|
You are here |
yurisk.info | ||
| | | | |
cocomelonc.github.io
|
|
| | | | | [AI summary] A technical blog post demonstrates how to create a custom implementation of the WinAPI GetModuleHandle function to evade antivirus detection in malware, including code examples for PEB manipulation and string encryption. | |
| | | | |
blog.dornea.nu
|
|
| | | | | [AI summary] The blog post discusses the process of creating and executing a shellcode in C to read a file named 'flag.txt' and dump its content, including assembly code, compilation steps, and execution considerations. | |
| | | | |
idea.popcount.org
|
|
| | | | | [AI summary] The article discusses SipHash, a new cryptographic hash function designed to prevent hash flooding attacks, with examples of its implementation in Python and C. | |
| | | | |
o5wald.github.io
|
|
| | | [AI summary] This tutorial explains how to build a basic client-server chat room using Python sockets and threading. | ||