netspooky/pdiff2 // A revised version of the pdiff tool |
|
Protocol RE Talk // Slides, notes, and resources from a talk I did on Protocol RE |
|
scare - Simple Configurable Assembly REPL and Emulator // A multi-arch assembly REPL and emulator for your command line. |
|
list_protos.sh // List all the protocols in a given pcap using tshark |
|
The PCAP File Format // Descriptions of PCAP and PCAPNG files |
|
BGGP3: LEMONADE.BIN // BGGP3 entry that DOSes Rizin and Radare2 with SOPHIE lyrics. |
|
RE Tips: Common String Representations // How strings look in binary form |
|
netspooky/importsort // A python tool to group imports from multiple Windows Binaries. |
|
RE Tips: Timestamps // Identifying timestamps in unknown protocols and binary formats |
|
Encoding Mutations: A Base64 Case Study // Writeup about (ab)using base64 implementations |
|
Python 3.7+ .pyc file format // Notes on the .pyc format |
|
netspooky/pdiff // A revised version of the pdiff tool |
|
Intro to Firmware Analysis (PancakesCon2020) // Notes from my talk about analyzing firmware at PancakesCon 2020. |
|
netspooky/inhale // A malware static analysis and classification tool. |
Reverse Engineering
[: :]