We built a CTF challenge designed to be painful to reverse engineer. Then an AI agent solved it in 6 minutes.

Try it yourself before reading how 👉 https://ttd.eshard.com

Full write-up: https://www.eshard.com/blog/ring0-ring3-key-validator-time-travel-debugging
#CTF #reverseengineer #hacking

If you are in the mood of #multilingualism #programming I wrote a story about how #mobius would be put into practice in the real world...

The code is still private but you can #reverseengineer it with the hint: bruijn.

The story title: The invariant: https://hyper.dev/mobius/the-invariant/

#shortstory #english #français #español

EDIT: Add link

#scheme #lisp

The Invariant

Every method out there teaches Hebrew as if you already think in Hebrew.

I built mine meeting you where you actually are.

Because after decades of living and working professionally in both languages, I know exactly where English speakers hit the wall.

🇮🇱 Practically Speaking Hebrew > hebrewbyinbal.com/speak

#LearnHebrew #HebrewLanguage #SpeakHebrew #LanguageLearning #ReverseEngineer

Launch HN: Kampala (YC W26) – Reverse-Engineer Apps into APIs

https://www.zatanna.ai/kampala

#HackerNews #LaunchHN #Kampala #ReverseEngineer #APIs #YCombinator #TechNews

Zatanna — Turn software workflows into reliable APIs for AI agents

Zatanna maps human-only software workflows and exposes them as reliable APIs your AI agents and internal tools can call in production. No browser automation scripts to maintain.

Zatanna
If someone started an #automotive #nonprofit to provide #resources for techs and specialists like key codes, #continuingeducation (with a focus on electrical, programming/coding, embedded systems/networks, and all the stuff you NEED to know for new cars) case studies, #networking events, free classes/videos, #mentorship, would any #embeddedsystems or #car people be interested? Basically building a better #NASTF or one not dependent on dealerships, because they'd #reverseengineer that shit first
Massive thanks to @chrishuck for posting about the @FreeCAD Detessellate workbench... it's super super useful! Just used it to successfully #reverseengineer a deceptively complex seal design! (Everything tapers!)

This presentation remains the go-to reference for learning the inner workings of the IDA Pro Hex-Rays decompiler:

(video) https://www.youtube.com/watch?v=T-YkhNElvng

(article) https://i.blackhat.com/us-18/Thu-August-9/us-18-Guilfanov-Decompiler-Internals-Microcode-wp.pdf

#decompiler #reverseengineer #informationsecurity #cybersecurity

This presentation remains the go-to reference for learning the inner workings of the IDA Pro Hex-Rays decompiler:

(video) https://www.youtube.com/watch?v=T-YkhNElvng

(article) https://i.blackhat.com/us-18/Thu-August-9/us-18-Guilfanov-Decompiler-Internals-Microcode-wp.pdf

#decompiler #reverseengineer #informationsecurity #cybersecurity

w.social invite code

So regarding that new EU social network (which is said to be decentralized but unclear if that implies ActivityPub which would make it more relevant in my book); entering a string in the "invitation code" and clicking "continue" does not result in an XHR request to the server and there's a lot of JS on the page to handle the invitation code. This implies the code is checked in the browser so the correct code(s) is somewhere in the JavaScript. So it should be possible to reverse-engineer it, […]

https://blog.futtta.be/2026/01/22/w-social-invite-code/

👨‍💻 Want to work at Epieos?
Meet us at Hexacon 2025!

🛡️ Hexacon is a world-class event for enthusiasts of #OffensiveSecurity and #ReverseEngineering.

🤝 We’ll be there to meet exceptional talents, curious, rigorous, and driven by the desire to use their technical #skills, particularly in reverse engineering, to help us develop #OSINT 0days that protect and save human lives.

📍Hexacon in Paris, October 10–11.

📮 And if you can’t attend in person, feel free to send us your #CV for a #ReverseEngineer position or to learn more about our needs at: contact[at]epieos[dot]com.