![]() | netspooky/pdiff2 // A revised version of the pdiff tool |
![]() | Protocol RE Talk // Slides, notes, and resources from a talk I did on Protocol RE |
![]() | scare - Simple Configurable Assembly REPL and Emulator // A multi-arch assembly REPL and emulator for your command line. |
![]() | list_protos.sh // List all the protocols in a given pcap using tshark |
![]() | The PCAP File Format // Descriptions of PCAP and PCAPNG files |
![]() | BGGP3: LEMONADE.BIN // BGGP3 entry that DOSes Rizin and Radare2 with SOPHIE lyrics. |
![]() | RE Tips: Common String Representations // How strings look in binary form |
![]() | netspooky/importsort // A python tool to group imports from multiple Windows Binaries. |
![]() | RE Tips: Timestamps // Identifying timestamps in unknown protocols and binary formats |
![]() | Encoding Mutations: A Base64 Case Study // Writeup about (ab)using base64 implementations |
![]() | Python 3.7+ .pyc file format // Notes on the .pyc format |
![]() | netspooky/pdiff // A revised version of the pdiff tool |
![]() | Intro to Firmware Analysis (PancakesCon2020) // Notes from my talk about analyzing firmware at PancakesCon 2020. |
![]() | netspooky/inhale // A malware static analysis and classification tool. |
Reverse Engineering
[: :]