Explore >> Select a destination


You are here

int10h.org
| | crocidb.com
2.8 parsecs away

Travel
| | Following my first GameBoy, the DMG, now I got a GameBoy color and replaced the buttons and gave it a clean. Also Update on my game for the platform
| | github.com
2.5 parsecs away

Travel
| | ?? Assembly with Linux (Notes, Syscalls, Protection Rings) ?? - IDouble/NASM-Assembly-Linux-Notes
| | goggleheadedhacker.com
1.6 parsecs away

Travel
| | This tutorial will show how two methods of implementing the AES algorithm work. It will also demonstrate how to identify these methods in Assembly when reverse engineering an application.
| | wsummerhill.github.io
4.0 parsecs away

Travel
| I'm going to cover an example of how to perform a DLL sideload from start to finish using a C++ payload and a legitimate DLL commonly found on disk. The specific technique covered is known as "DLL proxying" where we use the legitimate DLL along with a malicious DLL which exports all the functions that the legit DLL to execute properly.