Explore >> Select a destination


You are here

wsummerhill.github.io
| | niemczuk.tech
4.3 parsecs away

Travel
| | Everyone should be familiar with the concept of brute forcing. In short it is an action of trying every possible combination till succeeding. Most often used in password hacking / hash guessing.
| | cookie.engineer
2.7 parsecs away

Travel
| | Linux Assembly Part 3: Control Flow
| | blog.dornea.nu
3.7 parsecs away

Travel
| | [AI summary] The blog post discusses the process of creating and executing a shellcode in C to read a file named 'flag.txt' and dump its content, including assembly code, compilation steps, and execution considerations.
| | adayinthelifeof.nl
23.3 parsecs away

Travel
| [AI summary] The article discusses the reverse engineering of the Commodore 64 game 'Eindeloos' (Endless), focusing on extracting its vast map data through memory analysis and understanding its 8-character block compression technique.