Explore >> Select a destination


You are here

blog.deobfuscate.io
| | 0x44.cc
4.2 parsecs away

Travel
| | [AI summary] The article provides an in-depth explanation of reverse engineering concepts, including CPU operations, memory representation, data structures, and disassembly techniques. It guides readers through understanding machine code, endianness, signed integers, and how to analyze C code using tools like Visual Studio and disassemblers.
| | www.jmeiners.com
4.0 parsecs away

Travel
| | [AI summary] The provided text outlines the development of an LC-3 virtual machine (VM) in C, including the implementation of various instructions, memory operations, and input/output handling. It also discusses an advanced C++ approach using templates and bitwise flags to reduce code duplication and improve efficiency. The text covers topics like instruction decoding, memory addressing, flag handling, and platform-specific input buffering. Additionally, it references contributions from the community and mentions GitHub tags for organizing implementations in different languages.
| | www.willsroot.io
3.4 parsecs away

Travel
| | Vulnerability Research on Low-Level Systems
| | int10h.org
10.9 parsecs away

Travel
| Font: DOS/V re. JPN30, from the world's biggest collection of classic text mode fonts, system fonts and BIOS fonts from DOS-era IBM PCs and compatibles