Just curious, has anyone run their agentic analysis pipeline on Delphi malware yet?
Posts by
Ashley Paulsen just ran 100 miles at a 7:21 pace. Miles. 7 min 21 seconds per MILE.
www.irunfar.com/ashley-pauls...
Not the first paper to state this (also not yet peer reviewed), but, maybe the largest study I've seen so far linking inflammation to neurodegenerative diseases, here specifically Alzheimers
veritas.enc.edu/technology/a...
I stand by my opinion that the Go compiler just vomits half of github into every binary
Linux malware is boring, until you realize that your desktop is the only thing that runs Windows anymore www.theguardian.com/technology/2...
So, Rust binaries are awful? But have you seen C++???
Lol²
C'mon louder, say it LOUDER
What if AI just speeds all the processes up so much we all quit in burnout, and then it IS up to the machines whether we wanted that or not?
TIL you can copy paste emojis to the Ubuntu cmdline, and apparently Ubuntu doesn't accept burn this shit down as a command yet
Wait what, its Friday?? Holy shit
Hey wasn't it just January, how the hell is it April now??
A 64-bit MIPS Go backdoor 😍
Phrack call for papers is out! Check out the cool demoscene graphics at phrack.org
MIPS you guys, I'm in love!
Don't know who needs this or for what exactly but here is a MIPS ISA cheat sheet 🙃www.kth.se/social/files/563c63c9f27...
My condolences ❤️
@blackhoodie.bsky.social will be at #BSidesLuxembourg, on May 6th with a training on Linux memory forensics, brought to you by @allthingsliquid.bsky.social😍 Thank you to BSides Luxembourg and the Luxembourg House of Cyber for hosting us! Registration is now open blackhoodie.re/BSidesLuxemb...
I came across another simple no-name Linux espionage RAT by coincidence and starting to wonder what else we're missing in that space 👀
En route to Orlando 😱 #REverse2026 #Squeee
Another gem, here is all you ever wanted to know about Itanium C++ ABI exception handling and how its implemented in Linux C++ binaries maskray.me/blog/2020-12...
BlackHat US Call for Paper is open, and we're eagerly awaiting your submissions! I'm proud to be shepherding the Reverse Engineering track again this year and I'll be actively soliciting for cool research 😏😏😏
usa-briefings-cfp.blackhat.com
Randomly came across this downloader, which seems to want to download and built itself some kernel rootkit. The internet suggests this malware belongs to some relatively recent FnOS attack campaign on Feiniu private cloud. Tell me again Linux malware is boring.
My note taking pencil for the serious notes!
This is a phenomenal little blog post about Linux C++ binary analysis ❤️❤️❤️
oneraynyday.github.io/dev/2020/05/...
And I've got to look whether that has been visualization in a graph yet 🤓
Id need to look but I'm almost sure this has been done, I'm curious now though. It also has to be a hard problem since not all paths are deterministic statically. Anyhow, have you looked into symbolic execution? One can mathematically determine the flow of data through a program.
Interesting, pathfinder as in data flow analysis, as in depending on input code takes said path through a given function? My scripts are definitely not advanced enough, but I believe there is prior research in that direction, and additional I'd think that a higher level representation would help
Mini blog: I promised I'd publish the binary pewpew project I created with the help of Claude, and here we are, blog with link to Github. Works-on-my-machine type of project ;)
hackandcheese.com/posts/blog2_...