netspooky/pdiff2 // A revised version of the pdiff tool | |
Protocol RE Talk // Slides, notes, and resources from a talk I did on Protocol RE | |
scare - Simple Configurable Assembly REPL and Emulator // A multi-arch assembly REPL and emulator for your command line. | |
list_protos.sh // List all the protocols in a given pcap using tshark | |
The PCAP File Format // Descriptions of PCAP and PCAPNG files | |
BGGP3: LEMONADE.BIN // BGGP3 entry that DOSes Rizin and Radare2 with SOPHIE lyrics. | |
RE Tips: Common String Representations // How strings look in binary form | |
netspooky/importsort // A python tool to group imports from multiple Windows Binaries. | |
RE Tips: Timestamps // Identifying timestamps in unknown protocols and binary formats | |
Encoding Mutations: A Base64 Case Study // Writeup about (ab)using base64 implementations | |
Python 3.7+ .pyc file format // Notes on the .pyc format | |
netspooky/pdiff // A revised version of the pdiff tool | |
Intro to Firmware Analysis (PancakesCon2020) // Notes from my talk about analyzing firmware at PancakesCon 2020. | |
netspooky/inhale // A malware static analysis and classification tool. |
Reverse Engineering
[: :]