2021-12-25

GitHub - OpenRakis/Spice86: Reverse engineer and rewrite real mode DOS programs!

Spice86 is a powerful cross-platform tool for executing, reverse engineering, and rewriting real mode DOS programs without source code access. The tool employs a methodical approach using emulation, runtime data analysis, and gradual C# reimplementation through Ghidra integration. It supports various hardware emulation features including graphics, sound, and input devices while running on .NET 8.

Original archive.is archive.ph web.archive.org

Log in to get one-click access to archived versions of this article.

read comments on news aggregators:

Related articles

Tmux - the essentials

A practical guide explaining essential Tmux commands for managing terminal sessions, windows, and panes efficiently. The guide covers basic operations like creating sessions, detaching/reattaching, and managing window layouts, focusing on the most commonly used commands for daily productivity.

GitHub - dnakov/anon-kode: koding with any LLMs

A terminal-based AI coding assistant called anon-kode integrates with OpenAI-compatible APIs to enhance code development through features like code fixing, function explanation, and test execution. The tool is easily installable via npm and supports customizable model selection for various AI providers.

Speedrunners = vulnerability researchers

Video game speedrunners unknowingly develop advanced cybersecurity skills through glitch hunting, using professional tools like IDA Pro and Ghidra for reverse engineering. These enthusiasts create sophisticated exploits and technical documentation comparable to professional vulnerability researchers, yet often don't realize their skills could translate into cybersecurity careers.

Yes, Claude Code can decompile itself. Here's the source code.

An in-depth technical analysis reveals how AI language models can be used to decompile and reverse engineer source code, potentially undermining companies relying on restrictive licensing as a business model, with specific focus on deconstructing Claude Code's implementation.

GitHub - electronicarts/CnC_Red_Alert: Command and Conquer: Red Alert

Source code for Command & Conquer Red Alert has been released with Steam Workshop support, requiring specific legacy development tools and libraries for compilation. The code requires significant restoration effort and specific SDKs, with compilation requiring Watcom C/C++ and Borland Turbo Assembler.

GitHub - adenta/fire_red_agent

A developer shares their experience building an autonomous AI system to play Pokémon FireRed using LLMs, RetroArch emulation, and memory management techniques. The project faced challenges with emulator input control and battle handling, while successfully implementing navigation, text parsing, and conversation systems. The implementation demonstrates potential applications for AI-driven gaming content creation.

ForeverVM: The sessionless code interpreter

ForeverVM provides a secure sandbox environment for running Python code with persistent state through memory snapshots, eliminating session expiration limitations. The platform enables long-running applications and agents through a REPL interface, with seamless worker allocation and state management.

GitHub - deepseek-ai/awesome-deepseek-integration

A comprehensive directory of software tools and applications that integrate with DeepSeek API, including desktop assistants, browser extensions, IDE plugins, and development frameworks, enabling AI-powered features across various platforms.

What's New in Emacs 30.1?

Emacs 30.1 introduces significant improvements including a new completion preview mode, tree-sitter sexp command enhancements, and better touch screen support. The release also features native JSON improvements, buffer-local file watching, and automated org protocol registration.