Explore >> Select a destination


You are here

tcode2k16.github.io
| | unicode-explorer.com
190.0 parsecs away

Travel
| | All Unicode blocks, copy and paste, unicode character symbol info
| | unorde.red
14.4 parsecs away

Travel
| | [AI summary] A detailed writeup of solving the 'Bangalore' level in the Microcorruption CTF, focusing on bypassing Data Execution Prevention (DEP) through interrupt manipulation and shellcode execution.
| | goggleheadedhacker.com
18.1 parsecs away

Travel
| | This tutorial will show how two methods of implementing the AES algorithm work. It will also demonstrate how to identify these methods in Assembly when reverse engineering an application.
| | projectf.io
49.7 parsecs away

Travel
| This RISC-V assembler post begins by examining the RISC-V jump instructions: jal and jalr. Jump instructions are the basis of functions, so we'll then dig into function calls, the RISC-V ABI, calling convention, and how to use the stack.