Readit News logoReadit News
netsec_burn commented on Show HN: FlopperZiro – A DIY open-source Flipper Zero clone   github.com/lraton/Flopper... · Posted by u/iraton
boznz · 2 months ago
The LilyGo T-Embed CC1100 has similar hardware capabilities of the FlipperZero plus WiFi/bluetooth and runs the Bruce Pentest firmware all for under half the price of the flipper. The Bruce firmware works well on it but is not as polished as the flipper zero but both hardware and software are open source and easily modded.
netsec_burn · 2 months ago
Also the Kiisu which is 1:1 with capabilities, plus a few more.
netsec_burn commented on Ask HN: How are you using LLMs for traversing decompiler output?    · Posted by u/mjbale116
btown · 8 months ago
What kind of file should be uploaded?
netsec_burn · 8 months ago
The allowed types are a bit misleading. Any binary is accepted, any architecture. You can upload shared objects, ELF executables, PE binaries, etc.

I like to give it bomb executables (reverse engineering challenges) to test it.

netsec_burn commented on Ask HN: How are you using LLMs for traversing decompiler output?    · Posted by u/mjbale116
netsec_burn · 8 months ago
I made a site to use LLMs to help me with reverse engineering. The output is surprisingly readable, even with C++ classes. Let me know any feedback you might have: https://decompiler.zeroday.engineering/
netsec_burn commented on The 'Invisibility Cloak' – Slash-Proc Magic   dfir.ch/posts/slash-proc/... · Posted by u/lapnect
tetha · 10 months ago
Interesting. What are the legitimate use cases to not treat /proc as readonly, and what are legitimate use cases to mount around and especially bind-mount random filesystems around in /proc?

Like, my first impulse is "Why do we allow this?" And I guess, sure, the answer is "root is allowed to do this, because root is never not allowed". And sure I very much dislike my computer telling me "Nay I cannot do that", hence why I have no windows anymore at home.

But there is some stuff that seemingly doesn't have any legitimate use case on a server. And even if protections from that stuff keep me from fixing some situations, I can still nuke and rebuild it in an hour or so.

netsec_burn · 10 months ago
I can answer the writing to /proc one. It is sometimes useful to hotpatch running programs with /proc/pid/mem.
netsec_burn commented on CapibaraZero: A cheap alternative to FlipperZero based on ESP32-S3   capibarazero.github.io/do... · Posted by u/andreock
antirez · a year ago
Much more usable if this will target directly the LILYGO T3 and T3/S3. One would optionally add more hardware if needed to support the IR blaster, NFC and so forth, but the LoRa chip is already included.
netsec_burn · a year ago
Or the LilyGO T-Embed CC1101.
netsec_burn commented on OpenAI is good at unminifying code   glama.ai/blog/2024-08-29-... · Posted by u/punkpeye
VMG · a year ago
it is also pretty good at decompiling - try feeding it the output of https://godbolt.org/
netsec_burn · a year ago
I recently learned this too, just a few months ago. Ended up making a frontend so I could do it automatically: https://decompiler.zeroday.engineering/
netsec_burn commented on Magic Wormhole: get things from one computer to another, safely   github.com/magic-wormhole... · Posted by u/tosh
netsec_burn · a year ago
I've used wormhole once to move a 70 GB file. Couldn't possibly do that before. And yes, I know I used the bandwidth of the relay server, I donated to Debian immediately afterwards (they run the relay for the version in the apt package).
netsec_burn commented on MIFARE Classic: exposing the static encrypted nonce variant [pdf]   eprint.iacr.org/2024/1275... · Posted by u/dave_universetf
arjvik · a year ago
Can I use a flipper zero to perform these attacks?
netsec_burn · a year ago
Not yet, I'm writing it. Will be available by the end of the month, feel free to follow the PR: https://github.com/flipperdevices/flipperzero-firmware/pull/...

u/netsec_burn

KarmaCake day1159June 10, 2015View Original