This is the personal website of Ben Lincoln.
|This Dust Remembers What It Once Was version 0.8|
This Dust Remembers What It Once Was version 0.8 has been released. This is the biggest update since the first release, and includes the following changes:
In short, it supports a bunch of things it didn't before, works much better, and requires significantly less manual work by the user.
I added a very lengthy, detailed tutorial which introduces the overlay-handling features using another custom PSX EXE: TDR: Practice Using OVERLAYS. I recommend going through that walkthrough even if you're not interested in games that use memory overlays, because it has a bunch of additional information about hwo to use TDR. It also has some comparisons between original source code and decompiled versions.
TDR: Practice Using EDGECASE has been updated with a revised version of that binary and some additional steps.
|Posted by Ben Lincoln, 2019-09-11 @ 05:00|
|This Dust Remembers What It Once Was version 0.7|
The 0.7 release of This Dust Remembers What It Once Was is ready. This one once again significantly improves results, and I fixed it to work with Biohazard 2 again.
|Posted by Ben Lincoln, 2019-08-22 @ 00:30|
|This Dust Remembers What It Once Was version 0.6|
Another alpha release (0.6) of This Dust Remembers What It Once Was is ready. This one should work even better than previous releases.
I also added a much more basic walkthrough of the tool, with a custom toy PsyQ PlayStation binary which has source included for comparison. You can find that at TDR: Practice Using EDGECASE.
|Posted by Ben Lincoln, 2019-08-19 @ 18:00|
|This Dust Remembers What It Once Was version 0.4|
Just released a third alpha version (0.4) of This Dust Remembers What It Once Was. This one should work much better than previous releases.
I also finishd the walkthrough for using it to decompile a beta version of Biohazard 2, which you can find in TDR: Biohazard 2.
|Posted by Ben Lincoln, 2019-08-14 @ 23:20|
|This Dust Remembers What It Once Was version 0.3|
Today I'm releasing a second alpha version of This Dust Remembers What It Once Was. This one has some major improvements and new capabilities.
I recently discovered that mail sent to me through the Contact forms on my websites has been frequently going nowhere, because my hosting provider doesn't think outbound email from web forms and other similar systems should be reliable. If you've tried to get in touch with me and haven't seen a response, I've added my social media contact information to the Contact page.
|Posted by Ben Lincoln, 2019-08-13 @ 23:50|
|This Dust Remembers What It Once Was|
Today I'm releasing a very early alpha version of This Dust Remembers What It Once Was, a videogame reverse-engineering toolkit for use with Ghidra. This initial version is focused almost exclusively on PlayStation games.
If you scanned my QR code, the details are over at Legacy of Kain: The Lost Worlds, but feel free to contact me via either site.
|Posted by Ben Lincoln, 2019-08-06 @ 07:00|
|Summon the Lulz|
|Posted by Ben Lincoln, 2018-01-06 @ 15:00|
|Assorted New Material|
In this completely random collection of updates, I present:
A long-overdue rewrite of Thermal versus Near Infrared, prompted by a discussion I had in email with Dr. David Wilson.
A look at how I made my Destiny Costume for Halloween, 2017.
A list of the vulnerabilities I've discovered which have been publicly-disclosed: Hack the Planet.
|Posted by Ben Lincoln, 2018-01-02 @ 08:30|
|UW/ISACA Presentation Slide Deck|
Early tonight I gave a presentation at the University of Washington demonstrating some penetration testing tools. A video should be available eventually. In the meantime, if you'd like to download the slide deck I used:
Penetration Testing Slide Deck - PDF [ 51 MiB ] (yes, it's enormous compared to the PowerPoint file :( )
|Posted by Ben Lincoln, 2016-05-20 @ 01:00|
I've finally made time to post a handy utility VBScript I hacked together late last year: wg.vbs. It's a quick and dirty way to download files via HTTP from the command-line on versions of Windows® too old to support other mechanisms (e.g. PowerShell).
I've also made a few other minor updates I've been meaning to get to for awhile, such as noting in Mimikatz 2.0 - Brute-Forcing Service Account Passwords that Mimikatz already included the capability to launch OS commands — it just wasn't well-documented when I wrote that article.
|Posted by Ben Lincoln, 2015-08-23 @ 20:00|