 
      
    | You are here | mem2019.github.io | ||
| | | | | goggleheadedhacker.com | |
| | | | | This tutorial will show how two methods of implementing the AES algorithm work. It will also demonstrate how to identify these methods in Assembly when reverse engineering an application. | |
| | | | | 0x434b.dev | |
| | | | | This is a write-up for solving the devils-swapper RE challenge.?? It was mostly intended for my personal archive, but since it may be interesting to all of you. This especially applies if you're still rather new to the whole RE world, as the write-up turned out to be quite verbose. | |
| | | | | tcode2k16.github.io | |
| | | | | a random blog about cybersecurity and programming | |
| | | | | peteris.rocks | |
| | | Explanation of everything you can see in htop/top on Linux | ||