Explore >> Select a destination


You are here

yurisk.info
| | cocomelonc.github.io
4.3 parsecs away

Travel
| | [AI summary] A technical blog post demonstrates how to create a custom implementation of the WinAPI GetModuleHandle function to evade antivirus detection in malware, including code examples for PEB manipulation and string encryption.
| | blog.dornea.nu
4.0 parsecs away

Travel
| | [AI summary] The blog post discusses the process of creating and executing a shellcode in C to read a file named 'flag.txt' and dump its content, including assembly code, compilation steps, and execution considerations.
| | idea.popcount.org
3.2 parsecs away

Travel
| | [AI summary] The article discusses SipHash, a new cryptographic hash function designed to prevent hash flooding attacks, with examples of its implementation in Python and C.
| | o5wald.github.io
20.6 parsecs away

Travel
| [AI summary] This tutorial explains how to build a basic client-server chat room using Python sockets and threading.