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/reversing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reversing</span></a></p>
Poking Technology<p>I bought a cheap, modern, toy games console from AliExpress that wasn't a NES clone and reverse engineered it. It turns out to be based around a 8MHz WDT65c02 with 2kB of RAM, embedded into a blob chip, with a really interesting OS.</p><p><a href="https://www.youtube.com/watch?v=jJ0XmZvR4bU" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">youtube.com/watch?v=jJ0XmZvR4bU</span><span class="invisible"></span></a></p><p>I made an SDK for it: <a href="https://github.com/davidgiven/tony-sdk" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/davidgiven/tony-sdk</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> #6502 <a href="https://mastodon.social/tags/homebrew" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>homebrew</span></a> <a href="https://mastodon.social/tags/retrocomputing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>retrocomputing</span></a></p>
Pyrzout :vm:<p>A Spectrophotometer Jailbreak to Resolve Colorful Disputes <a href="https://hackaday.com/2025/07/19/a-spectrophotometer-jailbreak-to-resolve-colorful-disputes/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/07/19/a-spec</span><span class="invisible">trophotometer-jailbreak-to-resolve-colorful-disputes/</span></a> <a href="https://social.skynetcloud.site/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://social.skynetcloud.site/tags/Spectrophotometer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spectrophotometer</span></a> <a href="https://social.skynetcloud.site/tags/spectrophotometry" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spectrophotometry</span></a> <a href="https://social.skynetcloud.site/tags/firmwareupdate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firmwareupdate</span></a> <a href="https://social.skynetcloud.site/tags/SerialNumber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SerialNumber</span></a> <a href="https://social.skynetcloud.site/tags/Pantone" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pantone</span></a></p>
IT News<p>A Spectrophotometer Jailbreak to Resolve Colorful Disputes - The human eye’s color perception is notoriously variable (see, for example, the f... - <a href="https://hackaday.com/2025/07/19/a-spectrophotometer-jailbreak-to-resolve-colorful-disputes/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/07/19/a-spec</span><span class="invisible">trophotometer-jailbreak-to-resolve-colorful-disputes/</span></a> <a href="https://schleuss.online/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://schleuss.online/tags/spectrophotometer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spectrophotometer</span></a> <a href="https://schleuss.online/tags/spectrophotometry" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spectrophotometry</span></a> <a href="https://schleuss.online/tags/firmwareupdate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>firmwareupdate</span></a> <a href="https://schleuss.online/tags/serialnumber" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>serialnumber</span></a> <a href="https://schleuss.online/tags/pantone" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pantone</span></a></p>
hubertf<p>Playing more with angr, I got a hint that the "pacman" reverse-engineering challenge from this year's L3ak CTF can be solved with angr, and it can - pretty easy, even. :-) </p><p>No writeup but a screenshot... ;-)</p><p><a href="https://mastodon.social/tags/ctf" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ctf</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/angr" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>angr</span></a> <a href="https://mastodon.social/tags/l3ak" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>l3ak</span></a> <a href="https://mastodon.social/tags/l3akctf" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>l3akctf</span></a> <a href="https://mastodon.social/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a></p>
cm0002<p><strong>Wii U SDBoot1 Exploit “paid the beak”</strong></p> <p><a href="https://lemmy.world/post/33194707" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lemmy.world/post/33194707</span><span class="invisible"></span></a></p>
Troed Sångberg<p>Alright, who'll be the first to extract Rest's firmware?</p><p><a href="https://candidcruisetravel.com/travel-reporter-accuses-hyatt-of-500-smoking-fee-scam/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">candidcruisetravel.com/travel-</span><span class="invisible">reporter-accuses-hyatt-of-500-smoking-fee-scam/</span></a></p><p><a href="https://swecyb.com/tags/IoT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IoT</span></a> <a href="https://swecyb.com/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a></p>
Michael Engel<p>Did you know that there is not only Matt Godbolt's Compiler Explorer at <a href="https://godbolt.org" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">godbolt.org</span><span class="invisible"></span></a>, but also a Decompiler Explorer, appropriately named <a href="https://dogbolt.org" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">dogbolt.org</span><span class="invisible"></span></a>, which compares the output of Ghidra, BinaryNinja, IDA and other decompilers?</p><p><a href="https://sueden.social/tags/decompile" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>decompile</span></a> <a href="https://sueden.social/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a></p>
Kevin Thomas ✅<p>UiDll is a 64-bit Windows DLL exporting Windows API UI functionality written in Assembler. <a href="https://defcon.social/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://github.com/mytechnotalent/UiDll" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/mytechnotalent/UiDl</span><span class="invisible">l</span></a></p>
Chris Gammell<p>I love watching Matt Brown's videos reverse engineering <a href="https://chaos.social/tags/iot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iot</span></a> products that have ...let's say "less than stellar" security implemented. He shows his hardwaer <a href="https://chaos.social/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> and we get to follow along and learn with him.</p><p>This week on The Amp Hour Electronics Podcast (episode 698) I talked to Matt about his work and how we can implement some better security practices into our IoT devices.</p><p><a href="https://theamphour.com/698-hardware-security-with-matt-brown/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">theamphour.com/698-hardware-se</span><span class="invisible">curity-with-matt-brown/</span></a></p>
Severin<p>Dumping the mask ROM &amp; RAM from the electronics board of a Miele W 961 washing machine via the optical PC interface.<br>Detailed blog post coming soon!</p><p><a href="https://mastodon.social/tags/Hardware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hardware</span></a> <a href="https://mastodon.social/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://mastodon.social/tags/Hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hacking</span></a> <a href="https://mastodon.social/tags/Miele" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Miele</span></a></p>
GeneralX ⏳<p>Tagging: <a href="https://freeradical.zone/tags/ICEBlock" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ICEBlock</span></a> <a href="https://freeradical.zone/tags/Privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Privacy</span></a> <a href="https://freeradical.zone/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a></p>
k3ym𖺀<p><strong>The mice are getting smarter. But so are the cats.</strong></p><p>Malware’s evolving—sandbox-aware, VM-aware, and playing dead like it's auditioning for a nature documentary. But <span class="h-card" translate="no"><a href="https://infosec.exchange/@FortiGuardLabs" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>FortiGuardLabs</span></a></span> is bringing the claws with real-time behavioral detection that doesn’t rely on hopes and dreams.</p><p>This isn’t your grandma’s AV anymore.</p><p><strong>Key takeaways:</strong></p><ul><li>Modern malware avoids detection by acting normal until you blink</li><li>Static detection is getting smoked by polymorphic code and evasive loaders</li><li>FortiEDR &amp; FortiDeceptor are leveraging runtime behavior, memory inspection, and deception to outsmart stealthy threats</li><li>Cats &gt; mice, especially when they know your playbook</li></ul><p>🔗 Full breakdown:<br><a href="https://www.fortinet.com/blog/threat-research/catching-smarter-mice-with-even-smarter-cats" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">fortinet.com/blog/threat-resea</span><span class="invisible">rch/catching-smarter-mice-with-even-smarter-cats</span></a></p><p><strong>TL;DR for blue teamers:</strong></p><ul><li>Stop chasing IOCs and start profiling behavior.</li><li>Watch process spawning patterns and parent/child anomalies.</li><li>Deception tech isn’t just a gimmick—it’s how you catch the stuff that thinks it’s invisible.</li><li>If your EDR doesn’t trigger on a payload sleeping for 5 minutes, you’re already five minutes too late.</li></ul><blockquote><p>“It’s clean, I ran it through the sandbox.”<br>— The last words of a junior analyst before the domain controller started speaking Russian</p></blockquote><p><a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/MalwareEvasion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MalwareEvasion</span></a> <a href="https://infosec.exchange/tags/BehavioralDetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BehavioralDetection</span></a> <a href="https://infosec.exchange/tags/EDR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EDR</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/BlueTeam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BlueTeam</span></a> <a href="https://infosec.exchange/tags/DeceptionTech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DeceptionTech</span></a> <a href="https://infosec.exchange/tags/SandboxEvasion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SandboxEvasion</span></a> <a href="https://infosec.exchange/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a></p>
Mike Coats 🏴󠁧󠁢󠁳󠁣󠁴󠁿🇪🇺🌍♻️<p>My latest blog post: Reverse Engineering a Broken Night Light - Part 1 - Tear Down </p><p><a href="https://mikecoats.com/night-light-part-1/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mikecoats.com/night-light-part</span><span class="invisible">-1/</span></a></p><p>We bought our first Night Light when our daughter was born; within 3 years, it and its replacement had broken. Let's tear it down, reverse-engineer what's left, and build it back up with some extra 'smart' features.</p><p><a href="https://mikecoats.social/tags/electronics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>electronics</span></a> <a href="https://mikecoats.social/tags/hardware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hardware</span></a> <a href="https://mikecoats.social/tags/reverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseEngineering</span></a></p>