fosstodon.org is one of the many independent Mastodon servers you can use to participate in the fediverse.
Fosstodon is an invite only Mastodon instance that is open to those who are interested in technology; particularly free & open source software. If you wish to join, contact us for an invite.

Administered by:

Server stats:

10K
active users

#reversing

3 posts3 participants2 posts today
Lobsters<p>The Colonel’s Bequest – Case Cracked <a href="https://lobste.rs/s/zpnypl" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lobste.rs/s/zpnypl</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reversing</span></a><br><a href="https://www.benshoof.org/blog/case-cracked" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">benshoof.org/blog/case-cracked</span><span class="invisible"></span></a></p>
Christoffer S.<p>(cyfirma.com) Konni RAT Analysis: Multi-Stage Attack Process and Evasion Techniques <a href="https://www.cyfirma.com/research/analysis-of-konni-rat-stealth-persistence-and-anti-analysis-techniques/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cyfirma.com/research/analysis-</span><span class="invisible">of-konni-rat-stealth-persistence-and-anti-analysis-techniques/</span></a></p><p>Executive Summary:<br>This report provides a comprehensive analysis of Konni RAT, a sophisticated remote access Trojan linked to North Korean cyber espionage group APT37. The malware employs a multi-stage attack process involving batch files, PowerShell scripts, and VBScript to exfiltrate sensitive data and maintain persistence. The attack begins with a zip archive containing a malicious LNK file disguised as a document. The malware exploits Windows Explorer limitations to hide malicious commands and uses obfuscation techniques to evade detection. Key capabilities include data exfiltration from user directories, system information gathering, persistence through registry modifications, and communication with command-and-control servers. The report includes detailed technical analysis of the attack stages, from initial infection to data exfiltration, along with indicators of compromise and YARA detection rules.</p><p><a href="https://swecyb.com/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://swecyb.com/tags/NorthKorea" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NorthKorea</span></a> <a href="https://swecyb.com/tags/APT37" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>APT37</span></a> <a href="https://swecyb.com/tags/MalwareAnalysis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MalwareAnalysis</span></a> <a href="https://swecyb.com/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntel</span></a> <a href="https://swecyb.com/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://swecyb.com/tags/Reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Reversing</span></a></p>
Lenin alevski 🕵️💻<p>New Open-Source Tool Spotlight 🚨🚨🚨</p><p>FLARE's FLOSS is a tool that extracts strings from malware, even if they're obfuscated. Unlike standard tools, FLOSS uses emulation and decoding techniques to identify hidden strings, making it invaluable for reverse engineers. It bridges gaps where simple static analysis falls short. <a href="https://infosec.exchange/tags/malwareanalysis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malwareanalysis</span></a> <a href="https://infosec.exchange/tags/reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reversing</span></a></p><p>🔗 Project link on <a href="https://infosec.exchange/tags/GitHub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitHub</span></a> 👉 <a href="https://github.com/fireeye/flare-floss" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/fireeye/flare-floss</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Software" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Software</span></a> <a href="https://infosec.exchange/tags/Technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Technology</span></a> <a href="https://infosec.exchange/tags/News" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>News</span></a> <a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CTF</span></a> <a href="https://infosec.exchange/tags/Cybersecuritycareer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecuritycareer</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/purpleteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>purpleteam</span></a> <a href="https://infosec.exchange/tags/tips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tips</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudsecurity</span></a></p><p>— ✨<br>🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️</p>
Simon Roses Femerling<p>I have published a new open source online hex editor with really cool features <a href="https://bytesrevealer.online" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bytesrevealer.online</span><span class="invisible"></span></a> 😊 @vulnexsl <a href="https://infosec.exchange/tags/AppSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AppSec</span></a> <a href="https://infosec.exchange/tags/Tool" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tool</span></a> <a href="https://infosec.exchange/tags/Reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Reversing</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> no info is collected, all analysis is done in your browser.</p>
Lobsters<p>tmp.0ut Volume 4 <a href="https://lobste.rs/s/1ridxo" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lobste.rs/s/1ridxo</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reversing</span></a><br><a href="HTTP://Tmpout.sh/4" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible"></span><span class="">HTTP://Tmpout.sh/4</span><span class="invisible"></span></a></p>
Lobsters<p>Introducing GREASE: An Open-Source Tool for Uncovering Hidden Vulnerabilities in Binary Code <a href="https://lobste.rs/s/qykkq8" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lobste.rs/s/qykkq8</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/formalmethods" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>formalmethods</span></a> <a href="https://mastodon.social/tags/release" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>release</span></a> <a href="https://mastodon.social/tags/reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reversing</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a><br><a href="https://www.galois.com/articles/introducing-grease" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">galois.com/articles/introducin</span><span class="invisible">g-grease</span></a></p>
Lobsters<p>Full-stack Reverse Engineering of the Original Microsoft Xbox <a href="https://lobste.rs/s/l4fcpb" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lobste.rs/s/l4fcpb</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/video" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>video</span></a> <a href="https://mastodon.social/tags/hardware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hardware</span></a> <a href="https://mastodon.social/tags/retrocomputing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>retrocomputing</span></a> <a href="https://mastodon.social/tags/reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reversing</span></a><br><a href="https://www.youtube.com/watch?v=hGlIkgmhZvc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">youtube.com/watch?v=hGlIkgmhZvc</span><span class="invisible"></span></a></p>
Lobsters<p>Extracting content from an LCP "protected" ePub <a href="https://lobste.rs/s/1htmqf" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lobste.rs/s/1htmqf</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reversing</span></a><br><a href="https://shkspr.mobi/blog/2025/03/towards-extracting-content-from-an-lcp-protected-epub/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">shkspr.mobi/blog/2025/03/towar</span><span class="invisible">ds-extracting-content-from-an-lcp-protected-epub/</span></a></p>
Lobsters<p><strong>A 6502 emulator written in busybox ash</strong></p> <p><a href="https://fed.brid.gy/r/https://social.treehouse.systems/@cas/114171610700263367" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">fed.brid.gy/r/https://social.t</span><span class="invisible">reehouse.systems/@cas/114171610700263367</span></a></p>
Lobsters<p>A 6502 emulator written in busybox ash via <span class="h-card" translate="no"><a href="https://freeradical.zone/@craftyguy" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>craftyguy</span></a></span> <a href="https://lobste.rs/s/hi8hjp" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lobste.rs/s/hi8hjp</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reversing</span></a><br><a href="https://social.treehouse.systems/@cas/114171610700263367" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">social.treehouse.systems/@cas/</span><span class="invisible">114171610700263367</span></a></p>
Lobsters<p>A long evening with iOS and macOS Sandbox (2018) via <span class="h-card" translate="no"><a href="https://rheinneckar.social/@niklaskorz" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>niklaskorz</span></a></span> <a href="https://lobste.rs/s/z3ifdc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lobste.rs/s/z3ifdc</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/ios" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ios</span></a> <a href="https://mastodon.social/tags/mac" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mac</span></a> <a href="https://mastodon.social/tags/reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reversing</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a><br><a href="https://web.archive.org/web/20220313072719/https://geosn0w.github.io/A-Long-Evening-With-macOS's-Sandbox/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">web.archive.org/web/2022031307</span><span class="invisible">2719/https://geosn0w.github.io/A-Long-Evening-With-macOS's-Sandbox/</span></a></p>
st1nger :unverified: 🏴‍☠️ :linux: :freebsd:<p><a href="https://infosec.exchange/tags/Reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Reversing</span></a> <a href="https://infosec.exchange/tags/Samsung" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Samsung</span></a> <a href="https://infosec.exchange/tags/HArx" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HArx</span></a> <a href="https://infosec.exchange/tags/Hypervisor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hypervisor</span></a> Framework <a href="https://dayzerosec.com/blog/2025/03/08/reversing-samsungs-h-arx-hypervisor-part-1.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dayzerosec.com/blog/2025/03/08</span><span class="invisible">/reversing-samsungs-h-arx-hypervisor-part-1.html</span></a></p>
Washi<p><a href="https://infosec.exchange/tags/AsmResolver" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AsmResolver</span></a> 6.0.0-beta.3 just got pushed to NuGet!</p><p>More bugs were found and squashed. We are closing in on a full release with most of the public API being stable.</p><p>Get it on GitHub or NuGet 👉 <a href="https://github.com/Washi1337/AsmResolver/releases/tag/v6.0.0-beta.3" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/Washi1337/AsmResolv</span><span class="invisible">er/releases/tag/v6.0.0-beta.3</span></a></p><p><a href="https://infosec.exchange/tags/dotnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dotnet</span></a> <a href="https://infosec.exchange/tags/pe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pe</span></a> <a href="https://infosec.exchange/tags/reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reversing</span></a></p>
Lobsters<p>Zen and the Art of Microcode Hacking <a href="https://lobste.rs/s/qnfuus" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lobste.rs/s/qnfuus</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reversing</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a><br><a href="https://bughunters.google.com/blog/5424842357473280/zen-and-the-art-of-microcode-hacking" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bughunters.google.com/blog/542</span><span class="invisible">4842357473280/zen-and-the-art-of-microcode-hacking</span></a></p>
Alexandre Borges<p>Hacking the Xbox 360 Hypervisor: </p><p>01. Hacking the Xbox 360 Hypervisor Part 1: System Overview: <a href="https://icode4.coffee/?p=1047" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">icode4.coffee/?p=1047</span><span class="invisible"></span></a></p><p>02. Hacking the Xbox 360 Hypervisor Part 2: The Bad Update Exploit: <a href="https://icode4.coffee/?p=1081" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">icode4.coffee/?p=1081</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://mastodon.social/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> <a href="https://mastodon.social/tags/exploitation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploitation</span></a> <a href="https://mastodon.social/tags/xbox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>xbox</span></a> <a href="https://mastodon.social/tags/reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reversing</span></a> <a href="https://mastodon.social/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://mastodon.social/tags/hardware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hardware</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/hypervisor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hypervisor</span></a></p>
Alexandre Borges<p>Hacking the Xbox 360 Hypervisor: </p><p>01. Hacking the Xbox 360 Hypervisor Part 1: System Overview: <a href="https://icode4.coffee/?p=1047" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">icode4.coffee/?p=1047</span><span class="invisible"></span></a></p><p>02. Hacking the Xbox 360 Hypervisor Part 2: The Bad Update Exploit: <a href="https://icode4.coffee/?p=1081" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">icode4.coffee/?p=1081</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/exploit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploit</span></a> <a href="https://infosec.exchange/tags/exploitation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploitation</span></a> <a href="https://infosec.exchange/tags/xbox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>xbox</span></a> <a href="https://infosec.exchange/tags/reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reversing</span></a> <a href="https://infosec.exchange/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://infosec.exchange/tags/hardware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hardware</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/hypervisor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hypervisor</span></a></p>
Lobsters<p>Hacking the Xbox 360 Hypervisor Part 1: System Overview <a href="https://lobste.rs/s/dperqz" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lobste.rs/s/dperqz</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reversing</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/virtualization" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>virtualization</span></a><br><a href="https://icode4.coffee/?p=1047" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">icode4.coffee/?p=1047</span><span class="invisible"></span></a></p>
Lobsters<p>Hacking the Xbox 360 Hypervisor Part 2: The Bad Update Exploit <a href="https://lobste.rs/s/6wj9mi" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lobste.rs/s/6wj9mi</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reversing</span></a><br><a href="https://icode4.coffee/?p=1081" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">icode4.coffee/?p=1081</span><span class="invisible"></span></a></p>
Lobsters<p><strong>Accessing region-locked iOS features, such as EU app stores</strong></p> <p><a href="https://fed.brid.gy/r/https://downrightnifty.me/blog/2025/02/27/eu-features-outside.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">fed.brid.gy/r/https://downrigh</span><span class="invisible">tnifty.me/blog/2025/02/27/eu-features-outside.html</span></a></p>
Lobsters<p>NVIDIA emulation journey, part 1: RIVA 128 / NV3 architecture history and basic overview <a href="https://lobste.rs/s/0ldvvk" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lobste.rs/s/0ldvvk</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/graphics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>graphics</span></a> <a href="https://mastodon.social/tags/historical" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>historical</span></a> <a href="https://mastodon.social/tags/reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reversing</span></a><br><a href="https://86box.net/2025/02/25/riva128-part-1.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">86box.net/2025/02/25/riva128-p</span><span class="invisible">art-1.html</span></a></p>