fosstodon.org is one of the many independent Mastodon servers you can use to participate in the fediverse.
Fosstodon is an invite only Mastodon instance that is open to those who are interested in technology; particularly free & open source software. If you wish to join, contact us for an invite.

Administered by:

Server stats:

10K
active users

#ReverseEngineering

16 posts16 participants3 posts today
Lenin alevski 🕵️💻<p>New Open-Source Tool Spotlight 🚨🚨🚨</p><p>GhidraMCP is a tool designed to analyze Minecraft's obfuscated code using Ghidra. It bridges Ghidra, a powerful reverse engineering tool, with MCP mappings for better readability and easier navigation through Minecraft's code base. </p><p>This is particularly handy for modders or researchers aiming to understand or modify the game's internals. <a href="https://infosec.exchange/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://infosec.exchange/tags/Minecraft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Minecraft</span></a> <a href="https://infosec.exchange/tags/Ghidra" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ghidra</span></a></p><p>🔗 Project link on <a href="https://infosec.exchange/tags/GitHub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitHub</span></a> 👉 <a href="https://github.com/LaurieWired/GhidraMCP" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/LaurieWired/GhidraM</span><span class="invisible">CP</span></a></p><p><a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Software" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Software</span></a> <a href="https://infosec.exchange/tags/Technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Technology</span></a> <a href="https://infosec.exchange/tags/News" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>News</span></a> <a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CTF</span></a> <a href="https://infosec.exchange/tags/Cybersecuritycareer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecuritycareer</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/purpleteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>purpleteam</span></a> <a href="https://infosec.exchange/tags/tips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tips</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudsecurity</span></a></p><p>— ✨<br>🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️</p>
Pyrzout :vm:<p>Software Hacks Unlock Cheap Spectrometer <a href="https://hackaday.com/2025/03/31/software-hacks-unlock-cheap-spectrometer/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/03/31/softwa</span><span class="invisible">re-hacks-unlock-cheap-spectrometer/</span></a> <a href="https://social.skynetcloud.site/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://social.skynetcloud.site/tags/SoftwareHacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SoftwareHacks</span></a> <a href="https://social.skynetcloud.site/tags/spectrometer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spectrometer</span></a> <a href="https://social.skynetcloud.site/tags/obfuscated" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>obfuscated</span></a> <a href="https://social.skynetcloud.site/tags/ToolHacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ToolHacks</span></a></p>
IT News<p>Software Hacks Unlock Cheap Spectrometer - A spectrometer is one of those tools that many of us would love to have, but just ... - <a href="https://hackaday.com/2025/03/31/software-hacks-unlock-cheap-spectrometer/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/03/31/softwa</span><span class="invisible">re-hacks-unlock-cheap-spectrometer/</span></a> <a href="https://schleuss.online/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://schleuss.online/tags/softwarehacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>softwarehacks</span></a> <a href="https://schleuss.online/tags/spectrometer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spectrometer</span></a> <a href="https://schleuss.online/tags/obfuscated" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>obfuscated</span></a> <a href="https://schleuss.online/tags/toolhacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>toolhacks</span></a></p>
Breathing Retro<p>See also: Fully documented source code for Lander on the Acorn Archimedes <a href="https://lander.bbcelite.com/" rel="nofollow noopener noreferrer" target="_blank">lander.bbcelite.com</a> <a class="hashtag" href="https://bsky.app/search?q=%23retrodev" rel="nofollow noopener noreferrer" target="_blank">#retrodev</a> <a class="hashtag" href="https://bsky.app/search?q=%23arm" rel="nofollow noopener noreferrer" target="_blank">#arm</a> <a class="hashtag" href="https://bsky.app/search?q=%23retrogaming" rel="nofollow noopener noreferrer" target="_blank">#retrogaming</a> <a class="hashtag" href="https://bsky.app/search?q=%23retrocomputing" rel="nofollow noopener noreferrer" target="_blank">#retrocomputing</a> <a class="hashtag" href="https://bsky.app/search?q=%23reverseengineering" rel="nofollow noopener noreferrer" target="_blank">#reverseengineering</a> <a class="hashtag" href="https://bsky.app/search?q=%23assembler" rel="nofollow noopener noreferrer" target="_blank">#assembler</a> <a class="hashtag" href="https://bsky.app/search?q=%23riscos" rel="nofollow noopener noreferrer" target="_blank">#riscos</a><br><br>RE: <a href="https://bsky.app/profile/did:plc:io6owsze2yxsfsl2cd7znmik/post/3lllpo45g5225" rel="nofollow noopener noreferrer" target="_blank">https://bsky.app/profile/did:plc:io6owsze2yxsfsl2cd7znmik/post/3lllpo45g5225</a><br><br><a href="https://lander.bbcelite.com/" rel="nofollow noopener noreferrer" target="_blank">Fully documented source code f...</a></p>
IT News<p>Chip Glitching 101 with [Hash] - Ever want to get into reverse engineering but don’t know where to start? You’re in... - <a href="https://hackaday.com/2025/03/30/chip-glitching-101-with-hash/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/03/30/chip-g</span><span class="invisible">litching-101-with-hash/</span></a> <a href="https://schleuss.online/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://schleuss.online/tags/chipwhisperer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>chipwhisperer</span></a> <a href="https://schleuss.online/tags/vulberability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulberability</span></a> <a href="https://schleuss.online/tags/smartmeter" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>smartmeter</span></a> <a href="https://schleuss.online/tags/glitching" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>glitching</span></a> <a href="https://schleuss.online/tags/zero" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zero</span></a>-day <a href="https://schleuss.online/tags/sam4c32" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sam4c32</span></a> <a href="https://schleuss.online/tags/vector" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vector</span></a> <a href="https://schleuss.online/tags/gpnvm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gpnvm</span></a></p>
Pyrzout :vm:<p>Chip Glitching 101 with [Hash] <a href="https://hackaday.com/2025/03/30/chip-glitching-101-with-hash/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/03/30/chip-g</span><span class="invisible">litching-101-with-hash/</span></a> <a href="https://social.skynetcloud.site/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://social.skynetcloud.site/tags/chipwhisperer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>chipwhisperer</span></a> <a href="https://social.skynetcloud.site/tags/vulberability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulberability</span></a> <a href="https://social.skynetcloud.site/tags/smartmeter" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>smartmeter</span></a> <a href="https://social.skynetcloud.site/tags/glitching" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>glitching</span></a> <a href="https://social.skynetcloud.site/tags/zero" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zero</span></a>-day <a href="https://social.skynetcloud.site/tags/SAM4C32" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SAM4C32</span></a> <a href="https://social.skynetcloud.site/tags/vector" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vector</span></a> <a href="https://social.skynetcloud.site/tags/GPNVM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GPNVM</span></a></p>
NG (he/they)<p>My custom back-end now has campaign mode working. It took me way too long to fix a bug I'd caused in <a href="https://mstdn.ca/tags/Robocraft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Robocraft</span></a> 's damage calculations. Just <a href="https://mstdn.ca/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReverseEngineering</span></a> things</p>
Brian Greenberg<p>🧬 Malware Is Evolving — And So Are the Languages It’s Written In — A new study highlights a growing tactic among malware developers: coding in uncommon languages to evade detection.</p><p>🔍 Key takeaways:<br>🔹 Obscure languages like Lisp, Rust, Haskell, Delphi, and Phix are harder for static analysis tools to parse.<br>🔹 These languages often produce fragmented memory layouts and more indirect execution paths, complicating reverse engineering.<br>🔹 Even the choice of compiler — like Tiny C or Embarcadero Delphi — impacts how easily malware can be flagged.<br>🔹 APTs (Advanced Persistent Threats) are increasingly adopting these strategies to fly under the radar.</p><p>💬 Security teams must broaden their detection capabilities and adapt tooling for these underrepresented programming environments.</p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/MalwareAnalysis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MalwareAnalysis</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Programming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Programming</span></a> <a href="https://infosec.exchange/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://infosec.exchange/tags/cloud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloud</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> </p><p><a href="https://www.theregister.com/2025/03/29/malware_obscure_languages/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theregister.com/2025/03/29/mal</span><span class="invisible">ware_obscure_languages/</span></a></p>
Cindʎ Xiao 🍉<p>This was my favourite talk from <span class="h-card" translate="no"><a href="https://infosec.exchange/@REverseConf" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>REverseConf</span></a></span>! <span class="h-card" translate="no"><a href="https://infosec.exchange/@mahaloz" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>mahaloz</span></a></span> made an intimidating (to me) topic really accessible, and I feel like I now have a better understanding of the decompilers I use every day. He is a great presenter too :D Would recommend checking it out!</p><p><a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/decompilation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>decompilation</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/@REverseConf/114241453480617211" translate="no" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec.exchange/@REverseConf/</span><span class="invisible">114241453480617211</span></a></p>
DJ🌞:donor:<p>Alright, let's get the <a href="https://infosec.exchange/tags/nakeddiefriday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nakeddiefriday</span></a> going.</p><p>Today's exhibit is AR9281 by Atheros, a very classic Wi-Fi chip found in many devices. Comes in very pink hues. A short thread with highlights follows.</p><p>SiPron page: <a href="https://siliconpr0n.org/archive/doku.php?id=infosecdj:atheros:ar9281-al1e" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">siliconpr0n.org/archive/doku.p</span><span class="invisible">hp?id=infosecdj:atheros:ar9281-al1e</span></a></p><p><a href="https://infosec.exchange/tags/electronics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>electronics</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/microscopy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>microscopy</span></a></p>
N-gated Hacker News<p>Ah, the pinnacle of human achievement: reverse-engineering a two-decade-old <a href="https://mastodon.social/tags/hedgehog" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hedgehog</span></a> <a href="https://mastodon.social/tags/marathon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>marathon</span></a> 🦔👾! Marvel as developers heroically battle <a href="https://mastodon.social/tags/nostalgia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nostalgia</span></a> and irrelevant code, while GitHub's marketing team pretends this is groundbreaking 🚀.<br><a href="https://github.com/SAT-R/sa2" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/SAT-R/sa2</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://mastodon.social/tags/coding" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>coding</span></a> <a href="https://mastodon.social/tags/GitHub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitHub</span></a> <a href="https://mastodon.social/tags/innovation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>innovation</span></a> <a href="https://mastodon.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackerNews</span></a> <a href="https://mastodon.social/tags/ngated" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ngated</span></a></p>
Laurent Cheylus<p>ghidraMCP: an MCP (Model Context Protocol) server for allowing LLMs to autonomously reverse engineer applications. It exposes numerous tools from core Ghidra functionality to MCP clients <a href="https://bsd.network/tags/LLM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>LLM</span></a> <a href="https://bsd.network/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://github.com/LaurieWired/GhidraMCP" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/LaurieWired/GhidraM</span><span class="invisible">CP</span></a></p>
Marco Ivaldi<p>My idalib-based "vulnerability divination" tool suite is finally available in the official Hex-Rays Plugins &amp; Apps repository! 🦀</p><p><a href="https://plugins.hex-rays.com/search-results?search_term=0xdea" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">plugins.hex-rays.com/search-re</span><span class="invisible">sults?search_term=0xdea</span></a></p><p><a href="https://infosec.exchange/tags/idapro" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>idapro</span></a> <a href="https://infosec.exchange/tags/idalib" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>idalib</span></a> <a href="https://infosec.exchange/tags/vulnerabilityresearch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vulnerabilityresearch</span></a><br><a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a></p>
Stephen Ward<p>Very interesting video on reverse engineering the dystopian taxi game 'Quarantine' from 1994 to mod it and also porting it into the Doom engine.</p><p><a href="https://www.youtube.com/watch?v=nTVZKp6tR-Y" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">youtube.com/watch?v=nTVZKp6tR-Y</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/BoomerShooter" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BoomerShooter</span></a> <a href="https://mastodon.social/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReverseEngineering</span></a></p>
Blue DeviL // SCT<p>MCP Server for IDA Pro</p><p>CC: <span class="h-card" translate="no"><a href="https://infosec.exchange/@mrexodia" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>mrexodia</span></a></span> </p><p><a href="https://github.com/mrexodia/ida-pro-mcp" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/mrexodia/ida-pro-mcp</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/idapro" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>idapro</span></a> <a href="https://infosec.exchange/tags/idaproplugin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>idaproplugin</span></a> <a href="https://infosec.exchange/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a> <a href="https://infosec.exchange/tags/claude" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>claude</span></a> <a href="https://infosec.exchange/tags/vibereversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vibereversing</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a></p>
Blue DeviL // SCT<p>The Path Towards Automated Heap Exploitation</p><p>CC: Thaís Moreira Hamasaki</p><p><a href="https://www.youtube.com/watch?v=5XQ0cAwlWMo" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">youtube.com/watch?v=5XQ0cAwlWMo</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/heap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>heap</span></a> <a href="https://infosec.exchange/tags/exploitation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploitation</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> <a href="https://infosec.exchange/tags/research" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>research</span></a> <a href="https://infosec.exchange/tags/automation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>automation</span></a></p>
IT News<p>Why are Micro Center Flash Drives so Slow? - Every year, USB flash drives get cheaper and hold more data. Unfortunately, they d... - <a href="https://hackaday.com/2025/03/26/why-are-micro-center-flash-drives-so-slow/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/03/26/why-ar</span><span class="invisible">e-micro-center-flash-drives-so-slow/</span></a> <a href="https://schleuss.online/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://schleuss.online/tags/flashdrive" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>flashdrive</span></a> <a href="https://schleuss.online/tags/teardown" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>teardown</span></a></p>
Christian Mayer<p>Reverse Engineering Resource Collection — <a href="https://github.com/geeksniper/reverse-engineering-toolkit" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/geeksniper/reverse-</span><span class="invisible">engineering-toolkit</span></a></p><p><a href="https://mastodon.social/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://mastodon.social/tags/RE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RE</span></a> <a href="https://mastodon.social/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://mastodon.social/tags/collection" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>collection</span></a></p>
fneddy<p>Currently renovating the kitchen and noticed this on the pcb of the new extractor hood. I feel tempted but we are running tight on schedule. </p><p><a href="https://mastodon.social/tags/i2c" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>i2c</span></a> <a href="https://mastodon.social/tags/hardwarehacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hardwarehacking</span></a> <a href="https://mastodon.social/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a></p>
NG (he/they)<p>I wasn't getting anywhere with singleplayer so I moved to campaign mode (basically the same thing, right?). I got enemies to spawn but now I've got 112% health and can't do any damage... <a href="https://mstdn.ca/tags/Robocraft" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Robocraft</span></a> <a href="https://mstdn.ca/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReverseEngineering</span></a></p>