Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
login
enragedcacti
on Sept 12, 2021
|
parent
|
context
|
favorite
| on:
Reverse-Engineering Apple Dictionary (2020)
For anyone else needing to tackle something like this, its definitely worth checking out Binwalk [1]. It is meant for extracting firmware but it works decently well on most files-in-files type data formats.
[1]
https://github.com/ReFirmLabs/binwalk
bouk
on Sept 13, 2021
[–]
This was my first instinct as well! Running binwalk on the binary dictionary file immediately outputs that it's a series of zlib-compressed values.
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search:
[1] https://github.com/ReFirmLabs/binwalk