| 
	     You are here  | 
        andrewkelley.me | ||
| | | | | 
            
              www.openmymind.net
             | 
        |
| | | | | ||
| | | | | 
            
              ciesie.com
             | 
        |
| | | | | Today I've played around with Zig, the new, hip (is it hip?) programming language. I find it pretty neat. I'm going to walk you (and myself) through my first, very short, piece of code. Below you can see the entirety of it. It basically allocates a 2MB buffer and reads a file into it... Yep, not particularly impressive, but this is a judgment free, learning zone, ok?! 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 const std = @import("std"); const warn = @import("std"). | |
| | | | | 
            
              oldboy21.github.io
             | 
        |
| | | | | Hello everyone! It's been a while, many things happening and not much time for coding. Hard times. Nonetheless I had little time frames for playing with some stuff I would define cool enough to write some lines about it. Last time we talked about Indirect Syscalls for Reflective DLL and I want to thank everyone who liked it and shared some feedback. After that I have decided to focus on in-memory obfuscation techniques since that poor Reflective DLL was target of those scary in-memory scanning tools. | |
| | | | | 
            
              www.preludesecurity.com
             | 
        |
| | | Explore MITRE ATT&CK techniques used by Scattered Spider in major recent UK retailer cyberattacks and how to evaluate your own organization's defenses. | ||