Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

bluedevil@infosec.exchangeB

bluedevil@infosec.exchange

@bluedevil@infosec.exchange
About
Posts
5
Topics
4
Shares
0
Groups
0
Followers
0
Following
0

View Original

Posts

Recent Best Controversial

  • Meanwhile #IDA Pro: "Oops!
    bluedevil@infosec.exchangeB bluedevil@infosec.exchange

    @buherator OMG, yes yes, why? Instead we get a ph** a** dump file. Arghh...

    Uncategorized ida idapro reverseengineer hexrays gdbserver

  • Meanwhile #IDA Pro: "Oops!
    bluedevil@infosec.exchangeB bluedevil@infosec.exchange

    Meanwhile #IDA Pro: "Oops! internal error 1783 occurred."

    #idapro #reverseengineering #hexrays #gdbserver #qemu

    Uncategorized ida idapro reverseengineer hexrays gdbserver

  • A very detailed tutorial from "Joaquin Pinillos"
    bluedevil@infosec.exchangeB bluedevil@infosec.exchange

    A very detailed tutorial from "Joaquin Pinillos"

    Walk x86-64 page tables by hand in qemu and gdb. Decompose a virtual address, follow cr3 through all levels of physical memory, and extract a flag from raw bytes.

    Link Preview Image
    GitHub - jazho76/page_table_walk: Walk x86-64 page tables by hand in qemu and gdb. Decompose a virtual address, follow cr3 through all levels of physical memory, and extract a flag from raw bytes.

    Walk x86-64 page tables by hand in qemu and gdb. Decompose a virtual address, follow cr3 through all levels of physical memory, and extract a flag from raw bytes. - jazho76/page_table_walk

    favicon

    GitHub (github.com)

    #reverseengineering #linux #ctf

    Uncategorized reverseengineer linux ctf

  • @0x0sojalsec shared a new repo: "Pre-built Jailbroken iOS 26 iPhone fully runs on VM✨
    bluedevil@infosec.exchangeB bluedevil@infosec.exchange

    @0x0sojalsec shared a new repo: "Pre-built Jailbroken iOS 26 iPhone fully runs on VM✨

    Full virtual iPhone ready-to-run jailbroken iPhone (rootless + Sileo + Filza + TrollStore vibes).

    Just download, Test tweaks, exploit PoCs, and debug without touching your daily driver.😗"

    Link Preview Image
    GitHub - 34306/vphone-aio: 1 script run the vphone

    1 script run the vphone. Contribute to 34306/vphone-aio development by creating an account on GitHub.

    favicon

    GitHub (github.com)

    #jailbreak #ios #ios26 #vphone #iphone

    Uncategorized jailbreak ios ios26 vphone iphone

  • @fr0gger shared a great article:
    bluedevil@infosec.exchangeB bluedevil@infosec.exchange

    @fr0gger shared a great article:

    Link Preview Image

    favicon

    X (formerly Twitter) (x.com)

    Don't forget: if you do not know the way (to solve, tinker, architect ...), llm's don't know either:

    From the article: "For obfuscation or packing, my system is designed to detect it and work around it. If the case is completely unknown or unsolvable, that is where human in the loop becomes valuable."

    #aihype #reverseengineering #llm #aislop #ai #reversing

    Uncategorized aihype reverseengineer llm aislop
  • Login

  • Login or register to search.
  • First post
    Last post
0
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups