Danny Quist's Avatar

Danny Quist

@dannyquist.bsky.social

Reverse engineer. Malware enthusiast.

46 Followers  |  48 Following  |  23 Posts  |  Joined: 25.09.2023  |  1.4429

Latest posts by dannyquist.bsky.social on Bluesky

It's best for everyone if you send us out of the room during movie hacking

03.07.2025 18:46 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Hacking in movies is awful though

03.07.2025 18:12 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Bob came in at about 20%, he’s now at 93%

26.04.2025 15:22 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Undergraduate Disproves 40-Year-Old Conjecture, Invents New Kind of Hash Table A young computer scientist and two colleagues show that searches within data structures called hash tables can be much faster than previously deemed possible.

"Every generation re-invents the hash table" something @troutgirl.bsky.social said, two hash-table-inventions ago www.wired.com/story/underg...

17.03.2025 19:42 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Ungarble: Deobfuscating Golang with Binary Ninja In this blog post we explore using Binary Ninja and emulation to address obfuscation implemented by an open source obfuscator named Garble that is used by red team operators and malware authors to inh...

Ungarble: Deobfuscation of Go's garbled binaries. Nice work @invokereversing.bsky.social invokere.com/posts/2025/0...

12.03.2025 00:00 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
GitHub - OpenRakis/Spice86: Reverse engineer and rewrite real mode DOS programs! Reverse engineer and rewrite real mode DOS programs! - GitHub - OpenRakis/Spice86: Reverse engineer and rewrite real mode DOS programs!

OpenRakis/Spice86 name checks out Β βœ… x86 emulation framework βœ… 16-bit only?!?!! It's another game hacking platform github.com/OpenRakis/Sp...

20.02.2025 17:12 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
AMD: Microcode Signature Verification Vulnerability ### Summary Google Security Team has identified a security vulnerability in some AMD Zen-based CPUs. This vulnerability allows an adversary with local administrator privileges (ring 0 from outside...

holy fucking shit
AMD: Microcode Signature Verification Vulnerability

github.com/google/secur...

04.02.2025 21:21 β€” πŸ‘ 78    πŸ” 14    πŸ’¬ 6    πŸ“Œ 1

CactusCon 13 is here in Mesa, Arizona. See you all there.

27.01.2025 17:24 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Reverse Engineering Call Of Duty Anti-Cheat I’ve been reversing Black Ops Cold War for a while now, and I’ve finally decided to share my research regarding the user-mode anti-cheat inside the game. It’s not my intention to shame or promote chea...

Two industries that are pretty much the same: Video game copyright protection software and malware ssno.cc/posts/revers...

22.01.2025 15:32 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
A Mole Infiltrated the Highest Ranks of American Militias. This Is What He Found. Outraged by the Jan. 6 Capitol riot, a wilderness survival trainer spent years undercover climbing the ranks of right-wing militias. He didn’t tell police or the FBI. He didn’t tell family or friends....

He penetrated the top ranks of prominent right-wing militias & devised elaborate ruses to gather evidence of ties to high-ranking law enforcement officials.

He was so successful, he became a militia’s top commander in Utah.

The latest must-read from @josh-kaplan.bsky.social @propublica.org

04.01.2025 11:02 β€” πŸ‘ 537    πŸ” 172    πŸ’¬ 12    πŸ“Œ 9
A dissection of a PDF file, showing the signature, objects tree, xref, trailer…

A dissection of a PDF file, showing the signature, objects tree, xref, trailer…

The poster is at github.com/corkami/pics/

04.01.2025 21:02 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

I meant it as a complement

31.12.2024 16:40 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Preview
Fearsome File Formats Presented at 38C3 in Hamburg on the 28th December 2024. Video recording: https://media.ccc.de/v/38c3-fearsome-file-formats With so many open-sou…

Fearsome File Formats by @angealbertini.bsky.social This is 99% about file formats, and 1% how to present file formats to an audience speakerdeck.com/ange/fearsom...

30.12.2024 16:45 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 1    πŸ“Œ 0
Commandments of a good file format: 

Magic at offset zero. Fast identification, no bypass

Up-to-date specs
Reflect reality

Clear chunk structure
forward compatibility, easy parsing/cleanup

Samples set
Theory isn't enough

Version number
Forward thinking

Extensibility
Your format will evolve in unknown ways

No duplicity
Duplicity -> discrepency (skull emoji)

Keep the spirit
Don't reuse formats for different intent without trivial distinction

No "constant" variables
Ossification -> hardcoding 

Perfect is the enemy of good
Shortcuts will be taken to avoid over-complexity

Commandments of a good file format: Magic at offset zero. Fast identification, no bypass Up-to-date specs Reflect reality Clear chunk structure forward compatibility, easy parsing/cleanup Samples set Theory isn't enough Version number Forward thinking Extensibility Your format will evolve in unknown ways No duplicity Duplicity -> discrepency (skull emoji) Keep the spirit Don't reuse formats for different intent without trivial distinction No "constant" variables Ossification -> hardcoding Perfect is the enemy of good Shortcuts will be taken to avoid over-complexity

In your forward engineering career if you ever have the chance to design a new file format, please listen to the advice from Ange Albertini's 2024 38C3 talk

30.12.2024 16:30 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
38c3: Hacking the RP2350 The RP2350 security architecture involves several interconnected mechanisms which together provide authentication of code running on the chip, protected one-time-programmable storage, fine-grained con...

Oh! @raspberrypi.com RP2350 gotcha detailed at CCC. Does he win the prize?? events.ccc.de/congress/202...

28.12.2024 18:08 β€” πŸ‘ 4    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
TWISTED: The dramatic history of twisted-pair Ethernet
YouTube video by The Serial Port TWISTED: The dramatic history of twisted-pair Ethernet

The real enemy is token ring. Truer words have never been said Taylor youtu.be/f8PP5IHsL8Y

28.12.2024 03:52 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Cognitive load is what matters There are so many buzzwords and best practices out there, but let's focus on something more fundamental. What matters is the amount of confusion developers feel when going through the code.

Cognitive load is what we fight with in reverse engineering too. Obfuscation is cognitive load

Reverse engineers try to find patterns to reduce load
Forward engineers try to reduce complexity

minds.md/zakirullin/c...

26.12.2024 17:52 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
ISO 8583: The language of credit cards β€” Increase Discover the inner workings of ISO 8583, the global standard for credit card transaction messaging. Learn how it powers payment processing across networks and explore its structure, fields, and real-w...

ISO-8583, you old boot. Credit card protocols, how do they work? I love articles that are basically a side-lesson in how to effectively visually communicate a boring protocol increase.com/articles/iso...

19.12.2024 16:30 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Post image 17.12.2024 16:15 β€” πŸ‘ 128    πŸ” 18    πŸ’¬ 2    πŸ“Œ 1
Preview
Evading EDR A guide to understanding the attack-detection software running on Microsoft systems, and how to evade it.

Evading EDR by @matterpreter.bsky.social is one of the best books ever published by NoStarch. If you enjoyed the original Rootkits book check this out nostarch.com/evading-edr

17.12.2024 16:22 β€” πŸ‘ 4    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0
Dwingeloo telescope receives signals from Voyager 1 – Dwingeloo Radio Telescope | CAMRAS

Excellence in radio
www.camras.nl/en/blog/2024...

12.12.2024 00:18 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Sean is damn right: C++ structs are tricky. Decompilers universally work better once you fill out structs and types.

02.12.2024 21:58 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
View of a Javelina trail descent, South Mountain, Phoenix Arizona

View of a Javelina trail descent, South Mountain, Phoenix Arizona

Trail ratings are good intentions, half truths, and lies

24.11.2024 21:28 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

It has been zero days since someone has had the idea to standardize malware names. This has all happened before and it will happen again

24.11.2024 03:27 β€” πŸ‘ 4    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Free tendon in every box!

22.11.2024 22:20 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
x.com

Love love love when people first find packers x.com/mhicroibin/s...

19.11.2024 17:30 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

Sure you can chew the air but the sunsets are nice

17.11.2024 03:31 β€” πŸ‘ 4    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Post image Post image

Every problem can be solved with reverse engineering.

26.09.2023 23:59 β€” πŸ‘ 3    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

@dannyquist is following 20 prominent accounts