You are here |
www.da.vidbuchanan.co.uk | ||
| | | |
tcode2k16.github.io
|
|
| | | | a random blog about cybersecurity and programming | |
| | | |
goggleheadedhacker.com
|
|
| | | | This tutorial will show how two methods of implementing the AES algorithm work. It will also demonstrate how to identify these methods in Assembly when reverse engineering an application. | |
| | | |
blog.pkh.me
|
|
| | | | ||
| | | |
iosoft.blog
|
|
| | In a previous post, I described 'EDLA', a WiFi-based logic analyser unit, that uses a Web-based display. That version used an ESP32 to provide WiFi connectivity; the PEDLA uses a Pi PicoW module instead. Hardware PEDLA circuit board The hardware is similar to the previous version; aside from the CPU change, the main addition is... |