Event JSON
{
"id": "942ccb6878c3a9e1511ced86151e56e13d033da4e0195c51dc1dbbfec6eca1f6",
"pubkey": "ccca24c1e7c8dc9068b0c0f6ed38670d995d42c6f9ed5fdcc725baa0e39da1a6",
"created_at": 1764331418,
"kind": 1,
"tags": [
[
"t",
"windows"
],
[
"proxy",
"https://infosec.exchange/@pancake/115627223816266491",
"web"
],
[
"t",
"reverseengineering"
],
[
"t",
"radare2"
],
[
"t",
"debugging"
],
[
"proxy",
"https://infosec.exchange/users/pancake/statuses/115627223816266491",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://infosec.exchange/users/pancake/statuses/115627223816266491",
"pink.momostr"
],
[
"-"
]
],
"content": "π Before the #radare2 6.0.6 release during the testing stage I spotted a crash on Windows and decided to write a post explaining how I fixed it using only the cmd interface π https://trufae.github.io/aiblog/WinCdbNull-en.html \n\nAs a UNIX person I'm not comfortable on #windows but i was happy to learn some commandline #debugging tools and shared some insights for #reverseengineering in my writeup. Hope you enjoy the reading!",
"sig": "3ab7f4e8967e4606a938eba3ca219a2a3ea6cc248848b7920ba9c77e6663b1ccb1d57593967f760b10229cd0028d9ae2b3c68e68e16db53db939b531b7b5c480"
}