eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

205
active users

#reverseengineering

9 posts9 participants0 posts today
Tarnkappe.info<p>📬 Flipper Blackhat: Wenn der Flipper Zero zum portablen Linux-Pen-Tester wird<br><a href="https://social.tchncs.de/tags/ITSicherheit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITSicherheit</span></a> <a href="https://social.tchncs.de/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://social.tchncs.de/tags/AllWinnerA33" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AllWinnerA33</span></a> <a href="https://social.tchncs.de/tags/DuckySkript" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DuckySkript</span></a> <a href="https://social.tchncs.de/tags/FlipperBlackhat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FlipperBlackhat</span></a> <a href="https://social.tchncs.de/tags/FlipperZero" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FlipperZero</span></a> <a href="https://social.tchncs.de/tags/Hak5" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hak5</span></a> <a href="https://social.tchncs.de/tags/PineappleVIITactical" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PineappleVIITactical</span></a> <a href="https://social.tchncs.de/tags/WiFiPineapplePager" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WiFiPineapplePager</span></a> <a href="https://sc.tarnkappe.info/f34922" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">sc.tarnkappe.info/f34922</span><span class="invisible"></span></a></p>
GeneralX ⏳<p>At 12:20pm US Central time today (about 1 hour away):</p><p>"Reverse Engineering Surveillance Infrastructure and Feeding Your Neighbors"</p><p>By Ryan O’Horo for <span class="h-card" translate="no"><a href="https://infosec.exchange/@pancakescon" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>pancakescon</span></a></span></p><p><a href="https://freeradical.zone/tags/flocksafety" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>flocksafety</span></a> camera reverse engineering perhaps?</p><p><a href="https://pancakescon.com/2025-conference-information/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">pancakescon.com/2025-conferenc</span><span class="invisible">e-information/</span></a></p><p><a href="https://freeradical.zone/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://freeradical.zone/tags/surveillance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>surveillance</span></a> <a href="https://freeradical.zone/tags/mutualaid" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mutualaid</span></a> <a href="https://freeradical.zone/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://freeradical.zone/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://freeradical.zone/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a></p>
Lasq<p>You can watch my presentation from the yesterday's Not The Hidden Wiki "Hackuj Dobroczynnie" (Hack for good) event below.</p><p>In this presentation I'm talking about how to use LLMs equipped with MCP to power up your malware reverse engineering.</p><p>In the live demo, I'm showing how to use Google's Gemini-CLI to reverse engineer a sophisticated APT backdoor.</p><p><a href="https://www.youtube.com/watch?v=NDA-bSo5wxc" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">youtube.com/watch?v=NDA-bSo5wxc</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/malwareanalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malwareanalysis</span></a> <a href="https://infosec.exchange/tags/ai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ai</span></a> <a href="https://infosec.exchange/tags/llm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>llm</span></a> <a href="https://infosec.exchange/tags/google" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>google</span></a> hashtag#gemini <a href="https://infosec.exchange/tags/vibecoding" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vibecoding</span></a> <a href="https://infosec.exchange/tags/vibere" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vibere</span></a> <a href="https://infosec.exchange/tags/vibereversing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vibereversing</span></a></p>
Phil M0OFX<p>Ghidra: I SUPPORT 16-BIT SEGMENTED MODE<br>Also Ghidra: WHAT IS DS, ES, That's segment zero! Must be!</p><p>Seriously though. Does anyone know how to deal with 16-bit code in Ghidra?<br><a href="https://digipres.club/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a></p>
DJ🌞:donor:<p>Hey all, sorry it has been a while for the <a href="https://infosec.exchange/tags/nakeddiefriday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nakeddiefriday</span></a> due to health reasons, but here we come again!</p><p>Today's guest of honor is one made by intel, the 80286! This is an NMOS sample, but CMOS versions exist too (I got no samples yet). One metal layer only! I also deprocessed the sample to fully expose polysilicon and diffusion layers. Let's have a look?</p><p>Many thanks to <span class="h-card" translate="no"><a href="https://oldbytes.space/@gloriouscow" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>gloriouscow</span></a></span> for supporting this work!</p><p>SiPron page: <a href="https://siliconprawn.org/archive/doku.php?id=infosecdj:intel:80286-10" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">siliconprawn.org/archive/doku.</span><span class="invisible">php?id=infosecdj:intel:80286-10</span></a></p><p><a href="https://infosec.exchange/tags/electronics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>electronics</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/retrocomputing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>retrocomputing</span></a></p>
InfoQ<p>Thoughtworks successfully harnessed <a href="https://techhub.social/tags/GenerativeAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GenerativeAI</span></a> to decode legacy systems without source code!</p><p>Using Gemini 2.5 Pro, they accelerated reverse engineering, creating validated “blueprints” of functionality in just two weeks.</p><p>💡 InfoQ spoke with authors Thiyagu Palanisamy &amp; Chandirasekar Thiagarajan to learn more about the setup of the pilot, and their reflections on the technique's potential.</p><p>📖 Read more: <a href="https://bit.ly/3K8ECII" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bit.ly/3K8ECII</span><span class="invisible"></span></a> </p><p><a href="https://techhub.social/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://techhub.social/tags/LegacySystems" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LegacySystems</span></a> <a href="https://techhub.social/tags/LegacyCode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LegacyCode</span></a> <a href="https://techhub.social/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a></p>
kasdeya<p>hey if any Fedi beings know about Windows <a class="hashtag" href="https://cryptid.cafe/tag/reverseengineering" rel="nofollow noopener" target="_blank">#ReverseEngineering</a> I’d love some advice or help!</p><p>I’m trying to figure out how the anti-save-scumming system for a game called Teleglitch works. here’s what I’ve figured out so far:</p><ul><li>when you make a save, the game also secretly hides information about the save somewhere (the information seems to only consist of “the next save that the user loads should be for level XYZ” or “there should be no savefile. if there’s a savefile, it’s invalid”. all other edits to the savefile are accepted by the game as correct - including edits that instantly freeze the game)</li><li>when you try to load the save, the game compares the secret information with the information in the savefile. if the information doesn’t match, the savefile is considered invalid and the game refuses to load it</li><li>the savefile is stored in a Steam Cloud directory called <code>C:\Program Files (x86)\Steam\userdata\«some numbers»\«more numbers»\remote</code></li><li>the secret information is definitely not stored in this directory (I made the whole thing into a git repo and used that to “rewind time” to make 100% sure)</li><li>the secret information is also not stored in the game’s directory (<code>C:\Program Files (x86)\Steam\steamapps\common\TeleglitchDME</code>) (same thing - I made it into a git repo)</li><li>I’ve checked every registry operation and every file I/O operation using Process Monitor but I’m 90% sure that Process Monitor is missing certain important things that Teleglitch is doing - maybe because it’s delegating tasks to {another process / a subprocess}? but Process Monitor can’t even see Teleglitch write to the Steam Cloud save directory mentioned above</li><li>I tried looking through the executable in Ghidra and the savefile code is definitely in there somewhere, and I’ve been able to kinda make sense of some of it, but I’m not very good with disassembly / decompilation. I’d love some help with this if anyone is interested. it looks like it was probably written in C++ and I’ve found some very good places in the executable to start looking for savefile behavior but I’m baffled by a lot of what I’m seeing - I think a lot of it was automatically added by the C++ compiler</li></ul><p>anyway I would love some advice on what to try next. I’ve tried to summarize just the most important parts of what I know about Teleglitch’s behavior, but I can explain more if anyone is interested!</p>
:radare2: radare :verified:<p>r2ghidra 6.0.2 is out! <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a></p>
Breathing Retro<p>smb1-bugfix -- <a class="hashtag" rel="nofollow noopener" href="https://bsky.app/search?q=%23NES" target="_blank">#NES</a> Super Mario Bros. disassembly project with bugfixes, QoL improvements &amp; more <a class="hashtag" rel="nofollow noopener" href="https://bsky.app/search?q=%23retrodev" target="_blank">#retrodev</a> <a class="hashtag" rel="nofollow noopener" href="https://bsky.app/search?q=%23programming" target="_blank">#programming</a> <a class="hashtag" rel="nofollow noopener" href="https://bsky.app/search?q=%23gamedev" target="_blank">#gamedev</a> <a class="hashtag" rel="nofollow noopener" href="https://bsky.app/search?q=%23nesdev" target="_blank">#nesdev</a> <a class="hashtag" rel="nofollow noopener" href="https://bsky.app/search?q=%23assembler" target="_blank">#assembler</a> <a class="hashtag" rel="nofollow noopener" href="https://bsky.app/search?q=%23reverseengineering" target="_blank">#reverseengineering</a> <a class="hashtag" rel="nofollow noopener" href="https://bsky.app/search?q=%23romhacking" target="_blank">#romhacking</a> <a class="hashtag" rel="nofollow noopener" href="https://bsky.app/search?q=%23retrogaming" target="_blank">#retrogaming</a><br><br><a href="https://github.com/TakuikaNinja/smb1-bugfix" rel="nofollow noopener" target="_blank">GitHub - TakuikaNinja/smb1-bug...</a></p>
Marco Ivaldi<p>I've updated my <a href="https://infosec.exchange/tags/VulnerabilityResearch" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VulnerabilityResearch</span></a> and <a href="https://infosec.exchange/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a> tools to use the latest version of <span class="h-card" translate="no"><a href="https://bird.makeup/users/binarly_io" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>binarly_io</span></a></span> award-winning <a href="https://infosec.exchange/tags/idalib" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>idalib</span></a> <a href="https://infosec.exchange/tags/Rust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Rust</span></a> bindings, which support <span class="h-card" translate="no"><a href="https://infosec.exchange/@HexRaysSA" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>HexRaysSA</span></a></span> IDA Pro 9.2 and their freshly open-sourced SDK.</p><p><a href="https://infosec.exchange/tags/Rhabdomancer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Rhabdomancer</span></a> - Vulnerability research assistant that locates calls to potentially insecure API functions in a binary file.<br><a href="https://github.com/0xdea/rhabdomancer" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/0xdea/rhabdomancer</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Haruspex" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Haruspex</span></a> - Vulnerability research assistant that extracts pseudo-code from the IDA Hex-Rays decompiler.<br><a href="https://github.com/0xdea/haruspex" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/0xdea/haruspex</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Augur" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Augur</span></a> - Reverse engineering assistant that extracts strings and related pseudo-code from a binary file.<br><a href="https://github.com/0xdea/augur" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/0xdea/augur</span><span class="invisible"></span></a></p><p>For additional details:<br><a href="https://security.humanativaspa.it/streamlining-vulnerability-research-with-ida-pro-and-rust/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">security.humanativaspa.it/stre</span><span class="invisible">amlining-vulnerability-research-with-ida-pro-and-rust/</span></a></p>
demoray<p>Are you interested in searching for unknown malicious software? Our team in Microsoft Research continues to grow. This position can be fully remote.</p><p><a href="https://jobs.careers.microsoft.com/global/en/share/1874222/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">jobs.careers.microsoft.com/glo</span><span class="invisible">bal/en/share/1874222/</span></a></p><p><a href="https://infosec.exchange/tags/hiring" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hiring</span></a> <a href="https://infosec.exchange/tags/rustlang" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rustlang</span></a> <a href="https://infosec.exchange/tags/python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>python</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/azure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>azure</span></a></p>
Tarnkappe.info<p>📬 Spotify zielt mit DMCA-Takedown auf neuen ReVanced-Patch<br><a href="https://social.tchncs.de/tags/Entertainment" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Entertainment</span></a> <a href="https://social.tchncs.de/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://social.tchncs.de/tags/APK" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APK</span></a> <a href="https://social.tchncs.de/tags/Copyright" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Copyright</span></a> <a href="https://social.tchncs.de/tags/DMCA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DMCA</span></a> <a href="https://social.tchncs.de/tags/Freemium" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Freemium</span></a> <a href="https://social.tchncs.de/tags/ReVanced" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReVanced</span></a> <a href="https://social.tchncs.de/tags/Spotify" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spotify</span></a> <a href="https://social.tchncs.de/tags/SpotifyPremium" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SpotifyPremium</span></a> <a href="https://social.tchncs.de/tags/Vanced" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vanced</span></a> <a href="https://sc.tarnkappe.info/0993ec" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">sc.tarnkappe.info/0993ec</span><span class="invisible"></span></a></p>
:radare2: radare :verified:<p>The CTF-centric MCP for radare2 has been renamed to r2copilot to avoid conflicting with the official r2mcp. <a href="https://github.com/darallium/r2-copilot" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/darallium/r2-copilot</span><span class="invisible"></span></a> <a href="https://infosec.exchange/tags/llm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>llm</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/radare2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>radare2</span></a></p>
jiska 🦄:fairydust:<p>Want to learn reverse engineering? There'll be a free, women*-only, 4-day BlackHoodie workshop from October 6th to 9th in Paris!</p><p>Topics:<br>• Linux memory forensics 🕵️‍♀️ (by Sonia)<br>• Web app and mobile app pentesting 🕸️📱 (by Paula)<br>• iOS reversing 🍎 (by me)</p><p>Places usually go quickly! Use this link to register - you can even select only the days with the topics that interest you and skip others.<br><a href="https://blackhoodie.re/Hexacon2025/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">blackhoodie.re/Hexacon2025/</span><span class="invisible"></span></a></p><p><a href="https://chaos.social/tags/ios" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ios</span></a> <a href="https://chaos.social/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://chaos.social/tags/blackhoodie" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blackhoodie</span></a></p>
DjangoCon US :django: :python:<p>QR Code Track:<br>📱 Track 1 starting now!</p><p>"Reverse engineering the QR code generator and URL forwarder service"<br>Time to decode the mystery! Learn how to dissect and understand QR code services from the inside out 🕵️♀️</p><p><a href="https://fosstodon.org/tags/DjangoConUS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DjangoConUS</span></a> <a href="https://fosstodon.org/tags/QRCode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>QRCode</span></a> <a href="https://fosstodon.org/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://fosstodon.org/tags/Django" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Django</span></a> <a href="https://fosstodon.org/tags/URLForwarding" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>URLForwarding</span></a> <a href="https://fosstodon.org/tags/TechDetective" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechDetective</span></a></p>
eShard<p>Windows 11 in esReverse. 💻 Full system emulation to boot, record, and rewind your analysis from kernel to userland. </p><p>Read the guide: <a href="https://eshard.com/posts/windows11-esreverse-emulation" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">eshard.com/posts/windows11-esr</span><span class="invisible">everse-emulation</span></a> <a href="https://infosec.exchange/tags/windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windows</span></a> <a href="https://infosec.exchange/tags/emulation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>emulation</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a></p>
Mäh W.<p>I want to dump the SPI flash of an ESP32-WROOM-32UE module. I've been thinking about different ways to do this. I've opened the metal shield and theoretically do have physical access to the SPI flash chip. What's a feasible way? The two dev boards I have A) an ESP32-WROOM-32 module (w/ shield) or B) w/ ESP32-D0WDQ6 MCU (w/o shield). So here's the survey — including the challenges I see with my current setup, knowledge, and skills. :BoostOK: :ReplyOK: </p><p><a href="https://chaos.social/tags/HardwareHacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HardwareHacking</span></a> <a href="https://chaos.social/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://chaos.social/tags/ESP32" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ESP32</span></a></p>
⚯ Michel de Cryptadamus ⚯<p>Used some <a href="https://universeodon.com/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> to jury rig a basic API documentation site for The Yaralyzer, my unexpectedly popular tool for visualizing and forcibly decoding <a href="https://universeodon.com/tags/YARA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>YARA</span></a> matches in binary data.</p><p>* GitHub: <a href="https://github.com/michelcrypt4d4mus/yaralyzer" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/michelcrypt4d4mus/y</span><span class="invisible">aralyzer</span></a><br>* PyPi: <a href="https://pypi.org/project/yaralyzer/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">pypi.org/project/yaralyzer/</span><span class="invisible"></span></a><br>* API documentation: <a href="https://michelcrypt4d4mus.github.io/yaralyzer/api/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">michelcrypt4d4mus.github.io/ya</span><span class="invisible">ralyzer/api/</span></a><br>* Can also be installed (indirectly) via homebrew if you install The <a href="https://universeodon.com/tags/Pdfalyzer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Pdfalyzer</span></a> (different tool)</p><p><a href="https://universeodon.com/tags/ascii" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ascii</span></a> <a href="https://universeodon.com/tags/asciiArt" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>asciiArt</span></a> <a href="https://universeodon.com/tags/blueteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blueteam</span></a> <a href="https://universeodon.com/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://universeodon.com/tags/detectionengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>detectionengineering</span></a> <a href="https://universeodon.com/tags/DFIR" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DFIR</span></a> <a href="https://universeodon.com/tags/forensics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>forensics</span></a> <a href="https://universeodon.com/tags/FOSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FOSS</span></a> <a href="https://universeodon.com/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://universeodon.com/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://universeodon.com/tags/KaliLinux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>KaliLinux</span></a> <a href="https://universeodon.com/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://universeodon.com/tags/malwareDetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malwareDetection</span></a> <a href="https://universeodon.com/tags/malwareAnalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malwareAnalysis</span></a> <a href="https://universeodon.com/tags/openSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openSource</span></a> <a href="https://universeodon.com/tags/pdfalyzer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pdfalyzer</span></a> <a href="https://universeodon.com/tags/redteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redteam</span></a> <a href="https://universeodon.com/tags/reverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseEngineering</span></a> <a href="https://universeodon.com/tags/reversing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reversing</span></a> <a href="https://universeodon.com/tags/threathunting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threathunting</span></a> <a href="https://universeodon.com/tags/yaralyze" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>yaralyze</span></a> <a href="https://universeodon.com/tags/yaralyzer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>yaralyzer</span></a> <a href="https://universeodon.com/tags/YARA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>YARA</span></a> <a href="https://universeodon.com/tags/YARArule" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>YARArule</span></a> <a href="https://universeodon.com/tags/YARArules" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>YARArules</span></a></p>
Breathing Retro<p>Interesting notice from <a class="hashtag" rel="nofollow noopener" href="https://bsky.app/search?q=%23HydroThunder" target="_blank">#HydroThunder</a> ( <a class="hashtag" rel="nofollow noopener" href="https://bsky.app/search?q=%23Dreamcast" target="_blank">#Dreamcast</a> version) page at <a href="https://tcrf.net/Hydro_Thunder_(Dreamcast)" rel="nofollow noopener" target="_blank">tcrf.net/Hydro_Thunde...</a> “Probably the largest amount of uncompiled source code ever found in a Dreamcast game” <a class="hashtag" rel="nofollow noopener" href="https://bsky.app/search?q=%23retrodev" target="_blank">#retrodev</a> <a class="hashtag" rel="nofollow noopener" href="https://bsky.app/search?q=%23modding" target="_blank">#modding</a> <a class="hashtag" rel="nofollow noopener" href="https://bsky.app/search?q=%23romhacking" target="_blank">#romhacking</a> <a class="hashtag" rel="nofollow noopener" href="https://bsky.app/search?q=%23reverseengineering" target="_blank">#reverseengineering</a> <a class="hashtag" rel="nofollow noopener" href="https://bsky.app/search?q=%23retrogaming" target="_blank">#retrogaming</a> <a class="hashtag" rel="nofollow noopener" href="https://bsky.app/search?q=%23programming" target="_blank">#programming</a> <a class="hashtag" rel="nofollow noopener" href="https://bsky.app/search?q=%23gamedev" target="_blank">#gamedev</a></p>
Breathing Retro<p>FlatOut 2 and FlatOut: Ultimate Carnage <a class="hashtag" rel="nofollow noopener" href="https://bsky.app/search?q=%23decompilation" target="_blank">#decompilation</a> effort <a href="https://github.com/ZackWilde27/FlatOut-2-decomp/" rel="nofollow noopener" target="_blank">github.com/ZackWilde27/...</a> See also FlatOut Joint community: <a href="https://discord.com/invite/YAhWJf6GgS" rel="nofollow noopener" target="_blank">discord.com/invite/YAhWJ...</a> <a class="hashtag" rel="nofollow noopener" href="https://bsky.app/search?q=%23reverseengineering" target="_blank">#reverseengineering</a> <a class="hashtag" rel="nofollow noopener" href="https://bsky.app/search?q=%23retrodev" target="_blank">#retrodev</a> <a class="hashtag" rel="nofollow noopener" href="https://bsky.app/search?q=%23ghidra" target="_blank">#ghidra</a> <a class="hashtag" rel="nofollow noopener" href="https://bsky.app/search?q=%23programming" target="_blank">#programming</a> <a class="hashtag" rel="nofollow noopener" href="https://bsky.app/search?q=%23gamedev" target="_blank">#gamedev</a> <a class="hashtag" rel="nofollow noopener" href="https://bsky.app/search?q=%23retrogaming" target="_blank">#retrogaming</a></p>