| netspooky/pdiff2 //  A revised version of the pdiff tool  | |
![]()  | Protocol RE Talk //  Slides, notes, and resources from a talk I did on Protocol RE  | 
| scare - Simple Configurable Assembly REPL and Emulator //  A multi-arch assembly REPL and emulator for your command line.  | |
![]()  | list_protos.sh //  List all the protocols in a given pcap using tshark  | 
![]()  | The PCAP File Format //  Descriptions of PCAP and PCAPNG files  | 
![]()  | BGGP3: LEMONADE.BIN //  BGGP3 entry that DOSes Rizin and Radare2 with SOPHIE lyrics.  | 
![]()  | RE Tips: Common String Representations //  How strings look in binary form  | 
| netspooky/importsort //  A python tool to group imports from multiple Windows Binaries.  | |
![]()  | RE Tips: Timestamps //  Identifying timestamps in unknown protocols and binary formats  | 
![]()  | Encoding Mutations: A Base64 Case Study //  Writeup about (ab)using base64 implementations  | 
![]()  | Python 3.7+ .pyc file format //  Notes on the .pyc format  | 
| netspooky/pdiff //  A revised version of the pdiff tool  | |
![]()  | Intro to Firmware Analysis (PancakesCon2020) //  Notes from my talk about analyzing firmware at PancakesCon 2020.  | 
| netspooky/inhale //  A malware static analysis and classification tool.  | 
Reverse Engineering
[: :]


