Hacker News with Generative AI: Reverse Engineering

Spice86 – A PC emulator for real mode reverse engineering (github.com/OpenRakis)
Spice86 is a tool to execute, reverse engineer and rewrite real mode DOS programs for which source code is not available.
Reverse Engineering PowerPoint's XML to Build a Slide Generator (listenlabs.ai)
Making PowerPoint presentations is much harder than it seems. While there are several LLM-powered slide generators out there, none of them produce truly satisfying results.
A reverse engineering of Linear's sync engine (github.com/wzhudev)
A reverse engineering of Linear's sync engine.
TSforge: Reverse Engineering the Windows Software Protection Platform (massgrave.dev)
2025 marks nearly 20 years since the introduction of Windows' current DRM system, the Software Protection Platform (SPP). With it serving as the primary gateway to activation since early in Windows Vista's development, many have come up with clever ways of tricking it, from resetting grace period timers to emulating KMS servers to hooking bootloaders. While all of these systems abuse various activation methods, there has never been an exploit that directly attacked SPP itself... until now.
Mellanox ConnectX-5: iRISC reverse engineering (irisc-research-syndicate.github.io)
NVIDIA/Mellanox has made a series of smart network interface cards(SmartNICs/NICs) called ConnectX primarily for server and datacenter uses. In this series of articles we will take a look at its firmware, and try to reverse engineer the instruction set for the iRISC processor.
Ghidra 11.3 has been released (github.com/NationalSecurityAgency)
Disassembling a binary: linear sweep and recursive traversal (nicolo.dev)
Building your own set of analysis tools is a great exercise for those who already have some basics and allows you to later move on to implement more targeted analyses in reverse engineering. Even just seeing how the different algorithms can be implemented provides a mental framework that may help when reverse engineering more difficult-to-analyse executable files, i.e. obfuscated ones.
Reverse Engineering Apple's typedstream Format (chrissardegna.com)
imessage-exporter’s goal is to provide the most comprehensive representation of iMessage data available. Message data is stored in a legacy format that appears to be a stream that represents objects.
Reverse-engineering and analysis of SanDisk High Endurance microSDXC card (2020) (ripitapart.com)
Decompiling 2024: A Year of Resurgance in Decompilation Research (mahaloz.re)
The year 2024 was a resurgant year for decompilation. Academic publications from that year made up nearly 30% of all top publications ever made in decompilation. In this post, I do a summarization and retrospective of both the academic and ideological progress of decompilation in 2024. Hint: decompilation research is back.
LoongArch64 Subjective Higlights (0x80.pl)
I get back to work on simdutf recently, and noticed that the library gained support for LoongArch64. This is a custom design and custom ISA by Loongson from China. They provide documentation for scalar ISA, but not for the vector extension. Despite that, GCC, binutils, QEMU and other tools already support the ISA. To our luck, Jiajie Chen did an impressive work of reverse engineering the vector stuff and published results online as The Unofficial LoongArch Intrinsics Guide.
Interesting BiCMOS circuits in the Pentium, reverse-engineered (righto.com)
Intel released the powerful Pentium processor in 1993, establishing a long-running brand of processors.
Reverse Engineering Bambu Connect (rossmanngroup.com)
Bambu Connect is an Electron App with Security through Obscurity principles, hence it is inherently insecure.
Bambu Connect's Authentication X.509 Certificate and Private Key Extracted (hackaday.com)
Hot on the heels of Bambu Lab’s announcement that it would be locking down all network access to its X1-series 3D printers with new firmware, the X.509 certificate and private key from the Bambu Connect application have now been extracted by [hWuxH].
Reverse-engineering a carry-lookahead adder in the Pentium (righto.com)
Addition is harder than you'd expect, at least for a computer.
Reverse Engineering a VanMoof E-Shifter – Part 2 – Decoding the Signals (mikecoats.com)
At the end of the last post, I left everyone hanging, having tapped into and sniffed some data being transferred on the wires between the bike and the e-shifter.
Disassembly of Pokémon Red/Blue (github.com/pret)
This is a disassembly of Pokémon Red and Blue.
Reverse Engineering the Constants in the Pentium FPU (righto.com)
Intel released the powerful Pentium processor in 1993, establishing a long-running brand of high-performance processors.1 The Pentium includes a floating-point unit that can rapidly compute functions such as sines, cosines, logarithms, and exponentials. But how does the Pentium compute these functions? Earlier Intel chips used binary algorithms called CORDIC, but the Pentium switched to polynomials to approximate these transcendental functions much faster. The polynomials have carefully-optimized coefficients that are stored in a special ROM inside the chip's floating-point unit.
Extracting AI models from mobile apps (altayakkus.substack.com)
If you are drinking the Kool-Aid, Artificial Intelligence is everywhere.
Remote code execution via MIDI messages (psi3.ru)
I gained remote code execution via MIDI messages to trick my synth into playing Bad Apple on its LCD. This blog post is about my journey with this reverse engineering project.
Ask HN: How are you using LLMs for traversing decompiler output? (ycombinator.com)
I need to reverse a binary made years ago, and I have zero experience with cpp, so I think it would be a good experiment to get an LLM to help me in any way
MitmProxy2Swagger: Automagically reverse-engineer REST APIs (github.com/alufers)
A tool for automatically converting mitmproxy captures to OpenAPI 3.0 specifications. This means that you can automatically reverse-engineer REST APIs by just running the apps and capturing the traffic.
Show HN: API Parrot – Automatically Reverse Engineer HTTP APIs (apiparrot.com)
API Parrot is the tool specifically designed to reverese engineer the HTTP APIs of any website. Making life easier for developers looking to automate, integrate or scrape websites without public APIs.
Beyond BLE: Cracking Open the Black-Box of RF Microcontrollers [video] (media.ccc.de)
Despite the recent popularity and breadth of offerings of low-cost RF microcontrollers, there is a shared absence of documentation for the internal workings of their RF hardware.
Proprietary silicon ICs and dubious marketing claims? Let's fight those [video] (media.ccc.de)
Custom silicon chips are black boxes that hold many secrets, like internal ROMs, security features and audio DSP algorithms. How does one start reverse engineer them? Let's look at the basics of silicon reverse engineering, what gate array chips are, and how some tooling can generate Verilog code automatically from a die shot.
Show HN: I reverse engineered X to Read Threads without Any Account as Articles (ycombinator.com)
I Reversed a Drone and Landed It with My PC (hardbreak.wiki)
In this example, we demonstrate how we reverse-engineered the communication between the Parrot Anafi consumer drone and its controller, which connect via Wi-Fi. The Parrot Anafi hosts its own Wi-Fi network, allowing either the controller or a phone running the Freeflight app to connect. Our goal was to understand the signals sent to the Anafi for initiating takeoff and landing sequences.
Liberating Wi-Fi on the ESP32 [video] (media.ccc.de)
Reverse engineering the Wi-Fi peripheral of the ESP32 to build an open source Wi-Fi stack.
Reverse Engineering the Duco Connectivity Board (github.com/kokx)
My newly built house came with a promising feature: a DucoBox Energy Comfort D325 ventilation system with heat recovery. While the system efficiently preheats incoming air using outgoing air’s heat, its control options were limited to four basic modes through a simple button interface. I wanted more - specifically, integration with Home Assistant. The official solution? A Duco Connectivity Board. But when I noticed it was just an ESP32 in disguise, I knew there had to be a better way.
Reverse Engineering the Stream Deck+ (den.dev)
Close to 4 years ago I talked about reverse engineering the Stream Deck to gain full control of the device and remove the dependence on the Stream Deck software. Well, I still really enjoy the hardware, but the software has gotten worse - it now goes as far as to requiring users for an account to download extensions.