toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

277
active users

#reverseengineering

8 posts7 participants0 posts today
Cindʎ Xiao 🍉<p>🇨🇦 I'll also be presenting a hands-on, step-by-step version of "Reversing a (not-so-) Simple Rust Loader" as a workshop at Ringzer0 COUNTERMEASURE in Ottawa, Canada on November 7, 2025! We will be reversing the Rust malware sample in this article together.</p><p><a href="https://ringzer0.training/countermeasure25-workshop-reversing-a-not-so-simple-rust-loader/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ringzer0.training/countermeasu</span><span class="invisible">re25-workshop-reversing-a-not-so-simple-rust-loader/</span></a></p><p>Hope to see you at <span class="h-card" translate="no"><a href="https://infosec.exchange/@ringzer0" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>ringzer0</span></a></span> in Ottawa!</p><p><a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/rust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rust</span></a> <a href="https://infosec.exchange/tags/rustlang" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rustlang</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://infosec.exchange/tags/MalwareAnalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MalwareAnalysis</span></a> <a href="https://infosec.exchange/tags/infostealer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infostealer</span></a> <a href="https://infosec.exchange/tags/ringzer0" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ringzer0</span></a></p>
Cindʎ Xiao 🍉<p>🦀 New Rust reversing article! Let's take a look at a simple loader for some infostealer malware, distributed via a "can you try my game" scam on Discord. But it's Rust, so is it really simple? This malware sample has a few twists!</p><p><a href="https://cxiao.net/posts/2025-08-17-not-so-simple-rust-loader/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cxiao.net/posts/2025-08-17-not</span><span class="invisible">-so-simple-rust-loader/</span></a></p><p>Along the way, I'll go into detail about how threads, dynamic dispatch, and types work in Rust binaries. It may be helpful for your next Rust reversing adventure!</p><p>Thanks very much to <span class="h-card" translate="no"><a href="https://infosec.exchange/@0xabad1dea" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>0xabad1dea</span></a></span> and <span class="h-card" translate="no"><a href="https://unstable.systems/@demize" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>demize</span></a></span> for providing the sample!</p><p>Edit: The infostealer delivered here is actually a known one, called Myth Stealer! You can read more about the stealer payload in Trellix's article, <a href="https://www.trellix.com/blogs/research/demystifying-myth-stealer-a-rust-based-infostealer/" rel="nofollow noopener" target="_blank">Demystifying Myth Stealer: A Rust Based InfoStealer</a>. Thank you to one of the article authors for reaching out to me about it!</p><p><a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/rust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rust</span></a> <a href="https://infosec.exchange/tags/rustlang" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rustlang</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://infosec.exchange/tags/MalwareAnalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MalwareAnalysis</span></a> <a href="https://infosec.exchange/tags/infostealer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infostealer</span></a></p>
IT News<p>It’s a Pi, But it’s not Quite a Raspberry Pi - When is a Raspberry Pi not a Raspberry Pi? Perhaps when it’s a Pi Zero-shaped boar... - <a href="https://hackaday.com/2025/08/17/its-a-pi-but-its-not-quite-a-raspberry-pi/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/08/17/its-a-</span><span class="invisible">pi-but-its-not-quite-a-raspberry-pi/</span></a> <a href="https://schleuss.online/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://schleuss.online/tags/raspberrypiclone" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>raspberrypiclone</span></a> <a href="https://schleuss.online/tags/raspberrypi" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>raspberrypi</span></a> <a href="https://schleuss.online/tags/rp3a0" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rp3a0</span></a></p>
abadidea<p>someone I know ( <span class="h-card" translate="no"><a href="https://infosec.exchange/@cxiao" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>cxiao</span></a></span> ) wrote a reverse engineering postmortem of a malware spreading on discord that I provided the sample for... I feel less bad now about popping it open in a disassembler and being like "what the hell is all this about" <a href="https://cxiao.net/posts/2025-08-17-not-so-simple-rust-loader/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cxiao.net/posts/2025-08-17-not</span><span class="invisible">-so-simple-rust-loader/</span></a> </p><p><a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/rust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rust</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p>
DJ🌞:donor:<p>Yo all, it is Friday now where I am, so might as well get the <a href="https://infosec.exchange/tags/nakeddiefriday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nakeddiefriday</span></a> thing going.</p><p>Today's guest is the famous NES PPU chip, RP2C07A by Ricoh. What's interesting about this particular sample is that it's very very dead. Many thanks to <span class="h-card" translate="no"><a href="https://chaos.social/@root42" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>root42</span></a></span> for supplying it!</p><p>As always, a short thread follows. Why not give this one a boost while you're here? :D</p><p>SiPron page for those hi-res maps we all love: <a href="https://siliconpr0n.org/archive/doku.php?id=infosecdj:ricoh:rp2c07a" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">siliconpr0n.org/archive/doku.p</span><span class="invisible">hp?id=infosecdj:ricoh:rp2c07a</span></a></p><p>Note the die is oriented the same way Visual 2C02 has it: <a href="https://www.nesdev.org/wiki/Visual_2C02" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">nesdev.org/wiki/Visual_2C02</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/electronics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>electronics</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/icre" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>icre</span></a> <a href="https://infosec.exchange/tags/failureanalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>failureanalysis</span></a></p>
IT News<p>Hacking the Bluetooth-Enabled Anker Prime Power Bank - Selling power banks these days isn’t easy, as you can only stretch the reasonable ... - <a href="https://hackaday.com/2025/08/14/hacking-the-bluetooth-enabled-anker-prime-power-bank/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/08/14/hackin</span><span class="invisible">g-the-bluetooth-enabled-anker-prime-power-bank/</span></a> <a href="https://schleuss.online/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://schleuss.online/tags/bluetoothlowenergy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bluetoothlowenergy</span></a> <a href="https://schleuss.online/tags/customfirmware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>customfirmware</span></a> <a href="https://schleuss.online/tags/powerbank" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>powerbank</span></a></p>
psf<p>It's always a good feeling getting to rename a struct field from something like "12listfunc" to, say, "widget_type". Roughly a million of these to go. <a href="https://oldbytes.space/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a></p>
Alexandre Borges<p>So far, I have already written 15 articles (1045 pages), which have been published on my blog:</p><p>blog: <a href="https://exploitreversing.com" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">exploitreversing.com</span><span class="invisible"></span></a></p><p>ERS: Exploiting Reversing Series (currently at 439 pages, with continued progress underway): </p><p>[+] ERS 05: <a href="https://exploitreversing.com/2025/03/12/exploiting-reversing-er-series-article-05/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/03/1</span><span class="invisible">2/exploiting-reversing-er-series-article-05/</span></a><br>[+] ERS 04: <a href="https://exploitreversing.com/2025/02/04/exploiting-reversing-er-series-article-04/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/02/0</span><span class="invisible">4/exploiting-reversing-er-series-article-04/</span></a><br>[+] ERS 03: <a href="https://exploitreversing.com/2025/01/22/exploiting-reversing-er-series-article-03/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/01/2</span><span class="invisible">2/exploiting-reversing-er-series-article-03/</span></a><br>[+] ERS 02: <a href="https://exploitreversing.com/2024/01/03/exploiting-reversing-er-series-article-02/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2024/01/0</span><span class="invisible">3/exploiting-reversing-er-series-article-02/</span></a><br>[+] ERS 01: <a href="https://exploitreversing.com/2023/04/11/exploiting-reversing-er-series/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2023/04/1</span><span class="invisible">1/exploiting-reversing-er-series/</span></a></p><p>MAS: Malware Analysis Series (606 pages -- finished): </p><p>[+] MAS 10: <a href="https://exploitreversing.com/2025/01/15/malware-analysis-series-mas-article-10/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/01/1</span><span class="invisible">5/malware-analysis-series-mas-article-10/</span></a><br>[+] MAS 09: <a href="https://exploitreversing.com/2025/01/08/malware-analysis-series-mas-article-09/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2025/01/0</span><span class="invisible">8/malware-analysis-series-mas-article-09/</span></a><br>[+] MAS 08: <a href="https://exploitreversing.com/2024/08/07/malware-analysis-series-mas-article-08/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2024/08/0</span><span class="invisible">7/malware-analysis-series-mas-article-08/</span></a><br>[+] MAS 07: <a href="https://exploitreversing.com/2023/01/05/malware-analysis-series-mas-article-7/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2023/01/0</span><span class="invisible">5/malware-analysis-series-mas-article-7/</span></a><br>[+] MAS 06: <a href="https://exploitreversing.com/2022/11/24/malware-analysis-series-mas-article-6/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2022/11/2</span><span class="invisible">4/malware-analysis-series-mas-article-6/</span></a><br>[+] MAS 05: <a href="https://exploitreversing.com/2022/09/14/malware-analysis-series-mas-article-5/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2022/09/1</span><span class="invisible">4/malware-analysis-series-mas-article-5/</span></a><br>[+] MAS 04: <a href="https://exploitreversing.com/2022/05/12/malware-analysis-series-mas-article-4/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2022/05/1</span><span class="invisible">2/malware-analysis-series-mas-article-4/</span></a><br>[+] MAS 03: <a href="https://exploitreversing.com/2022/05/05/malware-analysis-series-mas-article-3/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2022/05/0</span><span class="invisible">5/malware-analysis-series-mas-article-3/</span></a><br>[+] MAS 02: <a href="https://exploitreversing.com/2022/02/03/malware-analysis-series-mas-article-2/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2022/02/0</span><span class="invisible">3/malware-analysis-series-mas-article-2/</span></a><br>[+] MAS 01: <a href="https://exploitreversing.com/2021/12/03/malware-analysis-series-mas-article-1/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">exploitreversing.com/2021/12/0</span><span class="invisible">3/malware-analysis-series-mas-article-1/</span></a></p><p>I'll soon begin writing the next articles in the Exploiting Reversing series, which will focus on vulnerability and exploitation, once I've laid all the necessary groundwork. </p><p>Enjoy reading and have a great day.</p><p><a href="https://infosec.exchange/tags/windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windows</span></a> <a href="https://infosec.exchange/tags/iOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iOS</span></a> <a href="https://infosec.exchange/tags/macOS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>macOS</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/chrome" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>chrome</span></a> <a href="https://infosec.exchange/tags/kernel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kernel</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://infosec.exchange/tags/research" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>research</span></a> <a href="https://infosec.exchange/tags/hypervisor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hypervisor</span></a></p>
Marco Ivaldi<p><a href="https://infosec.exchange/tags/Rust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Rust</span></a> <a href="https://infosec.exchange/tags/Hypervisors" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hypervisors</span></a> for Memory Introspection and <a href="https://infosec.exchange/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a></p><p><a href="https://secret.club/2025/06/02/hypervisors-for-memory-introspection-and-reverse-engineering.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">secret.club/2025/06/02/hypervi</span><span class="invisible">sors-for-memory-introspection-and-reverse-engineering.html</span></a></p><p><a href="https://github.com/memN0ps/illusion-rs" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/memN0ps/illusion-rs</span><span class="invisible"></span></a></p><p><a href="https://github.com/memN0ps/matrix-rs" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/memN0ps/matrix-rs</span><span class="invisible"></span></a></p>
DJ🌞:donor:<p>Hello and welcome to this installment of <a href="https://infosec.exchange/tags/nakeddiefriday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nakeddiefriday</span></a>! Today's guest of honour is one КР556РТ4, a Soviet clone of 82S126 the 256x4 TTL PROM.</p><p>A very short thread.</p><p>SiPron page: <a href="https://siliconpr0n.org/archive/doku.php?id=infosecdj:gamma:kr556rt4" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">siliconpr0n.org/archive/doku.p</span><span class="invisible">hp?id=infosecdj:gamma:kr556rt4</span></a></p><p><a href="https://infosec.exchange/tags/electronics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>electronics</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/icre" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>icre</span></a></p>
IT News<p>Exploring the TRS-80’s Color BASIC’s Random Number Function - Although these days we get to tap into many sources of entropy to give a pretty go... - <a href="https://hackaday.com/2025/08/08/exploring-the-trs-80s-color-basics-random-number-function/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/08/08/explor</span><span class="invisible">ing-the-trs-80s-color-basics-random-number-function/</span></a> <a href="https://schleuss.online/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://schleuss.online/tags/retrocomputing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>retrocomputing</span></a> <a href="https://schleuss.online/tags/pseudorandom" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>pseudorandom</span></a> <a href="https://schleuss.online/tags/trs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>trs</span></a>-80 <a href="https://schleuss.online/tags/basic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>basic</span></a></p>
dorotaC<p>This just in: my friends chucked out a shitty "CO2" <a href="https://fosstodon.org/tags/sensor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sensor</span></a>.</p><p>Actually a breathalyzer:</p><p><a href="https://hackaday.com/2023/02/18/anatomy-of-a-fake-co2-sensor/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2023/02/18/anatom</span><span class="invisible">y-of-a-fake-co2-sensor/</span></a></p><p>It's a really pretty design! And while the man in the video says it's useless, I actually started a CO2 sensor project this winter, but I didn't have a display or case.<br>Now I guess I do!</p><p>But it turns out driving a matrix of <a href="https://fosstodon.org/tags/LCD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LCD</span></a> segments is surprisingly difficult.</p><p>Here's a picture of connections. Wish me luck figuring out.</p><p><a href="https://fosstodon.org/tags/electronics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>electronics</span></a> <a href="https://fosstodon.org/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://fosstodon.org/tags/environment" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>environment</span></a></p>
nytpu<p>New gemlog post: Reverse-Engineering Game Boy Advance Games (and General Reverse-Engineering Advice)</p><p><a href="https://nytpu.com/gemlog/2025-08-06-2" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">nytpu.com/gemlog/2025-08-06-2</span><span class="invisible"></span></a><br><a href="gemini://nytpu.com/gemlog/2025-08-06-2" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible"></span><span class="ellipsis">gemini://nytpu.com/gemlog/2025</span><span class="invisible">-08-06-2</span></a></p><p><a href="https://tilde.zone/tags/GBA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GBA</span></a> <a href="https://tilde.zone/tags/GameBoyAdvance" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GameBoyAdvance</span></a> <a href="https://tilde.zone/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ReverseEngineering</span></a></p>
IT News<p>Microsoft’s new AI reverse-engineers malware autonomously, marking a shift in cybersecurity - Microsoft says its new system could eventually detect new types of malware direct... - <a href="https://www.geekwire.com/2025/microsofts-new-ai-reverse-engineers-malware-autonomously-marking-a-shift-in-cybersecurity/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">geekwire.com/2025/microsofts-n</span><span class="invisible">ew-ai-reverse-engineers-malware-autonomously-marking-a-shift-in-cybersecurity/</span></a> <a href="https://schleuss.online/tags/securefutureinitiative" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securefutureinitiative</span></a> <a href="https://schleuss.online/tags/largelanguagemodels" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>largelanguagemodels</span></a> <a href="https://schleuss.online/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://schleuss.online/tags/aimalwareanalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>aimalwareanalysis</span></a> <a href="https://schleuss.online/tags/microsoftdefender" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoftdefender</span></a> <a href="https://schleuss.online/tags/malwaredetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malwaredetection</span></a> <a href="https://schleuss.online/tags/threatdetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatdetection</span></a> <a href="https://schleuss.online/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://schleuss.online/tags/autonomousai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>autonomousai</span></a> <a href="https://schleuss.online/tags/zerodayquest" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zerodayquest</span></a> <a href="https://schleuss.online/tags/microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoft</span></a></p>
Pyrzout :vm:<p>Project Ire: Microsoft’s autonomous malware detection AI agent <a href="https://www.helpnetsecurity.com/2025/08/05/project-ire-microsoft-autonomous-malware-detection-ai-agent/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">helpnetsecurity.com/2025/08/05</span><span class="invisible">/project-ire-microsoft-autonomous-malware-detection-ai-agent/</span></a> <a href="https://social.skynetcloud.site/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://social.skynetcloud.site/tags/MicrosoftDefender" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MicrosoftDefender</span></a> <a href="https://social.skynetcloud.site/tags/malwaredetection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malwaredetection</span></a> <a href="https://social.skynetcloud.site/tags/automation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>automation</span></a> <a href="https://social.skynetcloud.site/tags/Don" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Don</span></a>'tmiss <a href="https://social.skynetcloud.site/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://social.skynetcloud.site/tags/Hotstuff" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hotstuff</span></a> <a href="https://social.skynetcloud.site/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://social.skynetcloud.site/tags/LLM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LLM</span></a> <a href="https://social.skynetcloud.site/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a></p>
IT News<p>The Scourge of Fake Retro Unijunction Transistors - We all know that it’s easy to get caught out by fake electronic components these d... - <a href="https://hackaday.com/2025/08/04/the-scourge-of-fake-retro-components-like-unijunction-transistors/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/08/04/the-sc</span><span class="invisible">ourge-of-fake-retro-components-like-unijunction-transistors/</span></a> <a href="https://schleuss.online/tags/unijunctiontransistor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>unijunctiontransistor</span></a> <a href="https://schleuss.online/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://schleuss.online/tags/transistor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>transistor</span></a> <a href="https://schleuss.online/tags/fakeparts" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fakeparts</span></a></p>
IT News<p>Reverse-Engineering the TDA7000 FM Radio Receiver IC - A wristwatch featuring the TDA7000 FM radio receiver IC. (Credit: Philips Technica... - <a href="https://hackaday.com/2025/08/03/reverse-engineering-the-tda7000-fm-radio-receiver-ic/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/08/03/revers</span><span class="invisible">e-engineering-the-tda7000-fm-radio-receiver-ic/</span></a> <a href="https://schleuss.online/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://schleuss.online/tags/fmradio" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fmradio</span></a> <a href="https://schleuss.online/tags/tda7000" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tda7000</span></a></p>
IT News<p>Exploring VersaLOGIC pre-LSI Logic Cards With the Data/620 - Before the era of large-scale integration (LSI) semiconductor circuits, discrete l... - <a href="https://hackaday.com/2025/08/02/exploring-versalogic-pre-lsi-logic-cards-with-the-data-620/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/08/02/explor</span><span class="invisible">ing-versalogic-pre-lsi-logic-cards-with-the-data-620/</span></a> <a href="https://schleuss.online/tags/diode" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>diode</span></a>-transistorlogic <a href="https://schleuss.online/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://schleuss.online/tags/retrocomputing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>retrocomputing</span></a> <a href="https://schleuss.online/tags/discretelogic" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>discretelogic</span></a> <a href="https://schleuss.online/tags/bendixg15" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bendixg15</span></a></p>
DJ🌞:donor:<p>Hello and welcome to this installment of <a href="https://infosec.exchange/tags/nakeddiefriday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nakeddiefriday</span></a>, hope you all are doing well. Today I got a visually interesting specimen for you, this one is a NEC uPD76F0102 which is some kind of a microcontroller unit with no public datasheet. It came from a body control unit made by Denso, so duh.</p><p>Let's run a short thread on this one.</p><p>SiPron page: <a href="https://siliconpr0n.org/archive/doku.php?id=infosecdj:nec:d76f0102" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">siliconpr0n.org/archive/doku.p</span><span class="invisible">hp?id=infosecdj:nec:d76f0102</span></a></p><p><a href="https://infosec.exchange/tags/electronics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>electronics</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/icre" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>icre</span></a> <a href="https://infosec.exchange/tags/icreverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>icreverseengineering</span></a></p>
:radare2: radare :verified:<p>radare2 6.0 is out! (codename "brainbow" 🧠🌈)</p><p>A major release focused on stability and maintainability while bringing many new features under the hood. Breaking the ABI compatibility from the 5.9.x saga for to settle a new base for the upcoming versions. <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/radare2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>radare2</span></a> <a href="https://infosec.exchange/tags/unix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>unix</span></a> <a href="https://infosec.exchange/tags/cli" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cli</span></a> </p><p><a href="https://github.com/radareorg/radare2/releases/tag/6.0.0" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/radareorg/radare2/r</span><span class="invisible">eleases/tag/6.0.0</span></a></p>