by Jen Costillo and Alvaro Prieto
Listen and learn about different reverse engineering hardware projects and methods as Alvaro (@alvaroprieto) and Jen(@rebelbotjen) talk with guests about their work.
Language
🇺🇲
Publishing Since
8/15/2017
Email Addresses
1 available
Phone Numbers
0 available
February 1, 2025
<p>Jen and Alvaro were guests on the Reverse Engineering Plus Plus Podcast.<br /> <br /> Check them out at <a href="https://repp.show/">REPP.show!</a></p>
December 7, 2024
Industry experts dive into inactivity reboot research, light field cameras, and hardware hacking, sharing insights and takeaways for reverse engineering enthusiasts.
September 7, 2024
<p dir="ltr" style= "line-height: 1.56; margin-top: 10pt; margin-bottom: 0pt;">Thomas Roth (aka <a style="text-decoration: none;" href= "https://stacksmashing.net/">Stacksmashing</a>) joined us again to chat about all the new projects he’s been working on. We talked about iPhone and Macbook reversing, <a style= "text-decoration: none;" href="http://hextree.io">HexTree.io</a>, the <a style="text-decoration: none;" href= "https://www.hextree.io/rp2350-hacking-challenge">RP2350 Hacking Challenge</a>, and more! </p> <p dir="ltr" style= "line-height: 1.56; margin-top: 10pt; margin-bottom: 0pt;">Here are links to some of the topics we covered:</p> <ul style= "margin-top: 0; margin-bottom: 0; padding-inline-start: 48px;"> <li><a style="text-decoration: none;" href= "https://www.youtube.com/watch?v=D8UGlvBubkA">Getting JTAG on the iPhone 15</a> (video)</li> <li><a style="text-decoration: none;" href= "https://t8012.dev/">https://t8012.dev/</a></li> <li><a style="text-decoration: none;" href= "https://www.youtube.com/watch?v=Y8MlsiMoLAQ">37C3 - Apple's iPhone 15: Under the C</a></li> <li><a style="text-decoration: none;" href= "https://kernel.googlesource.com/pub/scm/linux/kernel/git/maz/cs-hw/"> Marc Zyngier’s Central Scrutinizer </a></li> <li><a style="text-decoration: none;" href= "https://github.com/AsahiLinux/macvdmtool">Macvdmtool</a></li> <li><a style="text-decoration: none;" href= "https://asahilinux.org/">Asahi Linux</a></li> <li><a style="text-decoration: none;" href= "https://github.com/AsahiLinux/docs/wiki/HW%3AUSB-PD">AsahiLinux USB-PD Docs</a> </li> <li><a style="text-decoration: none;" href= "https://github.com/stacksmashing/tamarin-c">Tamarin-C iPhone/Mac bus explorer</a> </li> <li><a style="text-decoration: none;" href= "https://www.newae.com/products/nae-cw520">chipSHOUTER</a> and <a style="text-decoration: none;" href= "https://github.com/newaetech/chipshouter-picoemp">PicoEMP</a></li> <li><a style="text-decoration: none;" href= "https://www.youtube.com/watch?v=QlaJQEa3_zQ">ACE up the Sleeve: Hacking into Apple’s New USB-C Controller</a> </li> <li><a style="text-decoration: none;" href= "https://www.youtube.com/watch?v=wTl4vEednkQ">Breaking Bitlocker - Bypassing the Windows Disk Encryption</a></li> <li><a style="text-decoration: none;" href= "https://en.wikipedia.org/wiki/Cold_boot_attack">Cold Boot Attack</a></li> <li><a style="text-decoration: none;" href= "https://blog.rickmark.me/ace-controller-secrets/">T8012 Team Ace Controller Secrets</a></li> <li><a style="text-decoration: none;" href= "https://embeddedvillage.org/">Embedded Systems Village</a></li> <li><a style="text-decoration: none;" href= "https://1bitsquared.com/collections/embedded-hardware/products/faultier"> Faultier</a> at 1bitsquared US and <a style= "text-decoration: none;" href= "https://1bitsquared.de/products/faultier">EU</a> </li> <li><a style="text-decoration: none;" href= "https://en.wikipedia.org/wiki/Crowbar_(circuit)">Crowbar (circuit)</a></li> <li><a style="text-decoration: none;" href= "https://www.youtube.com/watch?v=fE2-zbqfOz4">Toorcamp 2024 Keynote Video</a></li> <li><a style="text-decoration: none;" href= "https://nostarch.com/hardwarehacking">The Hardware Hacking Handbook</a></li> <li><a style="text-decoration: none;" href= "https://black-magic.org/index.html">BlackMagic Probe</a></li> <li><a style="text-decoration: none;" href= "https://orbcode.org/">Orbcode</a></li> </ul> <p dir="ltr" style= "line-height: 1.56; margin-top: 10pt; margin-bottom: 0pt;">Have comments or suggestions for us? Find us on twitter <a style= "text-decoration: none;" href= "https://twitter.com/unnamed_show">@unnamed_show</a>, or email us at <a style="text-decoration: none;" href= "mailto:[email protected]">[email protected]</a>.</p> <p><strong id= "docs-internal-guid-f3b18ad4-7fff-f8fd-aeb9-01eb33e6ff1b" style= "font-weight: normal;">Music by <a style="text-decoration: none;" href="http://www.teknoaxe.com">TeknoAxe</a> (<a style= "text-decoration: none;" href= "http://www.youtube.com/user/teknoaxe">http://www.youtube.com/user/teknoaxe</a>)</strong></p>
Malicious Life
Logical Elegance
Hacked
The Amp Hour (Chris Gammell and David L Jones)
The Late Night Linux Family
The Late Night Linux Family
Jupiter Broadcasting
Patrick Gray
N2K Networks
Scott Hanselman
Real Python
Michael Kennedy
Graham Cluley & Carole Theriault
risky.biz
Pod Engine is not affiliated with, endorsed by, or officially connected with any of the podcasts displayed on this platform. We operate independently as a podcast discovery and analytics service.
All podcast artwork, thumbnails, and content displayed on this page are the property of their respective owners and are protected by applicable copyright laws. This includes, but is not limited to, podcast cover art, episode artwork, show descriptions, episode titles, transcripts, audio snippets, and any other content originating from the podcast creators or their licensors.
We display this content under fair use principles and/or implied license for the purpose of podcast discovery, information, and commentary. We make no claim of ownership over any podcast content, artwork, or related materials shown on this platform. All trademarks, service marks, and trade names are the property of their respective owners.
While we strive to ensure all content usage is properly authorized, if you are a rights holder and believe your content is being used inappropriately or without proper authorization, please contact us immediately at [email protected] for prompt review and appropriate action, which may include content removal or proper attribution.
By accessing and using this platform, you acknowledge and agree to respect all applicable copyright laws and intellectual property rights of content owners. Any unauthorized reproduction, distribution, or commercial use of the content displayed on this platform is strictly prohibited.