<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.exploitee.rs/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Xenador77</id>
	<title>Exploitee.rs - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.exploitee.rs/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Xenador77"/>
	<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Special:Contributions/Xenador77"/>
	<updated>2026-04-30T19:37:12Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.45.0-alpha</generator>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Useful_Reverse_Engineering_Tools&amp;diff=3163</id>
		<title>Useful Reverse Engineering Tools</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Useful_Reverse_Engineering_Tools&amp;diff=3163"/>
		<updated>2025-03-26T07:31:57Z</updated>

		<summary type="html">&lt;p&gt;Xenador77: /* JTAGulator */  removed additional separator&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
&lt;br /&gt;
= Dissassembly &amp;amp; Decompilation Software =&lt;br /&gt;
&lt;br /&gt;
== IDA PRO ==&lt;br /&gt;
IDA Pro is a sophisticated commercial software application used for reverse engineering binary executables and analyzing software. Developed by Hex-Rays, IDA Pro is widely recognized as one of the most advanced and powerful tools in the field of reverse engineering. &lt;br /&gt;
&lt;br /&gt;
Key features of IDA Pro include:&lt;br /&gt;
&lt;br /&gt;
# &#039;&#039;&#039;Disassembly and Decompilation:&#039;&#039;&#039; IDA Pro provides comprehensive disassembly capabilities, allowing users to view and analyze assembly code instructions. Additionally, it offers a decompiler that generates higher-level pseudocode representations of the code, aiding in understanding complex binaries.&lt;br /&gt;
# &#039;&#039;&#039;Graphical User Interface (GUI):&#039;&#039;&#039; IDA Pro features a rich graphical interface that enables users to navigate, visualize, and interact with disassembled code, control flow graphs, data structures, and more.&lt;br /&gt;
# &#039;&#039;&#039;Advanced Analysis Tools:&#039;&#039;&#039; The tool includes a range of analysis features such as function recognition, code cross-references, call graphs, and data flow analysis.&lt;br /&gt;
# &#039;&#039;&#039;Extensibility and Scripting:&#039;&#039;&#039; IDA Pro supports scripting in various languages, allowing users to automate tasks, customize functionality, and create plugins to extend its capabilities.&lt;br /&gt;
# &#039;&#039;&#039;Binary Analysis and Security Research:&#039;&#039;&#039; IDA Pro is used extensively in the field of security research, helping analysts identify vulnerabilities, study malware, and analyze the security of software systems.&lt;br /&gt;
# &#039;&#039;&#039;Collaboration:&#039;&#039;&#039; IDA Pro&#039;s database format enables collaboration between analysts, allowing them to share their analysis and research on a specific binary.&lt;br /&gt;
# &#039;&#039;&#039;Multiple Platforms and Architectures:&#039;&#039;&#039; IDA Pro supports a wide range of platforms and architectures, making it suitable for analyzing binaries across different environments.&lt;br /&gt;
# &#039;&#039;&#039;Cost:&#039;&#039;&#039; IDA Pro is a commercial product and is available in several editions with varying feature sets. The cost of IDA Pro can range from several hundred to several thousand dollars per &amp;quot;seat&amp;quot; or user license. As of my last update in September 2021, the price for IDA Pro with all the decompilers (including Hex-Rays Decompiler) is roughly estimated to be around $2500 per seat.&lt;br /&gt;
&lt;br /&gt;
== Ghidra ==&lt;br /&gt;
Ghidra is a powerful open-source JAVA based software reverse engineering framework that was released by the United States National Security Agency (NSA) in March 2019.&lt;br /&gt;
&lt;br /&gt;
Key features of Ghidra include:&lt;br /&gt;
&lt;br /&gt;
# &#039;&#039;&#039;Disassembly and Decompilation:&#039;&#039;&#039; Ghidra can disassemble executable code into human-readable assembly language instructions and can also generate decompiled C code from binary executables. This helps analysts understand how the software functions at a higher level.&lt;br /&gt;
# &#039;&#039;&#039;Graphical User Interface (GUI):&#039;&#039;&#039; Ghidra features a user-friendly GUI that assists users in navigating and visualizing the disassembled code, control flow graphs, data structures, and more.&lt;br /&gt;
# &#039;&#039;&#039;Collaboration and Scripting:&#039;&#039;&#039; Ghidra allows users to write custom scripts and plugins in languages like Python to automate analysis tasks and customize the tool&#039;s functionality.&lt;br /&gt;
# &#039;&#039;&#039;Symbolic Analysis:&#039;&#039;&#039; Ghidra supports symbolic analysis, which aids in understanding program behavior by tracking values and relationships symbolically.&lt;br /&gt;
# &#039;&#039;&#039;Binary Analysis and Vulnerability Research:&#039;&#039;&#039; Security researchers can use Ghidra to identify vulnerabilities, analyze malware, and discover potential security weaknesses in software.&lt;br /&gt;
# &#039;&#039;&#039;Cross-Platform Compatibility:&#039;&#039;&#039; Ghidra is cross-platform, supporting Windows, macOS, and Linux, making it accessible to a wide range of users.&lt;br /&gt;
# &#039;&#039;&#039;Open Source and Community-Driven:&#039;&#039;&#039; One of Ghidra&#039;s standout features is that it is open-source software. This means that anyone can access, use, and contribute to its development. The open nature of the project encourages collaboration and innovation within the reverse engineering community.&lt;br /&gt;
# &#039;&#039;&#039;Cost:&#039;&#039;&#039; Ghidra is freely available for download and use, making it an accessible tool for individuals and organizations alike. The fact that it is open source contributes to its widespread adoption and popularity in the cybersecurity and reverse engineering fields.&lt;br /&gt;
&lt;br /&gt;
== Binary Ninja ==&lt;br /&gt;
Binary Ninja is a modern and user-friendly binary analysis platform used for reverse engineering and analyzing compiled code. Developed by Vector 35, Binary Ninja is often the preferred tool for CTF players and reverse engineers looking for a developer friendly python based API.&lt;br /&gt;
&lt;br /&gt;
Key features of Binary Ninja include:&lt;br /&gt;
&lt;br /&gt;
# &#039;&#039;&#039;Interactive Graphical Interface:&#039;&#039;&#039; Binary Ninja offers an interactive and visually appealing interface that simplifies the process of navigating and analyzing disassembled code. The platform uses a modern design to provide a clear representation of control flow graphs, functions, and data structures.&lt;br /&gt;
# &#039;&#039;&#039;Multi-Architecture and Multi-Platform Support:&#039;&#039;&#039; Binary Ninja supports various processor architectures and platforms, allowing users to analyze binaries from different environments and systems.&lt;br /&gt;
# &#039;&#039;&#039;Disassembly and Decompilation:&#039;&#039;&#039; The platform provides disassembly capabilities to view assembly code, and it also offers a decompiler to generate high-level pseudocode representations of the binary.&lt;br /&gt;
# &#039;&#039;&#039;Advanced Analysis Tools:&#039;&#039;&#039; Binary Ninja includes features such as function recognition, data cross-references, call graphs, data flow analysis, and more.&lt;br /&gt;
# &#039;&#039;&#039;Plugin Ecosystem:&#039;&#039;&#039; Binary Ninja supports a plugin architecture that allows users to extend its functionality through custom plugins written in Python.&lt;br /&gt;
# &#039;&#039;&#039;Collaboration and Sharing:&#039;&#039;&#039; The platform allows users to share analysis data and collaborate on projects by exporting and importing databases.&lt;br /&gt;
# &#039;&#039;&#039;Scripting and Automation:&#039;&#039;&#039; Users can write scripts in Python to automate repetitive tasks and customize analysis processes.&lt;br /&gt;
# &#039;&#039;&#039;Cost:&#039;&#039;&#039; Binary Ninja offers different editions with varying feature sets. As of my last update in September 2021, the cost of Binary Ninja&#039;s commercial licenses ranged from around $150 to $300 for the Personal edition, while the Business edition was priced at approximately $600. More advanced editions, such as the Enterprise edition, offer additional features and flexibility at a higher cost.&lt;br /&gt;
&lt;br /&gt;
== Our Recommendation ==&lt;br /&gt;
The cost of IDA Pro can be unobtainable for researchers on a budget therefore we recommend either using Ghidra as your sole disassembly tool or a combination of Ghidra and Binary Ninja for a low cost solution that will allow for a more expansive ability to audit binaries for vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
= Reversing Hardware =&lt;br /&gt;
&lt;br /&gt;
= Hardware Tools =&lt;br /&gt;
&lt;br /&gt;
== Tigard ==&lt;br /&gt;
&lt;br /&gt;
== Saleae Logic Analyzer ==&lt;br /&gt;
&lt;br /&gt;
== JTAGulator ==&lt;br /&gt;
According to the official [https://github.com/grandideastudio/jtagulator GitHub] repository, the JTAGulator is: &amp;lt;div&amp;gt;&lt;br /&gt;
&amp;lt;q&amp;gt;An open source hardware hacking tool that assists in identifying on-chip debug (OCD) interfaces from test points, vias, component pads, or connectors of an electronic device.&amp;lt;/q&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Not only can it identify JTAG, UART, SWD, and GPIO pins, it can also be used as a logic analyzer compatible with [https://sigrok.org/wiki/Main_Page Sigrok/PulseView]&lt;/div&gt;</summary>
		<author><name>Xenador77</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Useful_Reverse_Engineering_Tools&amp;diff=3162</id>
		<title>Useful Reverse Engineering Tools</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Useful_Reverse_Engineering_Tools&amp;diff=3162"/>
		<updated>2025-03-26T07:30:47Z</updated>

		<summary type="html">&lt;p&gt;Xenador77: /* Hardware Tools */  Added JTAGulator and links&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
&lt;br /&gt;
= Dissassembly &amp;amp; Decompilation Software =&lt;br /&gt;
&lt;br /&gt;
== IDA PRO ==&lt;br /&gt;
IDA Pro is a sophisticated commercial software application used for reverse engineering binary executables and analyzing software. Developed by Hex-Rays, IDA Pro is widely recognized as one of the most advanced and powerful tools in the field of reverse engineering. &lt;br /&gt;
&lt;br /&gt;
Key features of IDA Pro include:&lt;br /&gt;
&lt;br /&gt;
# &#039;&#039;&#039;Disassembly and Decompilation:&#039;&#039;&#039; IDA Pro provides comprehensive disassembly capabilities, allowing users to view and analyze assembly code instructions. Additionally, it offers a decompiler that generates higher-level pseudocode representations of the code, aiding in understanding complex binaries.&lt;br /&gt;
# &#039;&#039;&#039;Graphical User Interface (GUI):&#039;&#039;&#039; IDA Pro features a rich graphical interface that enables users to navigate, visualize, and interact with disassembled code, control flow graphs, data structures, and more.&lt;br /&gt;
# &#039;&#039;&#039;Advanced Analysis Tools:&#039;&#039;&#039; The tool includes a range of analysis features such as function recognition, code cross-references, call graphs, and data flow analysis.&lt;br /&gt;
# &#039;&#039;&#039;Extensibility and Scripting:&#039;&#039;&#039; IDA Pro supports scripting in various languages, allowing users to automate tasks, customize functionality, and create plugins to extend its capabilities.&lt;br /&gt;
# &#039;&#039;&#039;Binary Analysis and Security Research:&#039;&#039;&#039; IDA Pro is used extensively in the field of security research, helping analysts identify vulnerabilities, study malware, and analyze the security of software systems.&lt;br /&gt;
# &#039;&#039;&#039;Collaboration:&#039;&#039;&#039; IDA Pro&#039;s database format enables collaboration between analysts, allowing them to share their analysis and research on a specific binary.&lt;br /&gt;
# &#039;&#039;&#039;Multiple Platforms and Architectures:&#039;&#039;&#039; IDA Pro supports a wide range of platforms and architectures, making it suitable for analyzing binaries across different environments.&lt;br /&gt;
# &#039;&#039;&#039;Cost:&#039;&#039;&#039; IDA Pro is a commercial product and is available in several editions with varying feature sets. The cost of IDA Pro can range from several hundred to several thousand dollars per &amp;quot;seat&amp;quot; or user license. As of my last update in September 2021, the price for IDA Pro with all the decompilers (including Hex-Rays Decompiler) is roughly estimated to be around $2500 per seat.&lt;br /&gt;
&lt;br /&gt;
== Ghidra ==&lt;br /&gt;
Ghidra is a powerful open-source JAVA based software reverse engineering framework that was released by the United States National Security Agency (NSA) in March 2019.&lt;br /&gt;
&lt;br /&gt;
Key features of Ghidra include:&lt;br /&gt;
&lt;br /&gt;
# &#039;&#039;&#039;Disassembly and Decompilation:&#039;&#039;&#039; Ghidra can disassemble executable code into human-readable assembly language instructions and can also generate decompiled C code from binary executables. This helps analysts understand how the software functions at a higher level.&lt;br /&gt;
# &#039;&#039;&#039;Graphical User Interface (GUI):&#039;&#039;&#039; Ghidra features a user-friendly GUI that assists users in navigating and visualizing the disassembled code, control flow graphs, data structures, and more.&lt;br /&gt;
# &#039;&#039;&#039;Collaboration and Scripting:&#039;&#039;&#039; Ghidra allows users to write custom scripts and plugins in languages like Python to automate analysis tasks and customize the tool&#039;s functionality.&lt;br /&gt;
# &#039;&#039;&#039;Symbolic Analysis:&#039;&#039;&#039; Ghidra supports symbolic analysis, which aids in understanding program behavior by tracking values and relationships symbolically.&lt;br /&gt;
# &#039;&#039;&#039;Binary Analysis and Vulnerability Research:&#039;&#039;&#039; Security researchers can use Ghidra to identify vulnerabilities, analyze malware, and discover potential security weaknesses in software.&lt;br /&gt;
# &#039;&#039;&#039;Cross-Platform Compatibility:&#039;&#039;&#039; Ghidra is cross-platform, supporting Windows, macOS, and Linux, making it accessible to a wide range of users.&lt;br /&gt;
# &#039;&#039;&#039;Open Source and Community-Driven:&#039;&#039;&#039; One of Ghidra&#039;s standout features is that it is open-source software. This means that anyone can access, use, and contribute to its development. The open nature of the project encourages collaboration and innovation within the reverse engineering community.&lt;br /&gt;
# &#039;&#039;&#039;Cost:&#039;&#039;&#039; Ghidra is freely available for download and use, making it an accessible tool for individuals and organizations alike. The fact that it is open source contributes to its widespread adoption and popularity in the cybersecurity and reverse engineering fields.&lt;br /&gt;
&lt;br /&gt;
== Binary Ninja ==&lt;br /&gt;
Binary Ninja is a modern and user-friendly binary analysis platform used for reverse engineering and analyzing compiled code. Developed by Vector 35, Binary Ninja is often the preferred tool for CTF players and reverse engineers looking for a developer friendly python based API.&lt;br /&gt;
&lt;br /&gt;
Key features of Binary Ninja include:&lt;br /&gt;
&lt;br /&gt;
# &#039;&#039;&#039;Interactive Graphical Interface:&#039;&#039;&#039; Binary Ninja offers an interactive and visually appealing interface that simplifies the process of navigating and analyzing disassembled code. The platform uses a modern design to provide a clear representation of control flow graphs, functions, and data structures.&lt;br /&gt;
# &#039;&#039;&#039;Multi-Architecture and Multi-Platform Support:&#039;&#039;&#039; Binary Ninja supports various processor architectures and platforms, allowing users to analyze binaries from different environments and systems.&lt;br /&gt;
# &#039;&#039;&#039;Disassembly and Decompilation:&#039;&#039;&#039; The platform provides disassembly capabilities to view assembly code, and it also offers a decompiler to generate high-level pseudocode representations of the binary.&lt;br /&gt;
# &#039;&#039;&#039;Advanced Analysis Tools:&#039;&#039;&#039; Binary Ninja includes features such as function recognition, data cross-references, call graphs, data flow analysis, and more.&lt;br /&gt;
# &#039;&#039;&#039;Plugin Ecosystem:&#039;&#039;&#039; Binary Ninja supports a plugin architecture that allows users to extend its functionality through custom plugins written in Python.&lt;br /&gt;
# &#039;&#039;&#039;Collaboration and Sharing:&#039;&#039;&#039; The platform allows users to share analysis data and collaborate on projects by exporting and importing databases.&lt;br /&gt;
# &#039;&#039;&#039;Scripting and Automation:&#039;&#039;&#039; Users can write scripts in Python to automate repetitive tasks and customize analysis processes.&lt;br /&gt;
# &#039;&#039;&#039;Cost:&#039;&#039;&#039; Binary Ninja offers different editions with varying feature sets. As of my last update in September 2021, the cost of Binary Ninja&#039;s commercial licenses ranged from around $150 to $300 for the Personal edition, while the Business edition was priced at approximately $600. More advanced editions, such as the Enterprise edition, offer additional features and flexibility at a higher cost.&lt;br /&gt;
&lt;br /&gt;
== Our Recommendation ==&lt;br /&gt;
The cost of IDA Pro can be unobtainable for researchers on a budget therefore we recommend either using Ghidra as your sole disassembly tool or a combination of Ghidra and Binary Ninja for a low cost solution that will allow for a more expansive ability to audit binaries for vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
= Reversing Hardware =&lt;br /&gt;
&lt;br /&gt;
= Hardware Tools =&lt;br /&gt;
&lt;br /&gt;
== Tigard ==&lt;br /&gt;
&lt;br /&gt;
== Saleae Logic Analyzer ==&lt;br /&gt;
&lt;br /&gt;
== JTAGulator ==&lt;br /&gt;
----&lt;br /&gt;
According to the official [https://github.com/grandideastudio/jtagulator GitHub] repository, the JTAGulator is: &amp;lt;div&amp;gt;&lt;br /&gt;
&amp;lt;q&amp;gt;An open source hardware hacking tool that assists in identifying on-chip debug (OCD) interfaces from test points, vias, component pads, or connectors of an electronic device.&amp;lt;/q&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Not only can it identify JTAG, UART, SWD, and GPIO pins, it can also be used as a logic analyzer compatible with [https://sigrok.org/wiki/Main_Page Sigrok/PulseView]&lt;/div&gt;</summary>
		<author><name>Xenador77</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Useful_Hardware_Hacking_Tools&amp;diff=3161</id>
		<title>Useful Hardware Hacking Tools</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Useful_Hardware_Hacking_Tools&amp;diff=3161"/>
		<updated>2025-03-26T00:36:26Z</updated>

		<summary type="html">&lt;p&gt;Xenador77: Added  Lighting section&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= About = &lt;br /&gt;
&lt;br /&gt;
This page will specify some useful hardware hacking tools and advice.&lt;br /&gt;
&lt;br /&gt;
= Soldering Hardware =&lt;br /&gt;
&lt;br /&gt;
== Soldering Iron == &lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What&#039;&#039;&#039; (does it do): Your soldering iron heats up the solder to melt it. &lt;br /&gt;
* &#039;&#039;&#039;Why&#039;&#039;&#039; (get a good one): A number of reasons! &lt;br /&gt;
** Any iron worth its salt will have an adjustable temperature. If you&#039;re soldering at a temperature that&#039;s too hot, you could end up taking the copper pads off the board, leaving you with nothing to solder to. A temperature that&#039;s too low will result in defective, hard-to-make solder joints.&lt;br /&gt;
** You should also get an iron with a silicone cable. PVC cables (what you usually see on power cables) are very difficult to maneuver effectively, and if you accidentally touch your iron to them, they&#039;ll melt! Silicone cables flex much more easily and can withstand higher temperatures. &lt;br /&gt;
&lt;br /&gt;
Cheap option: PINECIL ($25) https://pine64.com/product/pinecil-smart-mini-portable-soldering-iron/. Make sure to get a silicone USB-C cable! There&#039;s one available on their store.&lt;br /&gt;
&lt;br /&gt;
Pricier option: &lt;br /&gt;
Quicko/Quecoo ($50) T12-956/952. 952 is cheaper, and I&#039;m not totally sure of the difference. I&#039;d go for the option here with the metal handle.&lt;br /&gt;
https://www.aliexpress.com/item/32803295956.html&lt;br /&gt;
&lt;br /&gt;
== Solder ==&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What&#039;&#039;&#039;: Solder is a conductive alloy with a low melting point, usually some combination of tin and lead. When in liquid form (i.e., when you touch your iron to it), it binds to copper surfaces. When you remove your iron, it quickly hardens and creates a solid electrical connection between whatever it&#039;s bound to.&lt;br /&gt;
* &#039;&#039;&#039;Why&#039;&#039;&#039;: Bad solder may lie on its packaging about what it&#039;s made of or contain impurities. Good quality solder will flow better and contain flux (see below) that will assist you when soldering.&lt;br /&gt;
&lt;br /&gt;
I&#039;d recommend Kester solder, but it&#039;s not available in small quantities. If you&#039;re just starting to read this page, you neither want nor need to buy a pound of solder. I&#039;m going to defer to the expertise of my fellow Exploitee.rs Discord member &amp;quot;Myself&amp;quot; and recommend Chipquik solder in its place: https://www.chipquik.com/store/index.php?cPath=600_610&lt;br /&gt;
&lt;br /&gt;
Purchase 63/37 solder at a diameter of 0.031&amp;quot;. Go with whichever quantity you can afford. 63/37 (63% tin, 37% lead) is a &amp;quot;eutectic&amp;quot; alloy, meaning that it goes from liquid to solid at a single temperature. The alternative, 60/40, undergoes a gradual transition where some of the metal is crystalline and some is molten. During this process, the joint has to be held perfectly still during the transition or you end up with a gray &amp;quot;cold&amp;quot; joint where the structure is disrupted, it&#039;s mechanically weak, and it may even silently unstick from things. Using a eutectic sidesteps all that and gives perfect joints a lot more easily. 0.031&amp;quot; is good for most work you&#039;ll be doing: it&#039;ll be pretty clear when you&#039;ll need larger or smaller solder.&lt;br /&gt;
&lt;br /&gt;
(Thanks again to Myself for the above explanation.)&lt;br /&gt;
&lt;br /&gt;
== Flux ==&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What&#039;&#039;&#039;: Flux helps heat and solder flow. &lt;br /&gt;
* &#039;&#039;&#039;Why&#039;&#039;&#039;: When you use flux, your joints will be stronger, look better, and be easier to make. It&#039;s optional in the same way that boots are optional when walking through 2 feet of snow.&lt;br /&gt;
* &#039;&#039;&#039;When&#039;&#039;&#039; (to use it): Always. There is no such thing as too much flux. (As you solder more, you&#039;ll eventually settle on the &amp;quot;right&amp;quot; amount to use that balances clean-up with ease of use.)&lt;br /&gt;
&lt;br /&gt;
AMTECH flux (my personal favorite) is considered by many to be the best general-purpose flux for electronics.&lt;br /&gt;
Breathing it doesn&#039;t make you feel like it will kill you, and it&#039;s relatively easy to clean up. (Not that you need to: it&#039;s no-clean! You can leave it on the board with no consequences!)&lt;br /&gt;
&lt;br /&gt;
Buy it from the wonderful Louis Rossmann: https://store.rossmanngroup.com/amtech-nc-559-v2-30-cc-16160.html&lt;br /&gt;
Check the &amp;quot;plunger-needle&amp;quot; option, but ALSO grab a set of dispensing tips from ChipQuik: https://www.chipquik.com/store/product_info.php?products_id=906002. &lt;br /&gt;
These can be extremely useful if you need to add more or less flux when soldering. The plastic tips also require much less force to dispense.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
 &#039;&#039;&#039;Caution&#039;&#039;&#039;: Not all flux is suitable for soldering electronics; Acid flux types contain hydrochloric acid, zinc chloride or ammonium chloride, which are corrosive.&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Fume Extractors ==&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What&#039;&#039;&#039;: Removes harmful solder fumes in the air.&lt;br /&gt;
* &#039;&#039;&#039;Why&#039;&#039;&#039;: Dying ten years early from inhalation of toxic fumes means ten years less of soldering.&lt;br /&gt;
* &#039;&#039;&#039;When&#039;&#039;&#039;: Whenever you&#039;re soldering in a poorly ventilated area.&lt;br /&gt;
&lt;br /&gt;
I&#039;m admittedly terrible about this, more so than I should be. If you can crack a window open and turn on a fan, do that. Fresh air is better than any fume extractor, and it&#039;s good for you anyway!&lt;br /&gt;
&lt;br /&gt;
If you can&#039;t open a window, you can at least pretend you care by buying a cheap fume extractor, which is basically just a computer fan with a carbon filter on top of it.&lt;br /&gt;
&lt;br /&gt;
I personally use the Aoyue AO486: https://www.sra-solder.com/aoyue-486-fume-extractor-and-smoke-absorber-fan&lt;br /&gt;
&lt;br /&gt;
== Stand ==&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What&#039;&#039;&#039;: Holds your iron and your iron cleaner.&lt;br /&gt;
* &#039;&#039;&#039;Why&#039;&#039;&#039;: Cheaping out on a stand poses a major safety issue (not a remote, far-off, &amp;quot;better safe than sorry&amp;quot; one!) and a usability issue. &lt;br /&gt;
&lt;br /&gt;
Wow, does it seem easy to cheap out on this. Don&#039;t! Cheap stands will have open iron holders that are really easy to accidentally stick a finger or hand in. You &#039;&#039;&#039;will&#039;&#039;&#039; burn yourself if you use those. And don&#039;t settle for a stand that includes a sponge as a cleaner. Sponges do not work well for iron cleaning. Even if they do for some, they&#039;re much more of a pain to use.&lt;br /&gt;
&lt;br /&gt;
Go for an iron holder with a good, solid, shrouded holder and a brass wire cleaner. My personal recommendation is the Hakko 633-01 holder. https://hakkousa.com/633-01-iron-holder-with-599b-tip-cleaner.html &lt;br /&gt;
&lt;br /&gt;
As Myself put it (smart guy!): &amp;quot;it&#039;s twice the price of the cheapies and ten times as nice. Making it nice and heavy is important so the cord doesn&#039;t pull it off the table.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Wick ==&lt;br /&gt;
* &#039;&#039;&#039;What&#039;&#039;&#039;: &amp;quot;Wicks&amp;quot; up excess solder.&lt;br /&gt;
* &#039;&#039;&#039;When&#039;&#039;&#039;: When there&#039;s just too much solder on the board, and you can&#039;t redistribute it without making a mess or creating solder bridges.&lt;br /&gt;
* &#039;&#039;&#039;Why&#039;&#039;&#039;: Bad wick will fall apart easily and have too few copper strands (meaning you&#039;ll need to use more wick for the same amount of solder)&lt;br /&gt;
&lt;br /&gt;
Solder wick is like high school. It can be useful, but no one I know has a good experience with it. I get my wick from NorthridgeFix. (https://northridgefix.com/product/premium-desolder-braid-wick-10ft-length/) Their stuff can be overpriced, but the wick is good, and their videos are a fantastic free resource, so it&#039;s worth supporting them.&lt;br /&gt;
&lt;br /&gt;
== Lighting == &lt;br /&gt;
* &#039;&#039;&#039;What&#039;&#039;&#039; : Exactly what it sounds like, a source of light so you can see what you&#039;re doing.&lt;br /&gt;
* &#039;&#039;&#039;Why&#039;&#039;&#039; : SMDs (surface-mounted devices) are small, and being able to see them makes soldering them significantly easier.&lt;br /&gt;
&lt;br /&gt;
Task lamps that can be repositioned as needed are ideal and can often be obtained inexpensively at garage sales or thrift stores.&lt;/div&gt;</summary>
		<author><name>Xenador77</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Useful_Hardware_Hacking_Tools&amp;diff=3160</id>
		<title>Useful Hardware Hacking Tools</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Useful_Hardware_Hacking_Tools&amp;diff=3160"/>
		<updated>2025-03-26T00:17:06Z</updated>

		<summary type="html">&lt;p&gt;Xenador77: /* Flux */  information concerning acid type flux&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= About = &lt;br /&gt;
&lt;br /&gt;
This page will specify some useful hardware hacking tools and advice.&lt;br /&gt;
&lt;br /&gt;
= Soldering Hardware =&lt;br /&gt;
&lt;br /&gt;
== Soldering Iron == &lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What&#039;&#039;&#039; (does it do): Your soldering iron heats up the solder to melt it. &lt;br /&gt;
* &#039;&#039;&#039;Why&#039;&#039;&#039; (get a good one): A number of reasons!. &lt;br /&gt;
** Any iron worth its salt will have adjustable temperature. If you&#039;re soldering at a temperature that&#039;s too hot, you could end up taking the copper pads off the board, leaving you with nothing to solder to. A temperature that&#039;s too low will result in defective, hard to make solder joints.&lt;br /&gt;
** You should also get an iron with a silicone cable. PVC cables (what you usually see on power cables) are very difficult to effectively maneuver, and if you accidentally touch your iron to them, they&#039;ll melt! Silicone cables flex much more easily and can withstand higher temperatures. &lt;br /&gt;
&lt;br /&gt;
Cheap option: PINECIL ($25) https://pine64.com/product/pinecil-smart-mini-portable-soldering-iron/. Make sure to get a silicone USB-C cable! There&#039;s one available on their store.&lt;br /&gt;
&lt;br /&gt;
Pricier option: &lt;br /&gt;
Quicko/Quecoo ($50) T12-956/952. 952 is cheaper and I&#039;m not totally sure the difference. I&#039;d go for the option here with the metal handle.&lt;br /&gt;
https://www.aliexpress.com/item/32803295956.html&lt;br /&gt;
&lt;br /&gt;
== Solder ==&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What&#039;&#039;&#039;: Solder is an conductive alloy with a low melting point, usually some combination of tin and lead. When in liquid form (i.e. when you touch your iron to it), it binds to copper surfaces. When you remove your iron, it quickly hardens and creates a solid electrical connection between whatever it&#039;s bound to.&lt;br /&gt;
* &#039;&#039;&#039;Why&#039;&#039;&#039;: Bad solder may lie on its packaging about what it&#039;s made of, or contain impurities. Good quality solder will flow better and contain flux (see below) that will assist you when soldering.&lt;br /&gt;
&lt;br /&gt;
I&#039;d recommend Kester solder, but it&#039;s not available in small quantities. If you&#039;re just starting to read this page, you neither want nor need to buy a pound of solder. I&#039;m going to defer to the expertise of my fellow Exploitee.rs Discord member &amp;quot;Myself&amp;quot; and recommend Chipquik solder in its place: https://www.chipquik.com/store/index.php?cPath=600_610&lt;br /&gt;
&lt;br /&gt;
Purchase 63/37 solder at a diameter of 0.031&amp;quot;. Go with whichever quantity you can afford. 63/37 (63% tin, 37% lead) is a &amp;quot;eutectic&amp;quot; alloy, meaning that it goes from liquid to solid at a single temperature. The alternative, 60/40, undergoes a gradual transition where some of the metal is crystalline and some is molten. During this process, the joint has to be held perfectly still during the transition or you end up with a gray &amp;quot;cold&amp;quot; joint where the structure is disrupted, it&#039;s mechanically weak, and it may even silently unstick from things. Using a eutectic sidesteps all that and gives perfect joints a lot more easily. 0.031&amp;quot; is good for most work you&#039;ll be doing: it&#039;ll be pretty clear when you&#039;ll need larger or smaller solder.&lt;br /&gt;
&lt;br /&gt;
(Thanks again to Myself for the above explanation.)&lt;br /&gt;
&lt;br /&gt;
== Flux ==&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What&#039;&#039;&#039;: Flux helps heat and solder flow. &lt;br /&gt;
* &#039;&#039;&#039;Why&#039;&#039;&#039;: When you use flux, your joints will be stronger, look better, and be easier to make. It&#039;s optional in the same way that boots are optional when walking through 2 feet of snow.&lt;br /&gt;
* &#039;&#039;&#039;When&#039;&#039;&#039; (to use it): Always. There is no such thing as too much flux. (As you solder more, you&#039;ll eventually settle on the &amp;quot;right&amp;quot; amount to use that balances clean-up with ease of use.)&lt;br /&gt;
&lt;br /&gt;
AMTECH flux (my personal favorite) is considered by many to be the best general-purpose flux for electronics.&lt;br /&gt;
Breathing it doesn&#039;t make you feel like it will kill you, and it&#039;s relatively easy to clean up. (Not that you need to: it&#039;s no-clean! You can leave it on the board with no consequences!)&lt;br /&gt;
&lt;br /&gt;
Buy it from the wonderful Louis Rossmann: https://store.rossmanngroup.com/amtech-nc-559-v2-30-cc-16160.html&lt;br /&gt;
Check the &amp;quot;plunger-needle&amp;quot; option, but ALSO grab a set of dispensing tips from ChipQuik: https://www.chipquik.com/store/product_info.php?products_id=906002. &lt;br /&gt;
These can be extremely useful if you need to add more or less flux when soldering. The plastic tips also require much less force to dispense.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
 &#039;&#039;&#039;Caution&#039;&#039;&#039;: Not all flux is suitable for soldering electronics; Acid flux types contain hydrochloric acid, zinc chloride or ammonium chloride, which are corrosive.&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Fume Extractors ==&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What&#039;&#039;&#039;: Removes harmful solder fumes in the air.&lt;br /&gt;
* &#039;&#039;&#039;Why&#039;&#039;&#039;: Dying ten years early from inhalation of toxic fumes means ten years less of soldering.&lt;br /&gt;
* &#039;&#039;&#039;When&#039;&#039;&#039;: Whenever you&#039;re soldering in a poorly ventilated area.&lt;br /&gt;
&lt;br /&gt;
I&#039;m admittedly terrible about this, moreso than I should be. If you can crack a window open and turn on a fan, do that. Fresh air is better than any fume extractor, and it&#039;s good for you anyway!&lt;br /&gt;
&lt;br /&gt;
If you can&#039;t open a window, you can at least pretend you care by buying a cheap fume extractor, which is basically just a computer fan with a carbon filter on top of it.&lt;br /&gt;
&lt;br /&gt;
I personally use the Aoyue AO486: https://www.sra-solder.com/aoyue-486-fume-extractor-and-smoke-absorber-fan&lt;br /&gt;
&lt;br /&gt;
== Stand ==&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;What&#039;&#039;&#039;: Holds your iron and your iron cleaner.&lt;br /&gt;
* &#039;&#039;&#039;Why&#039;&#039;&#039;: Cheaping out on a stand poses a major safety issue (not a remote, far-off, &amp;quot;better safe than sorry&amp;quot; one!) and a usability issue. &lt;br /&gt;
&lt;br /&gt;
Wow, does it seem easy to cheap out on this. Don&#039;t! Cheap stands will have open iron holders that are really easy to accidentally stick a finger or hand in. You &#039;&#039;&#039;will&#039;&#039;&#039; burn yourself if you use those. And don&#039;t settle for a stand that includes a sponge as a cleaner. Sponges do not work well for iron cleaning. Even if they do for some, they&#039;re much more of a pain to use.&lt;br /&gt;
&lt;br /&gt;
Go for an iron holder with a good, solid, shrouded holder and a brass wire cleaner. My personal recommendation is the Hakko 633-01 holder. https://hakkousa.com/633-01-iron-holder-with-599b-tip-cleaner.html &lt;br /&gt;
&lt;br /&gt;
As Myself put it (smart guy!): &amp;quot;it&#039;s twice the price of the cheapies and ten times as nice. Making it nice and heavy is important so the cord doesn&#039;t pull it off the table.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Wick ==&lt;br /&gt;
* &#039;&#039;&#039;What&#039;&#039;&#039;: &amp;quot;Wicks&amp;quot; up excess solder.&lt;br /&gt;
* &#039;&#039;&#039;When&#039;&#039;&#039;: When there&#039;s just too much solder on the board and you can&#039;t redistribute it without making a mess or creating solder bridges.&lt;br /&gt;
* &#039;&#039;&#039;Why&#039;&#039;&#039;: Bad wick will fall apart easily and have too few copper strands (meaning you&#039;ll need to use more wick for the same amount of solder)&lt;br /&gt;
&lt;br /&gt;
Solder wick is like high school. It can be useful, but no one I know has a good experience with it. I get my wick from NorthridgeFix. (https://northridgefix.com/product/premium-desolder-braid-wick-10ft-length/) Their stuff can be overpriced, but the wick is good and their videos are a fantastic free resource so it&#039;s worth sup[porting them.&lt;/div&gt;</summary>
		<author><name>Xenador77</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=User_talk:Xenador77&amp;diff=3159</id>
		<title>User talk:Xenador77</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=User_talk:Xenador77&amp;diff=3159"/>
		<updated>2025-03-25T21:55:21Z</updated>

		<summary type="html">&lt;p&gt;Xenador77: /* Xenador77&amp;#039;s Talk Page */  remove unnecessary header&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;If I mess anything up, please let me know so I can avoid doing so in the future.&lt;br /&gt;
&lt;br /&gt;
If I don&#039;t respond, I likely didn&#039;t see the message, feel free to contact me elsewhere.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
X/Twitter: https://x.com/xenador77&lt;br /&gt;
&amp;lt;div/&amp;gt;&lt;br /&gt;
GitHub: https://github.com/xenador77&lt;/div&gt;</summary>
		<author><name>Xenador77</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=User_talk:Xenador77&amp;diff=3158</id>
		<title>User talk:Xenador77</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=User_talk:Xenador77&amp;diff=3158"/>
		<updated>2025-03-25T21:54:42Z</updated>

		<summary type="html">&lt;p&gt;Xenador77: Create talk page and add contact info&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Xenador77&#039;s Talk Page = &lt;br /&gt;
&lt;br /&gt;
If I mess anything up, please let me know so I can avoid doing so in the future.&lt;br /&gt;
&lt;br /&gt;
If I don&#039;t respond, I likely didn&#039;t see the message, feel free to contact me elsewhere.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
X/Twitter: https://x.com/xenador77&lt;br /&gt;
&amp;lt;div/&amp;gt;&lt;br /&gt;
GitHub: https://github.com/xenador77&lt;/div&gt;</summary>
		<author><name>Xenador77</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Attacking_Embedded_Devices&amp;diff=3157</id>
		<title>Attacking Embedded Devices</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Attacking_Embedded_Devices&amp;diff=3157"/>
		<updated>2025-03-25T21:39:07Z</updated>

		<summary type="html">&lt;p&gt;Xenador77: Minor formatting/grammar adjustment&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
&lt;br /&gt;
= Attacking Embedded Devices =&lt;br /&gt;
This page is intended to be a set of resources on attack types, methodologies, and general embedded device hacking principles. This should include information for beginners on intro topics like how to solder and recommended hardware.&lt;br /&gt;
&lt;br /&gt;
== Beginner Topics ==&lt;br /&gt;
* [[Getting Started In Hardware Hacking]]&lt;br /&gt;
&lt;br /&gt;
== Hardware Hacking ==&lt;br /&gt;
&lt;br /&gt;
=== Methodology ===&lt;br /&gt;
* [[Understanding Secure Boot]]&lt;br /&gt;
&lt;br /&gt;
=== Tools ===&lt;br /&gt;
* [[Useful Hardware Hacking Tools]]&lt;br /&gt;
&lt;br /&gt;
=== Debug Protocols ===&lt;br /&gt;
* [[UART]]&lt;br /&gt;
* [[JTAG]]&lt;br /&gt;
* [[SWD]]&lt;br /&gt;
&lt;br /&gt;
== Flash Storage ==&lt;br /&gt;
* [[eMMC]]&lt;br /&gt;
* [[NAND]]&lt;br /&gt;
* [[NOR]]&lt;br /&gt;
* [[SPI]]&lt;br /&gt;
&lt;br /&gt;
== Firmware/Software Hacking ==&lt;br /&gt;
&lt;br /&gt;
=== Acquiring Firmware Updates ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====== The Easy Way ======&lt;br /&gt;
----&lt;br /&gt;
Firmware can often be found on the manufacturer&#039;s official website, along with patch notes, user manuals, and heavily abridged &#039;Data Sheets&#039; that may occasionally include some interesting information about the device.&lt;br /&gt;
&lt;br /&gt;
====== The Fun Way ======&lt;br /&gt;
----&lt;br /&gt;
Some devices attempt to prevent self-updating by limiting access to the firmware and pushing out updates to devices connected to the internet. Thankfully, programs like WireShark can be used to record the information sent from the manufacturer to the device.&lt;br /&gt;
* [[How To MiTM]]&lt;br /&gt;
&lt;br /&gt;
=== Reverse Engineering ===&lt;br /&gt;
&lt;br /&gt;
* [[Useful Reverse Engineering Tools]]&lt;/div&gt;</summary>
		<author><name>Xenador77</name></author>
	</entry>
	<entry>
		<id>https://wiki.exploitee.rs/index.php?title=Attacking_Embedded_Devices&amp;diff=3156</id>
		<title>Attacking Embedded Devices</title>
		<link rel="alternate" type="text/html" href="https://wiki.exploitee.rs/index.php?title=Attacking_Embedded_Devices&amp;diff=3156"/>
		<updated>2025-03-25T21:36:04Z</updated>

		<summary type="html">&lt;p&gt;Xenador77: /* Acquiring Firmware Updates */  Added brief summary of firmware acquisition methods&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__FORCETOC__&lt;br /&gt;
{{Disclaimer}}&lt;br /&gt;
&lt;br /&gt;
= Attacking Embedded Devices =&lt;br /&gt;
This page is intended to be a set of resources on attack types, methodologies and general embedded device hacking principals. This should include information for beginners on intro topics like how to solder as well as include recommended hardware.&lt;br /&gt;
&lt;br /&gt;
== Beginner Topics ==&lt;br /&gt;
* [[Getting Started In Hardware Hacking]]&lt;br /&gt;
&lt;br /&gt;
== Hardware Hacking ==&lt;br /&gt;
&lt;br /&gt;
=== Methodology ===&lt;br /&gt;
* [[Understanding Secure Boot]]&lt;br /&gt;
&lt;br /&gt;
=== Tools ===&lt;br /&gt;
* [[Useful Hardware Hacking Tools]]&lt;br /&gt;
&lt;br /&gt;
=== Debug Protocols ===&lt;br /&gt;
* [[UART]]&lt;br /&gt;
* [[JTAG]]&lt;br /&gt;
* [[SWD]]&lt;br /&gt;
&lt;br /&gt;
== Flash Storage ==&lt;br /&gt;
* [[eMMC]]&lt;br /&gt;
* [[NAND]]&lt;br /&gt;
* [[NOR]]&lt;br /&gt;
* [[SPI]]&lt;br /&gt;
&lt;br /&gt;
== Firmware/Software Hacking ==&lt;br /&gt;
&lt;br /&gt;
=== Acquiring Firmware Updates ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====== The Easy Way ======&lt;br /&gt;
----&lt;br /&gt;
Firmware can often be found on the manufacturer&#039;s official website, along with patch notes, user manuals, and heavily abridged &#039;Data Sheets&#039; that may occasionally include some interesting information about the device.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====== The Fun Way ======&lt;br /&gt;
----&lt;br /&gt;
Some devices attempt to prevent self-updating by limiting access to the firmware and pushing out updates to devices connected to the internet. Thankfully, programs like WireShark can be used to record the information sent from the manufacturer to the device.&lt;br /&gt;
* [[How To MiTM]]&lt;br /&gt;
&lt;br /&gt;
=== Reverse Engineering ===&lt;br /&gt;
&lt;br /&gt;
* [[Useful Reverse Engineering Tools]]&lt;/div&gt;</summary>
		<author><name>Xenador77</name></author>
	</entry>
</feed>