|
You are here |
ref.x86asm.net | ||
| | | | |
www.c64os.com
|
|
| | | | | [AI summary] The provided text is a detailed technical documentation on the 6502 microprocessor, focusing on its instruction set, addressing modes, and memory operations. It includes information on various assembly instructions, their opcodes, addressing modes, and effects on the processor flags. The document also mentions the C64 OS project and its development, along with some promotional content for the platform. | |
| | | | |
gpfault.net
|
|
| | | | | [AI summary] The text provides an in-depth exploration of various x86-64 instruction set architectures, focusing on arithmetic operations (ADD, SUB, MUL, SMUL, DIV, SDIV), logical operations (AND, OR, XOR, NOT), and control flow instructions. It details the implementation of these instructions in the QBX virtual machine, emphasizing how they emulate real x86-64 instructions while managing the flags register and handling different operand sizes (8-bit and 16-bit). The text also discusses the nuances of flag handling, register operations, and macro-based code generation to streamline instruction implementation. | |
| | | | |
www.felixcloutier.com
|
|
| | | | | [AI summary] The provided text is a comprehensive list of CPU instructions from various architectures, including x86, AVX, SSE, and others. It includes instructions for arithmetic operations, data movement, control flow, and specialized functions like floating-point calculations and vector operations. However, the list appears to be unverified and incomplete, possibly containing errors or missing entries. | |
| | | | |
www.malwaretech.com
|
|
| | | One of the most common questions I'm asked is "what programming language(s) should I learn to get into malware analysis/reverse engineering", to answer this question I'm going to write about the top 3 languages which I've personally found most useful. I'll focus on native malware (malware which does not require a framework such as Java, Python, or .NET to run), as this is the most common type and understanding it it will provide you the skills required to pivot into other kinds. In this article I won't b... | ||