berlin.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Alles rund um, über, aus & für Berlin

Administered by:

Server stats:

715
active users

#ReverseEngineering

22 posts16 participants0 posts today
Breathing Retro<p>Lode Runner for the <a class="hashtag" href="https://bsky.app/search?q=%23Apple2" rel="nofollow noopener noreferrer" target="_blank">#Apple2</a> Reverse Engineered: <a href="https://www.callapple.org/software/lode-runner-for-the-apple-ii-reverse-engineered/" rel="nofollow noopener noreferrer" target="_blank">www.callapple.org/software/lod...</a> <a class="hashtag" href="https://bsky.app/search?q=%23retrodev" rel="nofollow noopener noreferrer" target="_blank">#retrodev</a> <a class="hashtag" href="https://bsky.app/search?q=%23reverseengineering" rel="nofollow noopener noreferrer" target="_blank">#reverseengineering</a> <a class="hashtag" href="https://bsky.app/search?q=%23retrocomputing" rel="nofollow noopener noreferrer" target="_blank">#retrocomputing</a> <a class="hashtag" href="https://bsky.app/search?q=%23retrogaming" rel="nofollow noopener noreferrer" target="_blank">#retrogaming</a> <a class="hashtag" href="https://bsky.app/search?q=%23assembler" rel="nofollow noopener noreferrer" target="_blank">#assembler</a><br><br><a href="https://www.callapple.org/software/lode-runner-for-the-apple-ii-reverse-engineered/" rel="nofollow noopener noreferrer" target="_blank">Lode Runner for the Apple II R...</a></p>
:radare2: radare :verified:<p>Work in progress JNI helper plugin for <a href="https://infosec.exchange/tags/radare2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>radare2</span></a> <a href="https://github.com/evilpan/jni_helper/tree/master/r2" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/evilpan/jni_helper/</span><span class="invisible">tree/master/r2</span></a> <a href="https://infosec.exchange/tags/android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>android</span></a> <a href="https://infosec.exchange/tags/java" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>java</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a></p>
Breathing Retro<p>An article about how using a HAIRDRYER, one can achieve interesting graphical effects on <a class="hashtag" href="https://bsky.app/search?q=%23Atari8bit" rel="nofollow noopener noreferrer" target="_blank">#Atari8bit</a> computers (non-English so use your favorite translator): <a href="https://atariarea.krap.pl/artykul/dgf/41" rel="nofollow noopener noreferrer" target="_blank">atariarea.krap.pl/artykul/dgf/41</a> <a class="hashtag" href="https://bsky.app/search?q=%23retrodev" rel="nofollow noopener noreferrer" target="_blank">#retrodev</a> <a class="hashtag" href="https://bsky.app/search?q=%23reverseengineering" rel="nofollow noopener noreferrer" target="_blank">#reverseengineering</a> <a class="hashtag" href="https://bsky.app/search?q=%23atari" rel="nofollow noopener noreferrer" target="_blank">#atari</a> <a class="hashtag" href="https://bsky.app/search?q=%23retrocomputing" rel="nofollow noopener noreferrer" target="_blank">#retrocomputing</a></p>
eShard<p>We emulated iOS 14 in QEMU. <br>This is how we did it: <a href="https://eshard.com/posts/emulating-ios-14-with-qemu" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">eshard.com/posts/emulating-ios</span><span class="invisible">-14-with-qemu</span></a></p><p><a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/iosdev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iosdev</span></a> <a href="https://infosec.exchange/tags/ios" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ios</span></a> <a href="https://infosec.exchange/tags/apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apple</span></a> <a href="https://infosec.exchange/tags/devops" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>devops</span></a></p>
Breathing Retro<p>Automania - Under the Bonnet: "first video in a series exploring how <a class="hashtag" href="https://bsky.app/search?q=%23ZXSpectrum" rel="nofollow noopener noreferrer" target="_blank">#ZXSpectrum</a> games work in more depth, using the ZX Spectrum Analyser tool" <a href="https://www.youtube.com/watch?v=FS8_fCMIgFQ" rel="nofollow noopener noreferrer" target="_blank">www.youtube.com/watch?v=FS8_...</a> <a class="hashtag" href="https://bsky.app/search?q=%23retrodev" rel="nofollow noopener noreferrer" target="_blank">#retrodev</a> <a class="hashtag" href="https://bsky.app/search?q=%23reverseengineering" rel="nofollow noopener noreferrer" target="_blank">#reverseengineering</a> <a class="hashtag" href="https://bsky.app/search?q=%23retrocomputing" rel="nofollow noopener noreferrer" target="_blank">#retrocomputing</a> <a class="hashtag" href="https://bsky.app/search?q=%23retrogaming" rel="nofollow noopener noreferrer" target="_blank">#retrogaming</a><br><br><a href="https://www.youtube.com/watch?v=FS8_fCMIgFQ" rel="nofollow noopener noreferrer" target="_blank">Automania (ZX Spectrum) - Unde...</a></p>
Kevin Thomas ✅<p>Tomorrow, I will be conducting an extensive guest lecture with the 91st Cyber Brigade of the Virginia National Guard where I will instructing <a href="https://defcon.social/tags/Embedded" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Embedded</span></a> <a href="https://defcon.social/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReverseEngineering</span></a> with <a href="https://defcon.social/tags/Ghidra" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ghidra</span></a> and the ATmega328P. I will be lecturing with my new book Hacking Bits. <a href="https://defcon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://defcon.social/tags/Embedded" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Embedded</span></a> <a href="https://github.com/mytechnotalent/Hacking-Bits" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/mytechnotalent/Hack</span><span class="invisible">ing-Bits</span></a></p>
DJ🌞:donor:<p>Welcome to the new edition of <a href="https://infosec.exchange/tags/nakeddiefriday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>nakeddiefriday</span></a> everyone. The guest today is the famous ESP8266EX by Espressif, a SoC loved by many in the electronics world.</p><p>Unfortunately, the digital section is fully covered by two topmost metal layers carrying power. We do have a glorious analog/RF section though.</p><p>SiPron page: <a href="https://siliconpr0n.org/archive/doku.php?id=infosecdj:espressif:esp8266ex" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">siliconpr0n.org/archive/doku.p</span><span class="invisible">hp?id=infosecdj:espressif:esp8266ex</span></a></p><p><a href="https://infosec.exchange/tags/electronics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>electronics</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/microscopy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>microscopy</span></a></p>
eShard<p>Reverse 'angrypangolin.exe' 🦔 with a Time Travel trace.<br>One wrong input was recorded, can you find the right one?</p><p>📍 Find us at our booth at Zer0Con!<br>More info: <a href="https://github.com/eshard/TTA-CTF" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/eshard/TTA-CTF</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a></p>
pancake :radare2:<p>The whole <a href="https://infosec.exchange/tags/mcp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mcp</span></a> ecosystem is pure magic, here's a quick demo seamlessly running the r2mcp server. Kudos to the plugin's author <span class="h-card" translate="no"><a href="https://infosec.exchange/@dnakov" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>dnakov</span></a></span> <a href="https://infosec.exchange/tags/r2ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>r2ai</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/llm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>llm</span></a> <a href="https://infosec.exchange/tags/claude" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>claude</span></a> if you want to try it out, just run “r2pm -Uci r2mcp" and add the json block described in the repo’s readme!</p>
The Oasis BBS<p>Illegal Opcodes of the MOS 6502: Glitches That Work<br><a href="https://techhub.social/tags/MOS6502" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MOS6502</span></a> <a href="https://techhub.social/tags/Commodore64" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Commodore64</span></a> <a href="https://techhub.social/tags/C64" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>C64</span></a> <a href="https://techhub.social/tags/RetroComputing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RetroComputing</span></a> <a href="https://techhub.social/tags/Assembler" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Assembler</span></a> <a href="https://techhub.social/tags/IllegalOpcodes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IllegalOpcodes</span></a> <a href="https://techhub.social/tags/Tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tech</span></a> <a href="https://techhub.social/tags/Secrets" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Secrets</span></a> <a href="https://techhub.social/tags/Opcodes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Opcodes</span></a> <a href="https://techhub.social/tags/CPU" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CPU</span></a> <a href="https://techhub.social/tags/Programming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Programming</span></a> <a href="https://techhub.social/tags/TechHistory" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TechHistory</span></a> <a href="https://techhub.social/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://techhub.social/tags/VintageTech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VintageTech</span></a><br><a href="https://theoasisbbs.com/illegal-opcodes-of-the-mos-6502-glitches-that-work/?feed_id=2575&amp;_unique_id=67ed37a91512c" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">theoasisbbs.com/illegal-opcode</span><span class="invisible">s-of-the-mos-6502-glitches-that-work/?feed_id=2575&amp;_unique_id=67ed37a91512c</span></a></p>
:radare2: radare :verified:<p>“Analyzing a shellcode with <a href="https://infosec.exchange/tags/r2ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>r2ai</span></a>" article posted in the latest PagedOut ezine! <a href="https://pagedout.institute/download/PagedOut_006.pdf" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">pagedout.institute/download/Pa</span><span class="invisible">gedOut_006.pdf</span></a> by <span class="h-card" translate="no"><a href="https://mastodon.social/@cryptax" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>cryptax</span></a></span> <a href="https://infosec.exchange/tags/shellcodes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>shellcodes</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://infosec.exchange/tags/radare2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>radare2</span></a></p>
buheratorSorry, I blogged:<br><br>Debugging loadlibrary Through Space and Time<br><br><a href="https://scrapco.de/blog/debugging-loadlibrary-through-space-and-time.html" rel="nofollow noopener noreferrer" target="_blank">https://scrapco.de/blog/debugging-loadlibrary-through-space-and-time.html</a><br><br><a class="hashtag" href="https://infosec.place/tag/reverseengineering" rel="nofollow noopener noreferrer" target="_blank">#ReverseEngineering</a> <a class="hashtag" href="https://infosec.place/tag/timetraveldebugging" rel="nofollow noopener noreferrer" target="_blank">#TimeTravelDebugging</a> <a class="hashtag" href="https://infosec.place/tag/rr" rel="nofollow noopener noreferrer" target="_blank">#rr</a> <a class="hashtag" href="https://infosec.place/tag/asan" rel="nofollow noopener noreferrer" target="_blank">#ASAN</a>
IT News<p>A Toothbrush Hacked, in Three Parts - It’s official, we’re living in the future. Certainly that’s the only explanation f... - <a href="https://hackaday.com/2025/04/02/a-toothbrush-hacked-in-three-parts/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/04/02/a-toot</span><span class="invisible">hbrush-hacked-in-three-parts/</span></a> <a href="https://schleuss.online/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://schleuss.online/tags/wrongbaud" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>wrongbaud</span></a> <a href="https://schleuss.online/tags/hardware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hardware</span></a> <a href="https://schleuss.online/tags/firmware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firmware</span></a> <a href="https://schleuss.online/tags/spiflash" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spiflash</span></a> <a href="https://schleuss.online/tags/openocd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openocd</span></a></p>
hubertf<p>4/n <br>Wer von euch nimmt an CTFs teil, und ist auch aus Regensburg? </p><p><a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/CTF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CTF</span></a> <a href="https://mastodon.social/tags/CaptureTheFlag" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CaptureTheFlag</span></a> <a href="https://mastodon.social/tags/HackTheBox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackTheBox</span></a> <a href="https://mastodon.social/tags/KI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KI</span></a> <a href="https://mastodon.social/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://mastodon.social/tags/ML" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ML</span></a> <a href="https://mastodon.social/tags/Blockchain" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Blockchain</span></a> <a href="https://mastodon.social/tags/Pwn" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pwn</span></a> <a href="https://mastodon.social/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://mastodon.social/tags/OSINT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSINT</span></a> <a href="https://mastodon.social/tags/Crypto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Crypto</span></a></p>
hubertf<p>4/n <br>Wer von euch nimmt an CTFs teil, und ist auch aus Regensburg? </p><p><a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/CTF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CTF</span></a> <a href="https://mastodon.social/tags/CaptureTheFlag" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CaptureTheFlag</span></a> <a href="https://mastodon.social/tags/HackTheBox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackTheBox</span></a> <a href="https://mastodon.social/tags/KI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KI</span></a> <a href="https://mastodon.social/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://mastodon.social/tags/ML" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ML</span></a> <a href="https://mastodon.social/tags/Blockchain" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Blockchain</span></a> <a href="https://mastodon.social/tags/Pwn" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pwn</span></a> <a href="https://mastodon.social/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://mastodon.social/tags/OSINT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSINT</span></a> <a href="https://mastodon.social/tags/Crypto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Crypto</span></a></p>
hubertf<p>3/n <br>Für mich persönlich eine tolle Gelegenheit, neuen Theorie und Organisation auch die praktische Seite der CyberSecurity im Team zu Trainieren.</p><p><a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/CTF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CTF</span></a> <a href="https://mastodon.social/tags/CaptureTheFlag" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CaptureTheFlag</span></a> <a href="https://mastodon.social/tags/HackTheBox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackTheBox</span></a> <a href="https://mastodon.social/tags/KI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KI</span></a> <a href="https://mastodon.social/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://mastodon.social/tags/ML" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ML</span></a> <a href="https://mastodon.social/tags/Blockchain" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Blockchain</span></a> <a href="https://mastodon.social/tags/Pwn" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pwn</span></a> <a href="https://mastodon.social/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://mastodon.social/tags/OSINT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSINT</span></a> <a href="https://mastodon.social/tags/Crypto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Crypto</span></a></p>
hubertf<p>2/n <br>Es gab spannende und herausfordernde Übungen u.a. in den klassischen Kategorien Open Source Intelligence (OSINT), Reverse Engineering, Binary Exploitation (Pwn), Coding und Secure Coding sowie Kryptographie (Crypto). Gelegenheiten um mehr neue Technologien zu erlernen gab es in den Kategorien AI, Machine Learning (ML) und Blockchain. </p><p><a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/CTF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CTF</span></a> <a href="https://mastodon.social/tags/CaptureTheFlag" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CaptureTheFlag</span></a> <a href="https://mastodon.social/tags/HackTheBox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackTheBox</span></a> <a href="https://mastodon.social/tags/KI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KI</span></a> <a href="https://mastodon.social/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://mastodon.social/tags/ML" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ML</span></a> <a href="https://mastodon.social/tags/Blockchain" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Blockchain</span></a> <a href="https://mastodon.social/tags/Pwn" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pwn</span></a> <a href="https://mastodon.social/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://mastodon.social/tags/OSINT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSINT</span></a> <a href="https://mastodon.social/tags/Crypto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Crypto</span></a></p>
hubertf<p>1/n <br>Vorletzte und letzte Woche veranstaltete Hack The Box ein CTF Event mit praktischen Übungen zur Cybersecurity. Mit dabei war ein kleines Team aus Regensburg, und von über 8.000 Teilnehmern konnten wir in die Top 10 kommen.</p><p><a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/CTF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CTF</span></a> <a href="https://mastodon.social/tags/CaptureTheFlag" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CaptureTheFlag</span></a> <a href="https://mastodon.social/tags/HackTheBox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackTheBox</span></a> <a href="https://mastodon.social/tags/KI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KI</span></a> <a href="https://mastodon.social/tags/AI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AI</span></a> <a href="https://mastodon.social/tags/ML" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ML</span></a> <a href="https://mastodon.social/tags/Blockchain" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Blockchain</span></a> <a href="https://mastodon.social/tags/Pwn" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pwn</span></a> <a href="https://mastodon.social/tags/ReverseEngineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReverseEngineering</span></a> <a href="https://mastodon.social/tags/OSINT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSINT</span></a> <a href="https://mastodon.social/tags/Crypto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Crypto</span></a></p>
:radare2: radare :verified:<p>MANTILLA: “Identifying runtime libraries in statically linked linux binaries” - using <a href="https://infosec.exchange/tags/radare2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>radare2</span></a> <a href="https://infosec.exchange/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://www.sciencedirect.com/science/article/pii/S0167739X24005661" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">sciencedirect.com/science/arti</span><span class="invisible">cle/pii/S0167739X24005661</span></a></p>
IT News<p>Software Hacks Unlock Cheap Spectrometer - A spectrometer is one of those tools that many of us would love to have, but just ... - <a href="https://hackaday.com/2025/03/31/software-hacks-unlock-cheap-spectrometer/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/03/31/softwa</span><span class="invisible">re-hacks-unlock-cheap-spectrometer/</span></a> <a href="https://schleuss.online/tags/reverseengineering" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reverseengineering</span></a> <a href="https://schleuss.online/tags/softwarehacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>softwarehacks</span></a> <a href="https://schleuss.online/tags/spectrometer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>spectrometer</span></a> <a href="https://schleuss.online/tags/obfuscated" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>obfuscated</span></a> <a href="https://schleuss.online/tags/toolhacks" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>toolhacks</span></a></p>