home.social

#reversing — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #reversing, aggregated by home.social.

  1. Neat talk from Fosdem, reversing CAN control messages to use a luxury BMW seat as an office chair!

    fosdem.org/2026/schedule/event

    A friend sent it to me because it references one of my blog posts at the end (unfortunately the speaker misunderstood the blog post, but oh well!)

    #fosdem #reversing

  2. Neat talk from Fosdem, reversing CAN control messages to use a luxury BMW seat as an office chair!

    fosdem.org/2026/schedule/event

    A friend sent it to me because it references one of my blog posts at the end (unfortunately the speaker misunderstood the blog post, but oh well!)

    #fosdem #reversing

  3. Neat talk from Fosdem, reversing CAN control messages to use a luxury BMW seat as an office chair!

    fosdem.org/2026/schedule/event

    A friend sent it to me because it references one of my blog posts at the end (unfortunately the speaker misunderstood the blog post, but oh well!)

    #fosdem #reversing

  4. Neat talk from Fosdem, reversing CAN control messages to use a luxury BMW seat as an office chair!

    fosdem.org/2026/schedule/event

    A friend sent it to me because it references one of my blog posts at the end (unfortunately the speaker misunderstood the blog post, but oh well!)

    #fosdem #reversing

  5. Neat talk from Fosdem, reversing CAN control messages to use a luxury BMW seat as an office chair!

    fosdem.org/2026/schedule/event

    A friend sent it to me because it references one of my blog posts at the end (unfortunately the speaker misunderstood the blog post, but oh well!)

    #fosdem #reversing

  6. Lots of exciting work happening around the MISP project, we’ll reveal more once things are ready 👀

    Meanwhile, a new MISP extension for Ghidra is under active development and steadily growing with awesome new features.

    github.com/MISP/misp-ghidra

    #ghidra #misp #cybersecurity #threatintel #reversing

    @misp
    @circl

  7. Help #Reversing.works empower workers by testing our tool

    Reversing.works is looking for technical beta testers. Help us test #WebUSB Unpinner, a tool critical for worker susveillance.

    reversing.works/posts/2026/01/

  8. Released v1.3.3. of #Yaralyzer, my surprisingly popular tool for visualizing YARA rule matches with colors (a lot of colors).

    1. --export-png images lets you export images of the analysis

    2. almost all command line options (including multi argument ones like --yara-rules-dir) can be permanently set via environment variables or .yaralyzer file

    3. couple of small bug fixes and debugging related command line options

    You can try it on the web here: yaratoolkit.securitybreak.io/
    (I didn't build this website, Thomas Roccia from Microsoft just integrated Yaralyzer into his existing site)

    - Github: github.com/michelcrypt4d4mus/y
    - Pypi: pypi.org/project/yaralyzer/
    - on macOS you can also get it with #Homebrew by installing Pdfalyzer: brew install pdfalyzer

    #ascii #asciiArt #blueteam #cybersecurity #detectionEngineering #DFIR #forensics #FOSS #GPL #hacking #infosec #KaliLinux #maldoc #malware #malwareAnalysis #malwareDetection #openSource #pypi #python #redteam #reverseEngineering #reversing #Threatassessment #threathunting #YARA #YARArule #YARArules

  9. Released v1.3.3. of #Yaralyzer, my surprisingly popular tool for visualizing YARA rule matches with colors (a lot of colors).

    1. --export-png images lets you export images of the analysis

    2. almost all command line options (including multi argument ones like --yara-rules-dir) can be permanently set via environment variables or .yaralyzer file

    3. couple of small bug fixes and debugging related command line options

    You can try it on the web here: yaratoolkit.securitybreak.io/
    (I didn't build this website, Thomas Roccia from Microsoft just integrated Yaralyzer into his existing site)

    - Github: github.com/michelcrypt4d4mus/y
    - Pypi: pypi.org/project/yaralyzer/
    - on macOS you can also get it with #Homebrew by installing Pdfalyzer: brew install pdfalyzer

    #ascii #asciiArt #blueteam #cybersecurity #detectionEngineering #DFIR #forensics #FOSS #GPL #hacking #infosec #KaliLinux #maldoc #malware #malwareAnalysis #malwareDetection #openSource #pypi #python #redteam #reverseEngineering #reversing #Threatassessment #threathunting #YARA #YARArule #YARArules

  10. Released v1.3.3. of #Yaralyzer, my surprisingly popular tool for visualizing YARA rule matches with colors (a lot of colors).

    1. --export-png images lets you export images of the analysis

    2. almost all command line options (including multi argument ones like --yara-rules-dir) can be permanently set via environment variables or .yaralyzer file

    3. couple of small bug fixes and debugging related command line options

    You can try it on the web here: yaratoolkit.securitybreak.io/
    (I didn't build this website, Thomas Roccia from Microsoft just integrated Yaralyzer into his existing site)

    - Github: github.com/michelcrypt4d4mus/y
    - Pypi: pypi.org/project/yaralyzer/
    - on macOS you can also get it with #Homebrew by installing Pdfalyzer: brew install pdfalyzer

    #ascii #asciiArt #blueteam #cybersecurity #detectionEngineering #DFIR #forensics #FOSS #GPL #hacking #infosec #KaliLinux #maldoc #malware #malwareAnalysis #malwareDetection #openSource #pypi #python #redteam #reverseEngineering #reversing #Threatassessment #threathunting #YARA #YARArule #YARArules

  11. Released v1.3.3. of #Yaralyzer, my surprisingly popular tool for visualizing YARA rule matches with colors (a lot of colors).

    1. --export-png images lets you export images of the analysis

    2. almost all command line options (including multi argument ones like --yara-rules-dir) can be permanently set via environment variables or .yaralyzer file

    3. couple of small bug fixes and debugging related command line options

    You can try it on the web here: yaratoolkit.securitybreak.io/
    (I didn't build this website, Thomas Roccia from Microsoft just integrated Yaralyzer into his existing site)

    - Github: github.com/michelcrypt4d4mus/y
    - Pypi: pypi.org/project/yaralyzer/
    - on macOS you can also get it with #Homebrew by installing Pdfalyzer: brew install pdfalyzer

    #ascii #asciiArt #blueteam #cybersecurity #detectionEngineering #DFIR #forensics #FOSS #GPL #hacking #infosec #KaliLinux #maldoc #malware #malwareAnalysis #malwareDetection #openSource #pypi #python #redteam #reverseEngineering #reversing #Threatassessment #threathunting #YARA #YARArule #YARArules

  12. Released v1.3.3. of #Yaralyzer, my surprisingly popular tool for visualizing YARA rule matches with colors (a lot of colors).

    1. --export-png images lets you export images of the analysis

    2. almost all command line options (including multi argument ones like --yara-rules-dir) can be permanently set via environment variables or .yaralyzer file

    3. couple of small bug fixes and debugging related command line options

    You can try it on the web here: yaratoolkit.securitybreak.io/
    (I didn't build this website, Thomas Roccia from Microsoft just integrated Yaralyzer into his existing site)

    - Github: github.com/michelcrypt4d4mus/y
    - Pypi: pypi.org/project/yaralyzer/
    - on macOS you can also get it with #Homebrew by installing Pdfalyzer: brew install pdfalyzer

    #ascii #asciiArt #blueteam #cybersecurity #detectionEngineering #DFIR #forensics #FOSS #GPL #hacking #infosec #KaliLinux #maldoc #malware #malwareAnalysis #malwareDetection #openSource #pypi #python #redteam #reverseEngineering #reversing #Threatassessment #threathunting #YARA #YARArule #YARArules

  13. Спасаем Бингус, и как я поправил ИИ помощника. Мануал для новичков

    Ещё одна очередная задачка! На этот раз нам предстоит спасти нашего друга! Bingus'а! Давайте же спасём его! А ещё посмотрим на то как ИИ к сожалению, не смогла помочь нам. Спасти Bingus

    habr.com/ru/articles/988732/

    #реверсинжиниринг #декодирование #reverseengineering #reversing #ghidra #crackme #скриптинг #си

  14. Спасаем Бингус, и как я поправил ИИ помощника. Мануал для новичков

    Ещё одна очередная задачка! На этот раз нам предстоит спасти нашего друга! Bingus'а! Давайте же спасём его! А ещё посмотрим на то как ИИ к сожалению, не смогла помочь нам. Спасти Bingus

    habr.com/ru/articles/988732/

    #реверсинжиниринг #декодирование #reverseengineering #reversing #ghidra #crackme #скриптинг #си

  15. Спасаем Бингус, и как я поправил ИИ помощника. Мануал для новичков

    Ещё одна очередная задачка! На этот раз нам предстоит спасти нашего друга! Bingus'а! Давайте же спасём его! А ещё посмотрим на то как ИИ к сожалению, не смогла помочь нам. Спасти Bingus

    habr.com/ru/articles/988732/

    #реверсинжиниринг #декодирование #reverseengineering #reversing #ghidra #crackme #скриптинг #си

  16. Спасаем Бингус, и как я поправил ИИ помощника. Мануал для новичков

    Ещё одна очередная задачка! На этот раз нам предстоит спасти нашего друга! Bingus'а! Давайте же спасём его! А ещё посмотрим на то как ИИ к сожалению, не смогла помочь нам. Спасти Bingus

    habr.com/ru/articles/988732/

    #реверсинжиниринг #декодирование #reverseengineering #reversing #ghidra #crackme #скриптинг #си

  17. #AsmResolver 6.0.0-beta.4 released!

    This release addresses many shortcomings found during beta.3, including ARM32 and ARM64 support, auto references importing, and many other DX improvements.

    👉 Get it on GitHub or NuGet: github.com/Washi1337/AsmResolv

    #dotnet #pe #reversing

  18. #AsmResolver 6.0.0-beta.4 released!

    This release addresses many shortcomings found during beta.3, including ARM32 and ARM64 support, auto references importing, and many other DX improvements.

    👉 Get it on GitHub or NuGet: github.com/Washi1337/AsmResolv

    #dotnet #pe #reversing

  19. just released version 1.0.1 of The Yaralyzer, my unexpectedly popular tool for visualizing and forcibly decoding #YARA matches in binary data. Fixes a small bug when trying to choose a byte offset to force a UTF-16 or UTF-32 decoding of matched bytes.

    someone set up Yaralyzer as a #Kali package; not sure if that's made it into a release yet but if not the links are below.

    universeodon.com/@cryptadamist

    #ascii #asciiArt #blueteam #cybersecurity #detectionengineering #DFIR #forensics #FOSS #hacking #infosec #KaliLinux #malware #malwareDetection #malwareAnalysis #openSource #pdfalyzer #redteam #reverseEngineering #reversing #threathunting #yaralyze #yaralyzer #YARA #YARArule #YARArules

  20. ¡Es turno de Igor Pallin un año más! En su charla "PLC LAN Party: Sistemas Obsoletos y Redes Caóticas" nos presentará los resultados de un análisis a diferentes niveles de cinco PLCs de marcas líderes #ESCVIII #PLCs #Reversing

  21. #AsmResolver 6.0.0-beta.3 just got pushed to NuGet!

    More bugs were found and squashed. We are closing in on a full release with most of the public API being stable.

    Get it on GitHub or NuGet 👉 github.com/Washi1337/AsmResolv

    #dotnet #pe #reversing

  22. #AsmResolver 6.0.0-beta.3 just got pushed to NuGet!

    More bugs were found and squashed. We are closing in on a full release with most of the public API being stable.

    Get it on GitHub or NuGet 👉 github.com/Washi1337/AsmResolv

    #dotnet #pe #reversing

  23. Process injection shenanigans are dear to my heart - it's one of the first things I ever learned in security.

    Inspired by an Akamai blog last month, this blog digs into techniques to tinker with other processes on Linux, and show you how to write a little debugger in C!

    labs.greynoise.io/grimoire/202

    #linux #reversing #strace #ptrace #gdb

  24. The nineth article (38 pages) of the Malware Analysis Series (MAS) is available on:

    exploitreversing.com/2025/01/0

    I would like to thank Ilfak Guilfanov @ilfak and @HexRaysSA (on X) for their constant and uninterrupted support, which have helped me write these articles.

    Even though I haven't been on this subject for years, I promised I would write a series of ten articles, and the last one will be released next week (JAN/15).

    Have a great day.

    #windows #shellcode #malware #reverseengineering #reversing #idapro #malwareanalysis

  25. The nineth article (38 pages) of the Malware Analysis Series (MAS) is available on:

    exploitreversing.com/2025/01/0

    I would like to thank Ilfak Guilfanov @ilfak and @HexRaysSA (on X) for their constant and uninterrupted support, which have helped me write these articles.

    Even though I haven't been on this subject for years, I promised I would write a series of ten articles, and the last one will be released next week (JAN/15).

    Have a great day.

    #windows #shellcode #malware #reverseengineering #reversing #idapro #malwareanalysis

  26. just pushed a new release of The Yaralyzer, my unexpectedly popular tool for visually inspecting the output of #YARA scans with a lot of colors. example output below. change is small: it can now use a directory full of YARA rules files without renaming them all to end in .yara.

    * GitHub: github.com/michelcrypt4d4mus/y
    * PyPi: pypi.org/project/yaralyzer/
    * Can also be installed (indirectly) via homebrew if you install The #Pdfalyzer (different tool)

    someone has packaged this tool for Kali Linux though I don't know if it's in the distro yet. also available for macOS homebrew via an installer someone made for The Pdfalyzer.

    Thomas Roccia at #Microsoft was also kind enough to make The Yaralyzer available via a web interface: x.com/fr0gger_/status/17496900

    #malware #infosec #cybersecurity #kali #KaliLinux #YARArules #malwaredetection #threathunting #reverseEngineering #malwareAnalysis #reversing #yaralyze #yaralyzer #pdfalyze #detectionengineering

  27. Another day, another #AsmResolver version bump: 5.4.0 is out now.

    This release includes support for #PE certificate tables, PE forwarder exports, more quality of life improvements and more bug fixes.

    👉 github.com/Washi1337/AsmResolv

    #reversing

  28. Another day, another #AsmResolver version bump: 5.4.0 is out now.

    This release includes support for #PE certificate tables, PE forwarder exports, more quality of life improvements and more bug fixes.

    👉 github.com/Washi1337/AsmResolv

    #reversing

  29. I spent my Saturday on a dumb project answering the following question:

    What is the smallest #dotnet Hello World binary?

    Turns out, this rabbit hole is deeper than you may expect, so I wrote a blog post about it:
    👉 blog.washi.dev/posts/tinysharp

    #reversing #obfuscation #asmresolver

  30. I spent my Saturday on a dumb project answering the following question:

    What is the smallest #dotnet Hello World binary?

    Turns out, this rabbit hole is deeper than you may expect, so I wrote a blog post about it:
    👉 blog.washi.dev/posts/tinysharp

    #reversing #obfuscation #asmresolver

  31. #AsmResolver 5.3.0 is out!

    More performance and #pe reader bugfixes, new docs, and we also made it easier to ignore errors when writing #dotnet modules.

    Changelog and download links:
    👉 github.com/Washi1337/AsmResolv

    #malware #reversing

  32. #AsmResolver 5.3.0 is out!

    More performance and #pe reader bugfixes, new docs, and we also made it easier to ignore errors when writing #dotnet modules.

    Changelog and download links:
    👉 github.com/Washi1337/AsmResolv

    #malware #reversing