 
      
    | You are here | crocidb.com | ||
| | | | | tcode2k16.github.io | |
| | | | | a random blog about cybersecurity and programming | |
| | | | | www.da.vidbuchanan.co.uk | |
| | | | | ||
| | | | | blog.the.al | |
| | | | | If you missed previous episodes: Part 1 where you can read aboutthis DualShock 4 totally messed up that I'm trying to repair Part 2 where I figure outwhich... | |
| | | | | goggleheadedhacker.com | |
| | | This tutorial will show how two methods of implementing the AES algorithm work. It will also demonstrate how to identify these methods in Assembly when reverse engineering an application. | ||