|
You are here |
shellsharks.com | ||
| | | | |
www.timdbg.com
|
|
| | | | | [AI summary] This article provides an introduction to reading x86 assembly language, emphasizing its importance for understanding how programs operate at a fundamental level. It covers the basics of assembly syntax, common instructions, and practical tools for reading and analyzing assembly code. The author explains that while assembly is often viewed as complex, it's actually more approachable than many believe, especially for debugging and reverse engineering tasks. The article also highlights the differences between Intel and AT&T syntax, the structure of assembly instructions, and the role of registers and memory addressing in x86 architecture. | |
| | | | |
www.nayuki.io
|
|
| | | | | [AI summary] The user has provided a comprehensive overview of the x86 architecture, covering topics such as basic arithmetic operations, control flow with jumps and conditionals, memory addressing modes, the stack and calling conventions, advanced instructions like SSE, virtual memory, and differences between x86-32 and x86-64. The user is likely looking for a summary or clarification of the x86 architecture, possibly for learning purposes or to reinforce their understanding. | |
| | | | |
0x44.cc
|
|
| | | | | [AI summary] The article provides an in-depth explanation of reverse engineering concepts, including CPU operations, memory representation, data structures, and disassembly techniques. It guides readers through understanding machine code, endianness, signed integers, and how to analyze C code using tools like Visual Studio and disassemblers. | |
| | | | |
www.andreinc.net
|
|
| | | Writing a simple VM for LC3 in less than 125 lines of C | ||