Hacker News with Generative AI: Reverse Engineering

Binary Ninja 5.0 – Gallifrey released (binary.ninja)
Not enough time to reverse engineer everything you want? The Time Lords are here to help in Binary Ninja 5.0 Gallifrey! With major features across the board from huge analysis improvements, fantastic iOS support, many new firmware-specific features, and more, this major version has something for everyone.
Using the Linux kernel to help me crack an executable quickly (maowtm.org)
Truth be told, I've never been really good at CTFs, but I do enjoy solving challenges at my own pace, and exploring perhaps less conventional methods, learning more about programming in the process. A few weeks ago I found a reverse engineering problem which basically boiled down to running a Linux binary and entering the correct number to get it to print a flag.
Ghidra-delinker-extension is snowballing out of control (boricj.net)
As the lack of updates might suggest, I’ve taken a break from my Tenchu: Stealth Assassins reverse-engineering/decompilation project.
Low cost, high speed data acquisition over HDMI [video] (media.ccc.de)
Through a reverse-engineering effort it is possible to (ab)use a combination of cheap USB 3.2 HDMI video grabbers based on the Macrosilicon MS2130 in combination with small FPGA dev boards like the Sipeed Tang nano series (both ~10 USD each) to capture arbitrary data by connecting them via an HDMI cable. This can be used as a low cost, high speed logic analyzer, ADC capture, DIY SDR etc.
Show HN: I built a tool that deconstructs websites to reveal their tech stack (unbuilt.app)
Unbuilding the web, piece by pieceSee the exact technologies powering any web app
Getting the Firmware of a VTech/LeapFrog LeapStart/Magibook (prose.sh)
This is a very small blog post about my first reverse engineering project, in which I don't really reverse engineer anything yet, but I am just getting started!
Reverse engineering of the formula used to generate the "reciprocal tariffs" (twitter.com)
Something went wrong, but don’t fret — let’s give it another shot.
Brushing Up on Hardware Hacking – Reverse Engineering Electric Toothbrushes (voidstarsec.com)
Whether performing a training exercise with a large group or consulting clients with embedded security needs, there is one question that I constantly receive:
Practical Binary Analysis (practicalbinaryanalysis.com)
Identifying a defective RAM IC on laptops with soldered memory (piernov.org)
Warning: some information in this article is uncertain and based onto third-party reverse engineering efforts. Official documentation from the memory controller manufacturer is required, however Intel does not make it public. This only shows the idea to narrow down the fault. Additionally, other factors such as a PCB or CPU fault could be the cause and not the RAM ICs themselves (e.g. common failure on MacBook Air 13" 2011 with board number 820-3023).
Show HN: GhydraMCP – Agentic reverse engineering across multiple binaries (github.com/teal-bauer)
GhydraMCP is a bridge between Ghidra and AI assistants that enables AI-assisted reverse engineering through the Model Context Protocol (MCP).
GhidraMCP: Now AI can reverse malware [video] (youtube.com)
MCP server for Ghidra (github.com/LaurieWired)
ghidraMCP is an Model Context Protocol server for allowing LLMs to autonomously reverse engineer applications. It exposes numerous tools from core Ghidra functionality to MCP clients.
Reversing C++ Virtual Functions (alschwalm.com)
There are a few posts in various parts of the internet discussing reverse engineering C++, and these often address virtual functions to a large or small extent. However, I wanted to take some time to write about dealing with virtual functions in large, ‘enterprisy’ code-bases.
Reviving the modprobe_path Technique: Overcoming search_binary_handler() Patch (theori.io)
This blog post introduces a new method for utilizing the Overwriting modprobe_path technique. Since this patch was merged last year, it is no longer possible to trigger modprobe_path in the Upstream kernel by executing dummy files.
Shenmue (1999) reverse engineering reveals possible sun position oversight (wulinshu.com)
So far, we’ve only really touched on some of the fundamentals of reverse engineering with one game example, but this time we’re looking at something a bit different.
Breaking AES encrypted firmware using neural networks (fromnothing.blog)
Firmware encryption is becoming a common feature in modern devices. From a security standpoint, that’s welcome news. However, for anyone reverse engineering or testing device security, dumping firmware is often one of the first tasks — and encryption makes that task extremely challenging, if not impossible. So, why are we seeing more encryption? There are several reasons.
Reversing Samsung's H-Arx Hypervisor Framework (Part 1) (dayzerosec.com)
In many ways, mobile devices lead the security industry when it comes to defense-in-depth and mitigation.
Building an open-source Wi-Fi Mac layer for the ESP32 (esp32-open-mac.be)
The ESP32 is a low-cost microcontroller with Wi-Fi connectivity. Currently, the Wi-Fi MAC layer of the ESP32 is closed-source. This project aims to change that: by reverse engineering the hardware registers and software, we can build a networking stack that is open-source up to the hardware, instead of having to use the proprietary MAC layer.
Sc2kfix – Reverse Engineering, Bugfixing, and Modding SimCity 2000 (sc2kfix.net)
sc2kfix is a project reverse engineering SimCity 2000 Special Edition for Windows and developing a bugfix and modding plugin to patch core game and compatibility bugs as well as enabling the development of new quality of life and gameplay features.
GoStringUngarbler: Deobfuscating Strings in Garbled Binaries (cloud.google.com)
In our day-to-day work, the FLARE team often encounters malware written in Go that is protected using garble. While recent advancements in Go analysis from tools like IDA Pro have simplified the analysis process, garble presents a set of unique challenges, including stripped binaries, function name mangling, and encrypted strings.
XenonRecomp: Tool for recompiling Xbox 360 games to native executables (github.com/hedge-dev)
Windows NT for GameCube/Wii (github.com/Wack0)
PowerPC Windows NT ported to Nintendo GameCube/Wii/Wii U
Reverse Engineering PowerPoint's XML to Build a Slide Generator (framer.website)
Making PowerPoint presentations is much harder than it seems. While there are several LLM-powered slide generators out there, none of them produce truly satisfying results.
Spice86 – A PC emulator for real mode reverse engineering (github.com/OpenRakis)
Spice86 is a tool to execute, reverse engineer and rewrite real mode DOS programs for which source code is not available.
Reverse Engineering PowerPoint's XML to Build a Slide Generator (listenlabs.ai)
Making PowerPoint presentations is much harder than it seems. While there are several LLM-powered slide generators out there, none of them produce truly satisfying results.
A reverse engineering of Linear's sync engine (github.com/wzhudev)
A reverse engineering of Linear's sync engine.
TSforge: Reverse Engineering the Windows Software Protection Platform (massgrave.dev)
2025 marks nearly 20 years since the introduction of Windows' current DRM system, the Software Protection Platform (SPP). With it serving as the primary gateway to activation since early in Windows Vista's development, many have come up with clever ways of tricking it, from resetting grace period timers to emulating KMS servers to hooking bootloaders. While all of these systems abuse various activation methods, there has never been an exploit that directly attacked SPP itself... until now.
Mellanox ConnectX-5: iRISC reverse engineering (irisc-research-syndicate.github.io)
NVIDIA/Mellanox has made a series of smart network interface cards(SmartNICs/NICs) called ConnectX primarily for server and datacenter uses. In this series of articles we will take a look at its firmware, and try to reverse engineer the instruction set for the iRISC processor.
Ghidra 11.3 has been released (github.com/NationalSecurityAgency)