#diffing

Joxean Koret (@matalaz)joxean
2024-11-03

This paper looks promising: "SIGMADIFF: Semantics-Aware Deep Graph Matching for Pseudocode Diffing".

ink.library.smu.edu.sg/cgi/vie

Ponder Stibbons πŸ‡§πŸ‡·πŸ‡©πŸ‡ͺblackcoffeerider@social.saarland
2024-06-29

I ❀️ #BorgBackup!
I managed to recover from multiple bad situations - including severe filesystem corruption from bad memory.

But #Vorta is failing repeatedly every now & then (often unnoticed!) because of some database (migration?) problems so i moved to #borgmatic .

But now I miss #Vorta s #diffing feature so i wrote a #TUI in #golang doing that.

It is extremely limited but feels clean and useful enough that I think about publishing as is. But where? #github #gitlab #codeberg

Joxean Koret (@matalaz)joxean
2023-07-14

Dear everyone in the academia (and maybe elsewhere) doing research: does not work for comparing different architectures, unless you are using as input for your symbolic execution tool *decompiled code*.

If you are using assembly or using an IR (Intermediate Representation) based on assembler (like Ghidra' p-code, IDA's microcode, LLVM's IR, etc), it will inevitably produce different outputs.

Your best IR for is pseudo-code, the 's output.

Joxean Koret (@matalaz)joxean
2023-07-14
Joxean Koret (@matalaz)joxean
2023-07-12

I know nobody gives a fuck, but this is my next research topic for this year: Finding & by binaries against sources. It sounds much harder than it actually is.


2023-02-17

πŸ“’ Don’t forget to sign up for one of our advanced hands-on #infosec trainings! The first week of #RETURN23XPLOIT is only a few days away. Our trainings offer hands-on instruction from top industry experts. In week 1, learn #Diffing, #ExploitDev, #ARM64, #ReverseEngineering, #IDAPro & more. Don't miss out!

ringzer0.training/

#cybersecurity #training

RETURN23XPLOIT, Week 1 - 18 feb - 24 feb - virtual
- An Analytical Approach to Modern Binary Deobfuscation
- TEEPWN: Breaking TEE by Experience
- The Arm64 Exploit Laboratory
- Practical Firmware implants and Bootkits
- Practical IDA Pro Python Scripting
- Advanced Active Directory Exploitation
2023-02-05

Level up your #cybersecurity skills with #RETURN23XPLOIT! Our trainings offer hands-on instruction from top industry experts. In week 1, learn #Diffing, #ExploitDev, #ARM64, #ReverseEngineering, #IDAPro & more. Don't miss out!

ringzer0.training/

#infosec #training

2023-01-22

πŸ‡ Happy #LunarNewYear! Strive to be clever like a rabbit, and get some #SundayReading in today. Here is β€œ#Pigaios: A Tool for #Diffing Source Codes against #Binaries”, by our instructor Joxean Koret (@joxean)!

πŸ“– tinyurl.com/pigaiosslides

2022-12-17

sometimes I want to edit #Microsoft #Word documents (binary files) but I also want to use #git's #diffing capabilities. Here's what I've patched together if it is helpful to anyone else: github.com/AFewBooks/fewbooks-

Most of the real work was done by Roman Casero (for #Gerardus), I've just customized to my liking and ironed out a few issues I experienced when setting it up myself.

#github #writers #writing

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst