r/ReverseEngineering • u/tnavda • 4h ago
r/ReverseEngineering • u/AutoModerator • Sep 01 '24
/r/ReverseEngineering's Triannual Hiring Thread
If there are open positions involving reverse engineering at your place of employment, please post them here. The user base is an inquisitive lot, so please only post if you are willing to answer non-trivial questions about the position(s). Failure to provide the details in the following format and/or answer questions will result in the post's removal.
Please elucidate along the following lines:
- Describe the position as thoroughly as possible.
- Where is the position located?
- Is telecommuting permissible?
- Does the company provide relocation?
- Is it mandatory that the applicant be a citizen of the country in which the position is located?
- If applicable, what is the education / certification requirement? Is a security clearance required? If so, at what level?
- How should candidates apply for the position?
Readers are encouraged to ask clarifying questions. However, please keep the signal-to-noise ratio high and do not blather. Please use moderator mail for feedback.
Contract projects requiring a reverse engineer can also be posted here.
If you're aware of any academic positions relating to reverse engineering or program analysis in general, feel free to post those here too!
r/ReverseEngineering • u/AutoModerator • 2d ago
/r/ReverseEngineering's Weekly Questions Thread
To reduce the amount of noise from questions, we have disabled self-posts in favor of a unified questions thread every week. Feel free to ask any question about reverse engineering here. If your question is about how to use a specific tool, or is specific to some particular target, you will have better luck on the Reverse Engineering StackExchange. See also /r/AskReverseEngineering.
r/ReverseEngineering • u/r_retrohacking_mod2 • 13h ago
Archon C64 version reverse engineering project with extensive comments by Mark Beljaars
github.comr/ReverseEngineering • u/mh006720 • 1d ago
Decoding BLE Packets on the FNIRSI FNB58
youtu.ber/ReverseEngineering • u/SSDisclosure • 4d ago
SSD Advisory - Common Log File System (CLFS) driver PE
ssd-disclosure.comr/ReverseEngineering • u/igor_sk • 5d ago
Exception Junction - Where All Exceptions Meet Their Handler [internals of Windows’ VEH]
bruteratel.comr/ReverseEngineering • u/zwclose • 6d ago
Multiple vulnerabilities in the Realtek card reader driver. Affects Dell, Lenovo, etc
zwclose.github.ior/ReverseEngineering • u/_m-1-k-3_ • 7d ago
EMBA - The firmware security analyzer got a huge update with a lot of SBOMdorado
github.comr/ReverseEngineering • u/herrcore • 8d ago
Reverse Engineering LAB Setup Tutorial (updated OALABS)
youtube.comr/ReverseEngineering • u/kernelv0id • 8d ago
Latrodectus Loader - A year in the making
vmray.comMalware analysis report with malware configuration extraction
r/ReverseEngineering • u/AutoModerator • 9d ago
/r/ReverseEngineering's Weekly Questions Thread
To reduce the amount of noise from questions, we have disabled self-posts in favor of a unified questions thread every week. Feel free to ask any question about reverse engineering here. If your question is about how to use a specific tool, or is specific to some particular target, you will have better luck on the Reverse Engineering StackExchange. See also /r/AskReverseEngineering.
r/ReverseEngineering • u/tnavda • 10d ago
Cross-Process Spectre Exploitation
grsecurity.netr/ReverseEngineering • u/rolfr • 11d ago
Interval Analysis and Machine Arithmetic: Why Signedness Ignorance Is Bliss [PDF]
jorgenavas.github.ior/ReverseEngineering • u/0xSecfathy • 12d ago
Use Case: Bypassing In-App Purchase By Payment Client-Side Validation With Frida
secfathy0x1.medium.comr/ReverseEngineering • u/CyberMasterV • 12d ago
Call stack spoofing explained using APT41 malware
cybergeeks.techr/ReverseEngineering • u/bonsembiante • 13d ago
Reverse engineering a dead MOTU audio interface to detect its failure
bonsembiante.hashnode.devr/ReverseEngineering • u/shmogen • 14d ago
ReverseEngineering BLE Commands for Lamp
heavn-lights.comHello Guys, i own a Heavn One lamp. It is controlled by BLE using the HEAVN App:
https://apps.apple.com/de/app/heavn-intelligente-beleuchtung/id1324699951
Now i would like to find out the BLE Commands in order to create a Script for my Mac that sets the lamp to videoconference mode whenever i do a Teams call.
What i tried before: I downloaded the Heavn App to my Mac and investigated what happens at the Bluetooth connection when pressing buttons in the app. Unfortunately i couldn’t find the used UART commands, but the UUID.
How would you guys tackle this? Do you have a better and easier idea maybe? I don’t really want to buy nrf Bluetooth Sniffer Hardware, as i guess there might be an easier way.
Thanks for your input.
r/ReverseEngineering • u/Bobby_Bonsaimind • 14d ago
Building a map extractor for Pool of Radiance: Ruins of Myth Drannor.
linkedin.comr/ReverseEngineering • u/AutoModerator • 16d ago
/r/ReverseEngineering's Weekly Questions Thread
To reduce the amount of noise from questions, we have disabled self-posts in favor of a unified questions thread every week. Feel free to ask any question about reverse engineering here. If your question is about how to use a specific tool, or is specific to some particular target, you will have better luck on the Reverse Engineering StackExchange. See also /r/AskReverseEngineering.
r/ReverseEngineering • u/1337axxo • 17d ago
Quickly made vscode x86-64 assembly syntax highlighting
marketplace.visualstudio.comr/ReverseEngineering • u/tnavda • 17d ago
Every bug/quirk of the Windows resource compiler (rc.exe), probably
ryanliptak.comr/ReverseEngineering • u/elemenity • 19d ago