|
You are here |
blog.deobfuscate.io | ||
| | | | |
0x44.cc
|
|
| | | | | [AI summary] The article provides an in-depth explanation of reverse engineering concepts, including CPU operations, memory representation, data structures, and disassembly techniques. It guides readers through understanding machine code, endianness, signed integers, and how to analyze C code using tools like Visual Studio and disassemblers. | |
| | | | |
www.jmeiners.com
|
|
| | | | | [AI summary] The provided text outlines the development of an LC-3 virtual machine (VM) in C, including the implementation of various instructions, memory operations, and input/output handling. It also discusses an advanced C++ approach using templates and bitwise flags to reduce code duplication and improve efficiency. The text covers topics like instruction decoding, memory addressing, flag handling, and platform-specific input buffering. Additionally, it references contributions from the community and mentions GitHub tags for organizing implementations in different languages. | |
| | | | |
www.willsroot.io
|
|
| | | | | Vulnerability Research on Low-Level Systems | |
| | | | |
int10h.org
|
|
| | | Font: DOS/V re. JPN30, from the world's biggest collection of classic text mode fonts, system fonts and BIOS fonts from DOS-era IBM PCs and compatibles | ||