You are here |
tcode2k16.github.io | ||
| | | |
goggleheadedhacker.com
|
|
| | | | This tutorial will show how two methods of implementing the AES algorithm work. It will also demonstrate how to identify these methods in Assembly when reverse engineering an application. | |
| | | |
crocidb.com
|
|
| | | | Following my first GameBoy, the DMG, now I got a GameBoy color and replaced the buttons and gave it a clean. Also Update on my game for the platform | |
| | | |
faraz.faith
|
|
| | | | ||
| | | |
toddcullumresearch.com
|
|
| | Purpose of this page This is a continuously updated page and it is never finished! I decided to go ahead and cover the tools I typically use for analyzing malware because although Ive found lists elsewhere, Ive found no real big collection with explanation and/or any type of discussion of these tools. Its generally more... Read More |