Explore >> Select a destination


You are here

www.da.vidbuchanan.co.uk
| | cocomelonc.github.io
1.4 parsecs away

Travel
| | [AI summary] The provided text discusses the development of a payload using a custom encryption method, likely based on the Skipjack algorithm, to evade detection by antivirus systems. It outlines the steps to compile and run the payload on a Windows machine, and mentions that the code is intended for educational purposes only. The text also references the Clipper chip initiative and highlights the importance of awareness for cybersecurity professionals.
| | goggleheadedhacker.com
1.6 parsecs away

Travel
| | This tutorial will show how two methods of implementing the AES algorithm work. It will also demonstrate how to identify these methods in Assembly when reverse engineering an application.
| | github.com
2.2 parsecs away

Travel
| | ?? Assembly with Linux (Notes, Syscalls, Protection Rings) ?? - IDouble/NASM-Assembly-Linux-Notes
| | pboyd.io
18.0 parsecs away

Travel
| Here's a fun list to look through: Dumb Password Rules. Most of the rules seem arbitrary, like only allowing digits, but some hint at deeper problems. For instance, preventing single-quotes. They aren't inserting passwords into a database without a SQL placeholder, right? Nearly every site on that list has a needlessly short maximum password size. If they're storing passwords correctly, there's no need for this. This post will go through a few bad ways to store a password and you can see what I mean....