Discussion
Loading...

#Tag

Log in
  • About
  • Code of conduct
  • Privacy
  • Users
  • Instances
  • About Bonfire
theruran 💻 🌐 :cereal_killer: boosted
Tim Blazytko
Tim Blazytko
@mr_phrazer@infosec.exchange  ·  activity timestamp 4 weeks ago

Happy to bring my Software Deobfuscation Techniques training back to @recon - June 15–18, 2026 in Montreal!

Learn systematic approaches to defeating modern obfuscation found in DRM/anti-tamper & APT malware.

https://recon.cx/2026/en/trainingSoftwareDeobfuscationTechniques.html

#reverseengineering #malware

Sorry, no caption provided by author
Sorry, no caption provided by author
Sorry, no caption provided by author

Software Deobfuscation Techniques - REcon 2026 Training

4-day code deobfuscation training. Master VM-based obfuscation analysis, symbolic execution, SMT solving, and program synthesis.
  • Copy link
  • Flag this post
  • Block
Tim Blazytko
Tim Blazytko
@mr_phrazer@infosec.exchange  ·  activity timestamp 4 weeks ago

Happy to bring my Software Deobfuscation Techniques training back to @recon - June 15–18, 2026 in Montreal!

Learn systematic approaches to defeating modern obfuscation found in DRM/anti-tamper & APT malware.

https://recon.cx/2026/en/trainingSoftwareDeobfuscationTechniques.html

#reverseengineering #malware

Sorry, no caption provided by author
Sorry, no caption provided by author
Sorry, no caption provided by author

Software Deobfuscation Techniques - REcon 2026 Training

4-day code deobfuscation training. Master VM-based obfuscation analysis, symbolic execution, SMT solving, and program synthesis.
  • Copy link
  • Flag this post
  • Block
Jan :rust: :ferris: boosted
Kevin Thomas ✅
Kevin Thomas ✅
@kevinthomas@defcon.social  ·  activity timestamp 4 weeks ago

In the Reverse Engineering world, we have a rule: You don't own it until you can take it apart.

The same applies to Artificial Intelligence.

We are currently drowning in API wrappers. Everyone is "building AI apps," but very few people are looking at the wiring underneath. To truly understand modern LLMs, I decided to stop using libraries. I went back to the drawing board to build a custom architecture from scratch.

Meet SARAN (Shallow Auto-Regressive Attention Network).

It’s not designed to beat GPT-4. It’s designed to be transparent. 🔹 I built a strict 15-stage computational graph. 🔹 I manually implemented backpropagation to trace the gradients. 🔹 I scaled it to a 354M parameter model to watch how it learns.

I’ve documented the entire build log—including the architecture decisions and the "why" behind the math—in my new engineering newsletter, Bits & Neurons.

If you want to move beyond the hype and understand the mechanics of AI, read the full breakdown here: https://mytechnotalent.substack.com

#ArtificialIntelligence #MachineLearning #DeepLearning #ReverseEngineering #Engineering #BuildInPublic

Sorry, no caption provided by author
Sorry, no caption provided by author
Sorry, no caption provided by author
  • Copy link
  • Flag this post
  • Block
Kevin Thomas ✅
Kevin Thomas ✅
@kevinthomas@defcon.social  ·  activity timestamp 4 weeks ago

In the Reverse Engineering world, we have a rule: You don't own it until you can take it apart.

The same applies to Artificial Intelligence.

We are currently drowning in API wrappers. Everyone is "building AI apps," but very few people are looking at the wiring underneath. To truly understand modern LLMs, I decided to stop using libraries. I went back to the drawing board to build a custom architecture from scratch.

Meet SARAN (Shallow Auto-Regressive Attention Network).

It’s not designed to beat GPT-4. It’s designed to be transparent. 🔹 I built a strict 15-stage computational graph. 🔹 I manually implemented backpropagation to trace the gradients. 🔹 I scaled it to a 354M parameter model to watch how it learns.

I’ve documented the entire build log—including the architecture decisions and the "why" behind the math—in my new engineering newsletter, Bits & Neurons.

If you want to move beyond the hype and understand the mechanics of AI, read the full breakdown here: https://mytechnotalent.substack.com

#ArtificialIntelligence #MachineLearning #DeepLearning #ReverseEngineering #Engineering #BuildInPublic

Sorry, no caption provided by author
Sorry, no caption provided by author
Sorry, no caption provided by author
  • Copy link
  • Flag this post
  • Block
Hacker News
Hacker News
@h4ckernews@mastodon.social  ·  activity timestamp last month

Reverse engineering Lyft Bikes for fun (and profit?)

https://ilanbigio.com/blog/lyft-bikes.html

#HackerNews #ReverseEngineering #LyftBikes #Fun #Profit #TechInnovation #HackersCommunity

Reverse engineering Lyft bikes for fun (and
profit?) - Ilan Bigio

  • Copy link
  • Flag this post
  • Block
Angela Antunovic boosted
Benjamin Carr, Ph.D. 👨🏻‍💻🧬
Benjamin Carr, Ph.D. 👨🏻‍💻🧬
@BenjaminHCCarr@hachyderm.io  ·  activity timestamp last month

Trump may be beginning of end for ‘ #enshittification’ – this is our chance to make #tech good again by #CoryDoctorow
There is only one reason world isn’t bursting with wildly profitable products and projects that disenshittify #US’s defective products: “anti-circumvention” law bans #reverseengineering that is the necessary prelude to modifying an existing product to make it work better for its users (at the expense of its manufacturer). But the Trump #tariffs change that.
https://www.theguardian.com/commentisfree/2026/jan/10/trump-beginning-of-end-enshittification-make-tech-good-again

the Guardian

Trump may be the beginning of the end for ‘enshittification’ – this is our chance to make tech good again | Cory Doctorow

The US president is weaponising tech, but his tariffs and Brexit provide a surprising opportunity to gain back digital control of our lives, says science fiction author, activist and journalist Cory Doctorow
  • Copy link
  • Flag this post
  • Block
Benjamin Carr, Ph.D. 👨🏻‍💻🧬
Benjamin Carr, Ph.D. 👨🏻‍💻🧬
@BenjaminHCCarr@hachyderm.io  ·  activity timestamp last month

Trump may be beginning of end for ‘ #enshittification’ – this is our chance to make #tech good again by #CoryDoctorow
There is only one reason world isn’t bursting with wildly profitable products and projects that disenshittify #US’s defective products: “anti-circumvention” law bans #reverseengineering that is the necessary prelude to modifying an existing product to make it work better for its users (at the expense of its manufacturer). But the Trump #tariffs change that.
https://www.theguardian.com/commentisfree/2026/jan/10/trump-beginning-of-end-enshittification-make-tech-good-again

the Guardian

Trump may be the beginning of the end for ‘enshittification’ – this is our chance to make tech good again | Cory Doctorow

The US president is weaponising tech, but his tariffs and Brexit provide a surprising opportunity to gain back digital control of our lives, says science fiction author, activist and journalist Cory Doctorow
  • Copy link
  • Flag this post
  • Block
Hacker News
Hacker News
@h4ckernews@mastodon.social  ·  activity timestamp last month

Reverse Engineering the Epson FilmScan 200 for Classic Mac

https://ronangaillard.github.io/posts/reverse-engineering-epson-filmscan-200/

#HackerNews #ReverseEngineering #EpsonFilmScan200 #ClassicMac #RetroTech #MacHacks

Ronan Gaillard

Reverse Engineering the Epson FilmScan 200 for Classic Mac

How I wrote a SCSI driver from scratch to scan 35mm film on a Mac SE/30 running System 7 The Problem I shoot and develop 35mm film at home. It’s a nice hobby, and I do my own prints in a small darkroom. But sometimes I want digital copies to share online or just to archive. A while ago I found an Epson FilmScan 200 on leboncoin (the French Craigslist) for 10 euros. It’s a dedicated 35mm film scanner from 1997 that scans at 1200 DPI optical. At that price, worth a try.
  • Copy link
  • Flag this post
  • Block
Trending Bot boosted
DJ🌞:donor:
DJ🌞:donor:
@infosecdj@infosec.exchange  ·  activity timestamp 2 months ago

Hello and welcome to the second installment of #nakeddiefriday in this new year!

Today's image is of a M37620E8FP, a Mitsubishi microcontroller. This should be one from "group 7620" but I did not find a datasheet for this one. Custom markings on the package likely identify the ROM and its version.

Full-res pano: https://siliconprawn.org/map/mitsubishi/m37620m8-/infosecdj_mz_nikpa40x_50p/

Many thanks to @RueNahcMohr for supplying this sample!

#electronics #reverseengineering #icre

2 media
Die overview shot.
Die overview shot.
Die overview shot.
Package shot.
Package shot.
Package shot.

Loading...

  • Copy link
  • Flag this post
  • Block
DJ🌞:donor:
DJ🌞:donor:
@infosecdj@infosec.exchange  ·  activity timestamp 2 months ago

Hello and welcome to the second installment of #nakeddiefriday in this new year!

Today's image is of a M37620E8FP, a Mitsubishi microcontroller. This should be one from "group 7620" but I did not find a datasheet for this one. Custom markings on the package likely identify the ROM and its version.

Full-res pano: https://siliconprawn.org/map/mitsubishi/m37620m8-/infosecdj_mz_nikpa40x_50p/

Many thanks to @RueNahcMohr for supplying this sample!

#electronics #reverseengineering #icre

2 media
Die overview shot.
Die overview shot.
Die overview shot.
Package shot.
Package shot.
Package shot.

Loading...

  • Copy link
  • Flag this post
  • Block
David Chisnall (*Now with 50% more sarcasm!*) and 1 other boosted
DJ🌞:donor:
DJ🌞:donor:
@infosecdj@infosec.exchange  ·  activity timestamp 2 months ago

Can anyone recognize this IC? Looking for its p/n and a datasheet ideally. Handles all the analog audio paths in a portable cassette player.

EDIT: A knock-off of Mitsumi LAG668F.

#electronics #reverseengineering

A nondescript SOP package marked D668/T70S.
A nondescript SOP package marked D668/T70S.
A nondescript SOP package marked D668/T70S.
  • Copy link
  • Flag this post
  • Block
DJ🌞:donor:
DJ🌞:donor:
@infosecdj@infosec.exchange  ·  activity timestamp 2 months ago

Can anyone recognize this IC? Looking for its p/n and a datasheet ideally. Handles all the analog audio paths in a portable cassette player.

EDIT: A knock-off of Mitsumi LAG668F.

#electronics #reverseengineering

A nondescript SOP package marked D668/T70S.
A nondescript SOP package marked D668/T70S.
A nondescript SOP package marked D668/T70S.
  • Copy link
  • Flag this post
  • Block
Hacker News
Hacker News
@h4ckernews@mastodon.social  ·  activity timestamp 2 months ago

Reverse Engineering a Mysterious UDP Stream in My Hotel (2016)

https://www.gkbrk.com/hotel-music

#HackerNews #ReverseEngineering #UDPStream #HotelMystery #TechExploration #NetworkAnalysis

Reverse Engineering A Mysterious UDP Stream in My Hotel

  • Copy link
  • Flag this post
  • Block
Hacker News
Hacker News
@h4ckernews@mastodon.social  ·  activity timestamp 2 months ago

AMD entered the CPU market with reverse-engineered Intel 8080 clone 50 years ago

https://www.tomshardware.com/pc-components/cpus/amd-first-entered-the-cpu-market-with-reverse-engineered-intel-8080-clone-50-years-ago-the-am9080-cost-50-cents-apiece-to-make-but-sold-for-usd700

#HackerNews #AMD #Intel #CPU #History #ReverseEngineering #TechAnniversary

Tom's Hardware

AMD first entered the CPU market with reverse-engineered Intel 8080 clone 50 years ago — the Am9080 cost 50 cents apiece to make, but sold for $700

In 1975, AMD could make these processors for 50 cents and sell them for $700, providing a great financial springboard to establish the company in PC CPU making.
  • Copy link
  • Flag this post
  • Block
Alex Akselrod boosted
Decoder Loop
Decoder Loop
@decoderloop@infosec.exchange  ·  activity timestamp 2 months ago

🦀 Looking for Rust malware samples to practice analyzing? Our Rust Malware Sample Gallery just received a major update, with 20 new families added! https://github.com/decoderloop/rust-malware-gallery

The Sample Gallery collects links to articles about malware written in Rust, organizes them by malware family, and includes a download link to a publicly available sample for every malware family. This is a resource for any malware analyst who wants to get hands-on with real Rust malware.

The last time the Sample Gallery was updated was almost 2 years ago, in January 2024. Since then, there's been an explosive growth in new Rust malware, including all of the following families that are now in the Sample Gallery:

SPICA, KrustyLoader, RustDoor, SSLoad, Fickle Stealer, Cicada3301 Ransomware, RustyClaw, Embargo Ransomware, RustyAttr, Akira Ransomware (both the Akira_v2 and Megazord variants), Banshee (Rust variant), RALord Ransomware, RustoBot, Tetra Loader, EDDIESTEALER, Myth Stealer, Rustonotto, RustyPages, ChaosBot

This is nearly one new Rust malware family observed in the wild, every month. Rust as a programming language for malware is here to stay!

#rust #rustlang #malware #infosec #ReverseEngineering #MalwareAnalysis #reversing

  • Copy link
  • Flag this post
  • Block
Decoder Loop
Decoder Loop
@decoderloop@infosec.exchange  ·  activity timestamp 2 months ago

🦀 Looking for Rust malware samples to practice analyzing? Our Rust Malware Sample Gallery just received a major update, with 20 new families added! https://github.com/decoderloop/rust-malware-gallery

The Sample Gallery collects links to articles about malware written in Rust, organizes them by malware family, and includes a download link to a publicly available sample for every malware family. This is a resource for any malware analyst who wants to get hands-on with real Rust malware.

The last time the Sample Gallery was updated was almost 2 years ago, in January 2024. Since then, there's been an explosive growth in new Rust malware, including all of the following families that are now in the Sample Gallery:

SPICA, KrustyLoader, RustDoor, SSLoad, Fickle Stealer, Cicada3301 Ransomware, RustyClaw, Embargo Ransomware, RustyAttr, Akira Ransomware (both the Akira_v2 and Megazord variants), Banshee (Rust variant), RALord Ransomware, RustoBot, Tetra Loader, EDDIESTEALER, Myth Stealer, Rustonotto, RustyPages, ChaosBot

This is nearly one new Rust malware family observed in the wild, every month. Rust as a programming language for malware is here to stay!

#rust #rustlang #malware #infosec #ReverseEngineering #MalwareAnalysis #reversing

  • Copy link
  • Flag this post
  • Block
Hacker News
Hacker News
@h4ckernews@mastodon.social  ·  activity timestamp 3 months ago

Reverse engineering a $1B Legal AI tool exposed 100k+ confidential files

https://alexschapiro.com/security/vulnerability/2025/12/02/filevine-api-100k

#HackerNews #ReverseEngineering #LegalAI #ConfidentialFiles #Security #Vulnerability #DataBreach

  • Copy link
  • Flag this post
  • Block
Hacker News
Hacker News
@h4ckernews@mastodon.social  ·  activity timestamp 3 months ago

A Reverse Engineer's Anatomy of the macOS Boot Chain and Security Architecture

https://stack.int.mov/a-reverse-engineers-anatomy-of-the-macos-boot-chain-security-architecture/

#HackerNews #ReverseEngineering #macOS #BootChain #SecurityArchitecture #TechInsights #CyberSecurity

  • Copy link
  • Flag this post
  • Block
Alex Akselrod boosted
Andreas Klopsch
Andreas Klopsch
@hackingump1@infosec.exchange  ·  activity timestamp 4 months ago

Just dropped: my RECON 2025 talk on Rust library recognition in malware! 🦀

I present RIFT—a tool that tackles one of the trickier problems in modern malware analysis, rust library recognition in malicious software.

https://youtu.be/_JiuYkFzVgg?si=7GAVhfyNOzLjPZnS

Worth a watch if you're into RE or malware research.

#malware #reverseengineering #cybersecurity #rift #microsoft

  • Copy link
  • Flag this post
  • Block

bonfire.cafe

A space for Bonfire maintainers and contributors to communicate

bonfire.cafe: About · Code of conduct · Privacy · Users · Instances
Bonfire social · 1.0.2-alpha.32 no JS en
Federation disabled
Log in
Instance logo
  • Explore
  • About
  • Members
  • Code of Conduct