|
You are here |
tcode2k16.github.io | ||
| | | | |
unicode-explorer.com
|
|
| | | | | All Unicode blocks, copy and paste, unicode character symbol info | |
| | | | |
unorde.red
|
|
| | | | | [AI summary] A detailed writeup of solving the 'Bangalore' level in the Microcorruption CTF, focusing on bypassing Data Execution Prevention (DEP) through interrupt manipulation and shellcode execution. | |
| | | | |
goggleheadedhacker.com
|
|
| | | | | This tutorial will show how two methods of implementing the AES algorithm work. It will also demonstrate how to identify these methods in Assembly when reverse engineering an application. | |
| | | | |
projectf.io
|
|
| | | This RISC-V assembler post begins by examining the RISC-V jump instructions: jal and jalr. Jump instructions are the basis of functions, so we'll then dig into function calls, the RISC-V ABI, calling convention, and how to use the stack. | ||