Explore >> Select a destination


You are here

x0rb3l.github.io
| | gpfault.net
3.0 parsecs away

Travel
| | [AI summary] The provided text is a detailed explanation of how to write a simple 64-bit Windows application in assembly language that calls the ExitProcess function from the KERNEL32.DLL library. It covers the following key topics: 1. **Memory and Register Basics**: Explains how memory and registers work in 64-bit Windows, including the use of the stack pointer (RSP), registers like RCX, RDX, R8, and R9 for passing arguments, and the importance of stack alignment for performance. 2. **Calling Conventions**: Details the 64-bit Windows calling convention, including how the first four integer or pointer arguments are passed in registers (RCX, RDX, R8, R9), how additional arguments are passed on the stack, and the requirement for the stack to be aligned to ...
| | oldboy21.github.io
6.4 parsecs away

Travel
| | Ciao World, since I can't get enough of playing around with the Reflective DLL that inspired the very first blog during the Christmas Holiday, after the YOLO Loader I decided to grant the little nasty DLL a new super-power: Indirect syscalls So what I will be addressing here is: Indirect syscall: why and (mostly) references SSN enum and PIC challenges 1 tb of MASM Disclaimer I write code and implement techniques for research and learning purposes only.
| | syprog.blogspot.com
5.2 parsecs away

Travel
| | Source code for this article may be found here . The problem of software security has already been raised in my previous articles more ...
| | blog.darkwolfsolutions.com
25.4 parsecs away

Travel
| September 26, 2024 Episode 15 CVE-2024-45623: Unauthenticated RCE in D-Link DAP-2310 Authors: Hahna Kane Latonick and Jonathan Waterman Dark Wolf Solutions recently disclosed a vulnerability to D-Link that results in unauthenticated remote code execution (RCE) in their DAP-2310 REV-A Wireless