Updated June 12, 2025
Recent Posts
------------
### Ghidra Is Best: Android Reverse Engineering
Jun 12, 2025
3 mins read
Ghidra Graph Theory Reverse Engineering
Ghidra is the best Android app RE tool. It just seems like itās not, because the loader has easily fixed quirks. Let me demonstrate.
Continue reading
* * *
### AyySSHush: Tradecraft of an Emergent ASUS Botnet
May 28, 2025
EXTERNAL LINK
Netsec Reverse Engineering
Using an AI powered network traffic analysis tool we built called SIFT, GreyNoise has caught multiple anomalous network payloads with zero-effort that are attempting to disable TrendMicro security features in ASUS routers, then exploit vulnerabilities and novel tradecraft in ASUS AiProtection features on those routers.
Continue reading
* * *
### You Want a VPN for Your Phone, Because Apps.
May 16, 2025
7 mins read
Ios Android Netsec
VPN: phone, not desktop. WiFi: N/A. These statements are correct. Or at least as correct as is applicable to the general user in the scope of the following contextual blog which generally recommends that:
Continue reading
* * *
### Graph Theory for Reverse Engineers
May 15, 2025
8 mins read
Graph Theory Reverse Engineering
Or āeverything actually is a nail, you just need a bigger hammerā Graph Theory is a really neat subject matter relating to the modeling of pairwise relations between objects. When you understand graph theory, everything steadily becomes a graph theory problem, because pretty much anything can be.
Continue reading
* * *
### Step One: How2 Z3
Apr 4, 2025
8 mins read
Z3 Reverse Engineering
This article is a long time coming. z3, the constraint solver, is commonly used in crackmes and CTF challenges. Wherever possible, I just lift to angr for symbolic execution and bruteforce that way, since z3 is basically math bruteforce anyways. Regardless:
Continue reading
* * *
### Talk: Bluetooth Low Energy Unmasked: High-Impact Insights From Scalable Device Hunting
Mar 27, 2025
1 min read
Conference Talk Districtcon Bluetooth
Remy shares his experience building custom hardware for a scalable Bluetooth Low Energy (BLE) survey, discussing problems encountered, and providing a replicable solution that the audience can implement for approximately $100 (no soldering required).
Continue reading
* * *
### Local, Private, AI Code Assistant
Mar 3, 2025
3 mins read
Ai Llm
Recently, products like Claude Code, Cursor, and Copilot have sprung to the forefront of my social media. Iāve ignored these for quite some time, but a coworker recommended that I try out after I was fighting a particularly gnarly public codebase that had opaque documentation and involved a LOT of state machines.
Continue reading
* * *
### Your LLMs Were Backdoored Years Ago.
Feb 4, 2025
3 mins read
Ai Llm
Plagiarism is an ethical violation. Always has been. As such: āA computer can never be held accountable, therefore a computer must never make a management decisionā.
Continue reading
* * *
### Binary Ninja IOS App Reversing
Jan 20, 2025
2 mins read
Reverse Engineering Binja Ios
Recently I ran into a headache of Out-Of-Memory errors when using Binary Ninja. Specifically, this was in relation to dissassembling a Mach-O aarch64 binary from an iOS app grabbed from decrypt.day.
Continue reading
* * *
### The Xiaohongshu å°ēŗ¢ä¹¦ REDnote å°ēŗ¢ä¹¦å½é
ē "Backdoor"
Jan 16, 2025
8 mins read
Reverse Engineering Ios Android Ghidra Binja
The popular social media app āTikTokā is likely facing an iminent ban in the United States in the coming days. This has resulted in a mass migration to the Chinese app å°ēŗ¢ä¹¦ (meaning ālittle red bookā), Xiaohongshu, or simply āREDnoteā.
Continue reading
* * *
#### See all