d1aea4 () No. 9037154

a0c953a8366576....jpg (53 KB, 255 x 170, 828 : 552, EXQX_XvWkAIsfXG.jpg) (h)

This Java based program is developed by the NSA. It can be used for reverse engineering. You can use it to find weak spots. I hypothesize that you also can use it to reverse engineer AI systems and bots.

Messing with this will be fun. Perhaps think shitposting, perhaps machine learning shitposting.

Think machine learning redpilling. You anons can do this to accelerate the Great Awakening!

Furthermore use what you've previously learned on /pol/ (4chan). Think messing up AIs, think trolling. Have fun. Programmers on our side are useful. Perhaps reverse engineering algorithms of GOOG, FB and TWIT will help for bypassing it.

d0ea77 () No. 9037608

Open source, follow the money and ' permissions ' anons.

[ and for other purposes ]

H.R.6393 - Intelligence Authorization Act for Fiscal Year 2017

To authorize appropriations for fiscal year 2017 for intelligence and intelligence-related activities of the United States Government, the Community Management Account, and the Central Intelligence Agency Retirement and Disability System, and for other purposes.

section 706 is interdasting

provide a briefing on the role of the intelligence community in the event of a biological attack on the United States, including an assessment of the capabilities and gaps in technical capabilities that exist to address the potential circumstance of a novel unknown pathogen.

SEC. 707. Reports on declassification proposals.

[ DECLASS reports ] my, my my


1085d9 () No. 9037705


Check it out. Bytecode found. assembly functions in 8chan image


c19d62 () No. 9063050

Ghidra / SRE Resources

For those that might be interested and struggle with how to start, or can't find help.

Course and Resources

Reverse Engineering Tutorial: How to Reverse Engineer Any Software


Data Structures and Algorithms: Deep Dive Using Java


GitHub Ultimate: Master Git and GitHub - Beginner to Expert


The Complete Networking Fundamentals Course. Your CCNA start


Complete Python Bootcamp: Go from zero to hero in Python 3





Articles and Blogs

How to start out in reverse engineering?


How to Reverse Engineer Software


The Power of Reverse Engineering


83b54d () No. 9063430

13f1c5614a883f....png (106 KB, 255 x 178, 1186 : 826, insurance_file.png) (h)


So I downloaded the Wikileaks Inurance file and managed to upload it to Ghidra using the default decomplier.

It is a massive file, over 90GB

Here is the hash for torrent:


in case anyone else wants to jump in.

This thing is incredibly massive. Could the reason we were put on to Ghidra be to jump in the search through the code and see if we can uncover something? More manpower, so to speak? Just a thought.

e31749 () No. 9072017

yooo! hahah i LOVE GHIDRA been using it since NSA released it to the public on and off

I'd love to get back into it

I have a bit of professional hacking experience and a bit of assembly knowledge, I'd love to get back into it. I know that there are Shared Projects available, maybe qe could start 1?


e31749 () No. 9072059

although if you're trying to decrypt AES256 file,

you're going about it in the WRONG way haha qe'd need a quantum computer for that lol

IBM research has one still available in the cloud…

maybe if you know q-code JUST RIGHT…. haha nah who am i kidding they only lend out 5 qbits i think


Disclaimer: These posts and the subject matter and contents thereof - text, media, or otherwise - do not necessarily reflect the views of the administration.