sfba.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A Mastodon instance for the San Francisco Bay Area. Come on in and join us!

Server stats:

2.3K
active users

#reversing

21 posts7 participants16 posts today
Lobsters<p>Attacking My Landlord's Boiler <a href="https://lobste.rs/s/18ycoz" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lobste.rs/s/18ycoz</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/hardware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hardware</span></a> <a href="https://mastodon.social/tags/reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reversing</span></a><br><a href="https://blog.videah.net/attacking-my-landlords-boiler/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.videah.net/attacking-my-l</span><span class="invisible">andlords-boiler/</span></a></p>
Lobsters<p>Reverse engineering the obfuscated TikTok VM <a href="https://lobste.rs/s/66gzvi" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lobste.rs/s/66gzvi</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reversing</span></a><br><a href="https://github.com/LukasOgunfeitimi/TikTok-ReverseEngineering" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/LukasOgunfeitimi/Ti</span><span class="invisible">kTok-ReverseEngineering</span></a></p>
Alexandre Borges<p>DEFCON 33 CTF Write-Up Series #1: jxl4fun2 (pwn):</p><p><a href="https://blog.cykor.kr/2025/04/DEFCON-33-Series-jxl4fun-pwn" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.cykor.kr/2025/04/DEFCON-3</span><span class="invisible">3-Series-jxl4fun-pwn</span></a></p><p>DEFCON 33 CTF Write-Up Series #2: tinii (rev):</p><p><a href="https://blog.cykor.kr/2025/04/DEFCON-33-Series-tinii" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.cykor.kr/2025/04/DEFCON-3</span><span class="invisible">3-Series-tinii</span></a></p><p><a href="https://infosec.exchange/tags/ctf" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ctf</span></a> <a href="https://infosec.exchange/tags/defcon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>defcon</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reversing</span></a></p>
Lobsters<p>Bootstrapping Understanding: An Introduction to Reverse Engineering <a href="https://lobste.rs/s/qveq0g" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lobste.rs/s/qveq0g</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/games" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>games</span></a> <a href="https://mastodon.social/tags/programming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>programming</span></a> <a href="https://mastodon.social/tags/reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reversing</span></a><br><a href="https://www.muppetlabs.com/~breadbox/txt/bure.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">muppetlabs.com/~breadbox/txt/b</span><span class="invisible">ure.html</span></a></p>
Python Weekly 🐍<p>"Verified" "Compilation" of "Python" with Knuckledragger, GCC, and Ghidra</p><p><a href="https://www.philipzucker.com/knuckle_C_pcode/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">philipzucker.com/knuckle_C_pco</span><span class="invisible">de/</span></a></p><p>Discussions: <a href="https://discu.eu/q/https://www.philipzucker.com/knuckle_C_pcode/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">discu.eu/q/https://www.philipz</span><span class="invisible">ucker.com/knuckle_C_pcode/</span></a></p><p><a href="https://mastodon.social/tags/assembly" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>assembly</span></a> <a href="https://mastodon.social/tags/compilers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>compilers</span></a> <a href="https://mastodon.social/tags/compsci" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>compsci</span></a> <a href="https://mastodon.social/tags/formalmethods" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>formalmethods</span></a> <a href="https://mastodon.social/tags/programming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>programming</span></a> <a href="https://mastodon.social/tags/python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>python</span></a> <a href="https://mastodon.social/tags/reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reversing</span></a></p>
Lobsters<p>"Verified" "Compilation" of "Python" with Knuckledragger, GCC, and Ghidra by <span class="h-card" translate="no"><a href="https://types.pl/@sandmouth" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>sandmouth</span></a></span> <a href="https://lobste.rs/s/b9kbg3" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lobste.rs/s/b9kbg3</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/assembly" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>assembly</span></a> <a href="https://mastodon.social/tags/compilers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>compilers</span></a> <a href="https://mastodon.social/tags/formalmethods" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>formalmethods</span></a> <a href="https://mastodon.social/tags/python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>python</span></a> <a href="https://mastodon.social/tags/reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reversing</span></a><br><a href="https://www.philipzucker.com/knuckle_C_pcode/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">philipzucker.com/knuckle_C_pco</span><span class="invisible">de/</span></a></p>
Lobsters<p>Emulating an iPhone in QEMU <a href="https://lobste.rs/s/sqqegd" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lobste.rs/s/sqqegd</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/ios" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ios</span></a> <a href="https://mastodon.social/tags/reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reversing</span></a><br><a href="https://eshard.com/posts/emulating-ios-14-with-qemu" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">eshard.com/posts/emulating-ios</span><span class="invisible">-14-with-qemu</span></a></p>
Volexity :verified:<p>In the course of its investigations, <span class="h-card" translate="no"><a href="https://infosec.exchange/@volexity" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>volexity</span></a></span> frequently encounters malware samples written in Golang. This reflects the increase in popularity of the Golang generally, and presents challenges to reverse engineering tools.<br>&nbsp;<br>Today, <span class="h-card" translate="no"><a href="https://infosec.exchange/@volexity" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>volexity</span></a></span> is releasing GoResolver, open-source tooling to help reverse engineers understand obfuscated samples. <span class="h-card" translate="no"><a href="https://infosec.exchange/@r00tbsd" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>r00tbsd</span></a></span> &amp; Killian Raimbaud presented details at INCYBER Forum earlier today.<br>&nbsp;<br>GoResolver uses control-flow graph similarity to identify library code in obfuscated code, leaving analysts with only malware functions to analyze. This saves time &amp; speeds up investigations!<br>&nbsp;<br>Check out the blog post on how GoResolver works and where to download it: <a href="https://www.volexity.com/blog/2025/04/01/goresolver-using-control-flow-graph-similarity-to-deobfuscate-golang-binaries-automatically/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">volexity.com/blog/2025/04/01/g</span><span class="invisible">oresolver-using-control-flow-graph-similarity-to-deobfuscate-golang-binaries-automatically/</span></a><br>&nbsp;<br><a href="https://infosec.exchange/tags/dfir" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dfir</span></a> <a href="https://infosec.exchange/tags/reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reversing</span></a> <a href="https://infosec.exchange/tags/malwareanalysis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malwareanalysis</span></a></p>
Lobsters<p>Notes on the Pentium's microcode circuitry <a href="https://lobste.rs/s/jzxmrc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lobste.rs/s/jzxmrc</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/hardware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hardware</span></a> <a href="https://mastodon.social/tags/historical" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>historical</span></a> <a href="https://mastodon.social/tags/reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reversing</span></a><br><a href="http://www.righto.com/2025/03/pentium-microcde-rom-circuitry.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">http://www.</span><span class="ellipsis">righto.com/2025/03/pentium-mic</span><span class="invisible">rocde-rom-circuitry.html</span></a></p>
Lobsters<p>The Colonel’s Bequest – Case Cracked <a href="https://lobste.rs/s/zpnypl" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lobste.rs/s/zpnypl</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reversing</span></a><br><a href="https://www.benshoof.org/blog/case-cracked" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">benshoof.org/blog/case-cracked</span><span class="invisible"></span></a></p>
Christoffer S.<p>(cyfirma.com) Konni RAT Analysis: Multi-Stage Attack Process and Evasion Techniques <a href="https://www.cyfirma.com/research/analysis-of-konni-rat-stealth-persistence-and-anti-analysis-techniques/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cyfirma.com/research/analysis-</span><span class="invisible">of-konni-rat-stealth-persistence-and-anti-analysis-techniques/</span></a></p><p>Executive Summary:<br>This report provides a comprehensive analysis of Konni RAT, a sophisticated remote access Trojan linked to North Korean cyber espionage group APT37. The malware employs a multi-stage attack process involving batch files, PowerShell scripts, and VBScript to exfiltrate sensitive data and maintain persistence. The attack begins with a zip archive containing a malicious LNK file disguised as a document. The malware exploits Windows Explorer limitations to hide malicious commands and uses obfuscation techniques to evade detection. Key capabilities include data exfiltration from user directories, system information gathering, persistence through registry modifications, and communication with command-and-control servers. The report includes detailed technical analysis of the attack stages, from initial infection to data exfiltration, along with indicators of compromise and YARA detection rules.</p><p><a href="https://swecyb.com/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://swecyb.com/tags/NorthKorea" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NorthKorea</span></a> <a href="https://swecyb.com/tags/APT37" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>APT37</span></a> <a href="https://swecyb.com/tags/MalwareAnalysis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MalwareAnalysis</span></a> <a href="https://swecyb.com/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntel</span></a> <a href="https://swecyb.com/tags/Malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Malware</span></a> <a href="https://swecyb.com/tags/Reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Reversing</span></a></p>
Lenin alevski 🕵️💻<p>New Open-Source Tool Spotlight 🚨🚨🚨</p><p>FLARE's FLOSS is a tool that extracts strings from malware, even if they're obfuscated. Unlike standard tools, FLOSS uses emulation and decoding techniques to identify hidden strings, making it invaluable for reverse engineers. It bridges gaps where simple static analysis falls short. <a href="https://infosec.exchange/tags/malwareanalysis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malwareanalysis</span></a> <a href="https://infosec.exchange/tags/reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reversing</span></a></p><p>🔗 Project link on <a href="https://infosec.exchange/tags/GitHub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitHub</span></a> 👉 <a href="https://github.com/fireeye/flare-floss" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/fireeye/flare-floss</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Software" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Software</span></a> <a href="https://infosec.exchange/tags/Technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Technology</span></a> <a href="https://infosec.exchange/tags/News" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>News</span></a> <a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CTF</span></a> <a href="https://infosec.exchange/tags/Cybersecuritycareer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecuritycareer</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/purpleteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>purpleteam</span></a> <a href="https://infosec.exchange/tags/tips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tips</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudsecurity</span></a></p><p>— ✨<br>🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️</p>
Lobsters<p>tmp.0ut Volume 4 <a href="https://lobste.rs/s/1ridxo" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lobste.rs/s/1ridxo</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reversing</span></a><br><a href="HTTP://Tmpout.sh/4" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible"></span><span class="">HTTP://Tmpout.sh/4</span><span class="invisible"></span></a></p>
Lobsters<p>Introducing GREASE: An Open-Source Tool for Uncovering Hidden Vulnerabilities in Binary Code <a href="https://lobste.rs/s/qykkq8" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lobste.rs/s/qykkq8</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/formalmethods" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>formalmethods</span></a> <a href="https://mastodon.social/tags/release" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>release</span></a> <a href="https://mastodon.social/tags/reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reversing</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a><br><a href="https://www.galois.com/articles/introducing-grease" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">galois.com/articles/introducin</span><span class="invisible">g-grease</span></a></p>
Lobsters<p>Full-stack Reverse Engineering of the Original Microsoft Xbox <a href="https://lobste.rs/s/l4fcpb" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lobste.rs/s/l4fcpb</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/video" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>video</span></a> <a href="https://mastodon.social/tags/hardware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hardware</span></a> <a href="https://mastodon.social/tags/retrocomputing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>retrocomputing</span></a> <a href="https://mastodon.social/tags/reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reversing</span></a><br><a href="https://www.youtube.com/watch?v=hGlIkgmhZvc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">youtube.com/watch?v=hGlIkgmhZvc</span><span class="invisible"></span></a></p>
Lobsters<p>Extracting content from an LCP "protected" ePub <a href="https://lobste.rs/s/1htmqf" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lobste.rs/s/1htmqf</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reversing</span></a><br><a href="https://shkspr.mobi/blog/2025/03/towards-extracting-content-from-an-lcp-protected-epub/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">shkspr.mobi/blog/2025/03/towar</span><span class="invisible">ds-extracting-content-from-an-lcp-protected-epub/</span></a></p>
Lobsters<p>A 6502 emulator written in busybox ash via <span class="h-card" translate="no"><a href="https://freeradical.zone/@craftyguy" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>craftyguy</span></a></span> <a href="https://lobste.rs/s/hi8hjp" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lobste.rs/s/hi8hjp</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reversing</span></a><br><a href="https://social.treehouse.systems/@cas/114171610700263367" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">social.treehouse.systems/@cas/</span><span class="invisible">114171610700263367</span></a></p>
Lobsters<p>A long evening with iOS and macOS Sandbox (2018) via <span class="h-card" translate="no"><a href="https://rheinneckar.social/@niklaskorz" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>niklaskorz</span></a></span> <a href="https://lobste.rs/s/z3ifdc" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lobste.rs/s/z3ifdc</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/ios" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ios</span></a> <a href="https://mastodon.social/tags/mac" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mac</span></a> <a href="https://mastodon.social/tags/reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reversing</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a><br><a href="https://web.archive.org/web/20220313072719/https://geosn0w.github.io/A-Long-Evening-With-macOS's-Sandbox/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">web.archive.org/web/2022031307</span><span class="invisible">2719/https://geosn0w.github.io/A-Long-Evening-With-macOS's-Sandbox/</span></a></p>
Lobsters<p>Zen and the Art of Microcode Hacking <a href="https://lobste.rs/s/qnfuus" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lobste.rs/s/qnfuus</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reversing</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a><br><a href="https://bughunters.google.com/blog/5424842357473280/zen-and-the-art-of-microcode-hacking" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bughunters.google.com/blog/542</span><span class="invisible">4842357473280/zen-and-the-art-of-microcode-hacking</span></a></p>
Lobsters<p>Hacking the Xbox 360 Hypervisor Part 1: System Overview <a href="https://lobste.rs/s/dperqz" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">lobste.rs/s/dperqz</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/reversing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>reversing</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://mastodon.social/tags/virtualization" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>virtualization</span></a><br><a href="https://icode4.coffee/?p=1047" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">icode4.coffee/?p=1047</span><span class="invisible"></span></a></p>