|
You are here |
blog.pkh.me | ||
| | | | |
goggleheadedhacker.com
|
|
| | | | | This tutorial will show how two methods of implementing the AES algorithm work. It will also demonstrate how to identify these methods in Assembly when reverse engineering an application. | |
| | | | |
int10h.org
|
|
| | | | | Font: DOS/V re. JPN30, from the world's biggest collection of classic text mode fonts, system fonts and BIOS fonts from DOS-era IBM PCs and compatibles | |
| | | | |
github.com
|
|
| | | | | ?? Assembly with Linux (Notes, Syscalls, Protection Rings) ?? - IDouble/NASM-Assembly-Linux-Notes | |
| | | | |
gist.github.com
|
|
| | | Speed-up secp256k1 by using endomorphism https://paulmillr.com/posts/noble-secp256k1-fast-ecc/ - explanation-simple.md | ||