#reverseengineering

#Atari2600 game, Raiders of the Lost Ark source code completely disassembled and reverse engineered Every line fully commented #retrodev #retrogaming #atari #reverseengineering #assembler #programming #romhacking

From the retrogamedev communit...

HP van Braamhp@tmm.cx
2026-02-08

You know you're about to have a very bad time when...

#retrocomputing #reverseengineering

21555 Non-Transparent PCI-to-PCI Bridge
User Manual
2026-02-08

Today's Tutorial [February 8, 2026]

Lesson 104: ARM-32 Course 2 (Part 39 – Debugging Pre-Increment Operator)

This tutorial will discuss debugging pre-increment operator.

#Embedded #ReverseEngineering

github.com/mytechnotalent/Reve

mattst88 :gentoo:mattst88@fosstodon.org
2026-02-07

After a ton of work, I've finally gotten over my perfectionism and made github.com/mattst88/ip32prom-d public.

It decompiles the PROM firmware for the Silicon Graphics O2 (IP32) and reassembles it into a bit-identical image.

Even if that doesn't sound interesting to you, the README and reverse-engineering document should make for a fun read.

#sgi #reverseEngineering

jiska 🦄:fairydust:jiska@chaos.social
2026-02-07

In this video, I'm analyzing a really confusing dialog on macOS. Let's dig a bit deeper into what it should do and what it's actually doing. #reverseengineering

youtu.be/P7hYg2GpsTk

Private window picker warning that has an allow option that does nothing.
2026-02-07

Today's Tutorial [February 7, 2026]

Lesson 103: ARM-32 Course 2 (Part 38 – Pre-Increment Operator)

This tutorial will discuss the pre-increment operator.

#Embedded #ReverseEngineering

github.com/mytechnotalent/Reve

2026-02-06

Hello! It has been a little while, but #nakeddiefriday is back in town.

Today's exhibit is an old PIC1650A. Yes, one of *the* PIC series of microcontrollers. Note it was designed by General Instrument in 1980. It was fabbed in a single metal layer, metal-gate NMOS process. The image is about 4.3x3.8 mm.

No full-res link as SP is still borked.

#electronics #reverseengineering #icre

Die overview shot
2026-02-05
:radare2: radare :verified:radareorg@infosec.exchange
2026-02-05

r2agent is a tool to automate radare2 workflows through autonomous agents. #reverseengineering #ai github.com/nitanmarcel/r2agent

2026-02-05

Today's Tutorial [February 5, 2026]

Lesson 101: ARM-32 Course 2 (Part 36 – Debugging SizeOf Operator)

This tutorial will discuss debugging sizeof operator.

#Embedded #ReverseEngineering

github.com/mytechnotalent/Reve

Stephen Blumstephenblum
2026-02-05

AI can explain disassembly, but security still depends on good design.

Embedded Podcastembedded@mstdn.social
2026-02-04

🔐 Episode 519: Password Is All Zeros

In this episode, Elecia and Chris joined by Mark O. and James Rowley to explore:
- The fascinating world of safecracking
- How the lock industry often operates in isolation from broader security practices
- The ethics of doing a bad job when building systems meant to protect lives and property

🎧 Listen now on your favorite podcast app
📖 Read the transcript: embedded.com/transcripts/519

#security #engineering. #embedded #reverseengineering #cybersecurity

Parrot Securityparrotsec
2026-02-04

If you like understanding what binaries really do 👀

@rizin v0.8.2 has been released, an open-source reverse engineering framework for analyzing binaries, understanding machine code, and debugging programs 🔎

Available now on Parrot 7 🦜

Find out more here rizin.re/ 🔗

rizin v0.8.2 available on parrot os
2026-02-04

Today's Tutorial [February 4, 2026]

Lesson 100: ARM-32 Course 2 (Part 35 – SizeOf Operator)

This tutorial will discuss the sizeof operator.

#Embedded #ReverseEngineering

github.com/mytechnotalent/Reve

2026-02-04

Patching ELFs with ~Assembly~ C, or abusing the linker for fun and profit

sivaplaysmc.github.io/posts/pa

#cybersecurity #reverseengineering

Dan Stowelldanstowell
2026-02-03

Really nice talk with ALL the detail about how to reverse-engineer the actual circuit layout of a classic 1990s synthesiser:
youtube.com/watch?v=XM_q5T7wTpQ

2026-02-03

Today's Tutorial [February 3, 2026]

Lesson 99: ARM-32 Course 2 (Part 34 – Hacking Double Variables)

This tutorial will discuss hacking double variables.

#Embedded #ReverseEngineering

github.com/mytechnotalent/Reve

Matteo Bilotta :fediverso:byloth@mastodon.uno
2026-02-03

«Ma che cosa è cambiato da allora?»
«Perché nessuno realizza più progetti così fighi?»

... ci siamo chiesti, io e questo mio amico...

---

Beh...
Sicuramente è cambiata l'industria: ora si spinge - molto di più - sui #FreeToPlay con le #MicroTransazioni.
Perché qualcuno dovrebbe investire il proprio tempo per fare #ReverseEngineering di qualcosa che è già gratuito, per definizione?

Eppure - già all'epoca - alcuni di questi titoli erano già free-to-play: vedi, ad esempio, #Metin2.

Quindi? 🤔

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst