If time allows, a from-scratch deep-dive course I would love to develop. #ReverseEngineering
If time allows, a from-scratch deep-dive course I would love to develop. #ReverseEngineering
Final DEF CON edition drop!
What’s really sold in dark web markets? Reversing the Dark Web explores the underground cybercrime economy through real ads and real malware samples.
This book walks you through stealers, loaders, ransomware, crypters, and more—with hands-on reverse engineering using Ghidra and x64dbg. Look for the @defcon edition at our booth this year!
Also available for pre-order: https://nostarch.com/reversing-dark-web
It is an AI-generated #Linux #malware which was hidden in images with pandas. It supports wide variety of coinminers for various cryptocurrencies and for GPU and different CPU architectures. Its another component, #rootkit #hideproc, tries to hide the Koske miner from file listings and processes.
https://malwarelab.eu/posts/koske-panda-ai/
Video from #anyrun analysis:
Ok there we go.... debugging pins.
Haven't located/figured out the others yet, but will have to hook these up and see what happens.
#hacking #rm200 #colorimeter #reverseengineering
Chapter 7: Debugging Directories x86 - This chapter covers dynamic reverse engineering analysis, debugging, the Windows API CreateDirectoryW and RemoveDirectoryW functions in x86 Assembly. #ReverseEngineering https://github.com/mytechnotalent/Hacking-Windows
Most Android apps don’t expose much through services. But system apps? That’s where things get interesting...
This blog post by David Lodge explains how Android services work and looks into the security risks of AIDL (Android Interface Definition Language) services.
They’re often used by OEMs to expose system-level functionality, sometimes without proper permission checks. That makes them a worthwhile attack surface if you’re testing vendor builds or reviewing apps with elevated privileges.
Learn more here: https://www.pentestpartners.com/security-blog/android-services-101/
An STM32F401 SSD1306 display driver written entirely in Assembler. #ReverseEngineering https://github.com/mytechnotalent/STM32F401_SSD1306_Driver
Hello! It's #nakeddiefriday today again, and it will be a little bit different today. The die I got for you is a smartcard chip, marked K740A by ST. This came out of some scrap I bought on the net.
Here is an overview shot of the whole thing. I think I oriented it correctly, with two top bond-outs being power supply. There is one more pad that's not bonded out.
RIFT just got an upgrade!
Now supports FLIRT signature generation on Linux
Perfect for reverse engineering Rust malware https://github.com/microsoft/RIFT
#DFIR #ReverseEngineering #RustLang #FLIRT #MalwareAnalysis
Hi Android #reverseengineering friends. I am new in this field and wanted to try something out... it's probably pure basics. I got an APK and ran `strings` on the `classes.dex` file. There's an interesting URL embedded which might be related to downloading firmware. When running curl, I get two `301 Moved Permanently`. Manually resolving to the new location results in an HTML file with a "Page not found" message so I guess that there's basic auth. How can I decompile the code around that string?
Fusing Cheap eBay Find Into a Digital Rangefinder - One of the earliest commercially-successful camera technologies was the rangefinde... - https://hackaday.com/2025/07/23/fusing-cheap-ebay-find-into-a-digital-rangefinder/ #reverseengineering #reangefinder #photography #hardware #camera #leica
GTA 2 PC version re-implementation project github.com/CriminalRETe... (there is also Discord) #retrodev #reverseengineering #retrogaming #gamedev #programming #windows95 #windows98
The #BiohackingVillage speaker lineup is
this year!
Plan your visit! The full speaker schedule is live on our site.
https://www.villageb.io/speaker-lab
Come learn, connect, and challenge what’s possible in healthcare + cybersecurity.
#DEFCON33 #HealthTech #DigitalHealth #Infosec #MedTech #ReverseEngineering #PatientSafety#PublicHealthSecurity #MedicalCybersecurity
Reverse Engineering a ‘Tony’ 6502-based Mini Arcade Machine https://hackaday.com/2025/07/21/reverse-engineering-a-tony-6502-based-mini-arcade-machine/ #ReverseEngineering #reverseengineering #arcademachine #Games #6502
Reverse Engineering a ‘Tony’ 6502-based Mini Arcade Machine - The mainboard of the mini arcade unit with its blob chip and EEPROM. (Credit: Poki... - https://hackaday.com/2025/07/21/reverse-engineering-a-tony-6502-based-mini-arcade-machine/ #reverseengineering #arcademachine #games
Great analysis of the malware distributed with the esling-config-prettier NPM package compromise on Friday: https://c-b.io/2025-07-20+-+Install+Linters%2C+Get+Malware+-+DevSecOps+Speedrun+Edition
I bought a cheap, modern, toy games console from AliExpress that wasn't a NES clone and reverse engineered it. It turns out to be based around a 8MHz WDT65c02 with 2kB of RAM, embedded into a blob chip, with a really interesting OS.
https://www.youtube.com/watch?v=jJ0XmZvR4bU
I made an SDK for it: https://github.com/davidgiven/tony-sdk
A Spectrophotometer Jailbreak to Resolve Colorful Disputes https://hackaday.com/2025/07/19/a-spectrophotometer-jailbreak-to-resolve-colorful-disputes/ #ReverseEngineering #Spectrophotometer #spectrophotometry #firmwareupdate #SerialNumber #Pantone
A Spectrophotometer Jailbreak to Resolve Colorful Disputes - The human eye’s color perception is notoriously variable (see, for example, the f... - https://hackaday.com/2025/07/19/a-spectrophotometer-jailbreak-to-resolve-colorful-disputes/ #reverseengineering #spectrophotometer #spectrophotometry #firmwareupdate #serialnumber #pantone