|
You are here |
wsummerhill.github.io | ||
| | | | |
niemczuk.tech
|
|
| | | | | Everyone should be familiar with the concept of brute forcing. In short it is an action of trying every possible combination till succeeding. Most often used in password hacking / hash guessing. | |
| | | | |
cookie.engineer
|
|
| | | | | Linux Assembly Part 3: Control Flow | |
| | | | |
blog.dornea.nu
|
|
| | | | | [AI summary] The blog post discusses the process of creating and executing a shellcode in C to read a file named 'flag.txt' and dump its content, including assembly code, compilation steps, and execution considerations. | |
| | | | |
adayinthelifeof.nl
|
|
| | | [AI summary] The article discusses the reverse engineering of the Commodore 64 game 'Eindeloos' (Endless), focusing on extracting its vast map data through memory analysis and understanding its 8-character block compression technique. | ||