Explore >> Select a destination


You are here

sensepost.com
| | calebfenton.github.io
5.6 parsecs away

Travel
| | If you reverse engineer network protocols or do any other network security stuff, you've probably needed to collect network traffic at least once - either to understand a protocol or look for sensitiv
| | 0xdarkvortex.dev
4.8 parsecs away

Travel
| | Dark Vortex provides various cybersecurity trainings, products and other services.
| | mandconsulting.ca
5.9 parsecs away

Travel
| | Dominik Penner of Mand Consulting Group discovered that Maltego versions 4.2.11 and below are vulnerable to XML external entity (XXE) injection via processing of MTZ (config) and MTGL (graph) files
| | gpfault.net
28.1 parsecs away

Travel
| [AI summary] The provided text is a detailed explanation of how to write a simple 64-bit Windows application in assembly language that calls the ExitProcess function from the KERNEL32.DLL library. It covers the following key topics: 1. **Memory and Register Basics**: Explains how memory and registers work in 64-bit Windows, including the use of the stack pointer (RSP), registers like RCX, RDX, R8, and R9 for passing arguments, and the importance of stack alignment for performance. 2. **Calling Conventions**: Details the 64-bit Windows calling convention, including how the first four integer or pointer arguments are passed in registers (RCX, RDX, R8, R9), how additional arguments are passed on the stack, and the requirement for the stack to be aligned to ...