bOt@zerobytes.monsterM · 1 year agoRizin release v0.6.1plus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkRizin release v0.6.1plus-squaregithub.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoLearn Reverse Engineeringplus-squaretii.laexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLearn Reverse Engineeringplus-squaretii.labOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoWriting a book on x86/64 Assembly programming. Updateplus-squarewww.reddit.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWriting a book on x86/64 Assembly programming. Updateplus-squarewww.reddit.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoIf you learn reverse engineering,anything is open source,is it true?plus-squareyoutu.beexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkIf you learn reverse engineering,anything is open source,is it true?plus-squareyoutu.bebOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoCheatsheet for understanding Branch and Jump Tables in C and x86 assembly. Branch Tables handle jumps within a subroutine, while Jump Tables facilitate dynamic subroutine calls. Examples and step-...plus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCheatsheet for understanding Branch and Jump Tables in C and x86 assembly. Branch Tables handle jumps within a subroutine, while Jump Tables facilitate dynamic subroutine calls. Examples and step-...plus-squaregithub.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoMLIR: ControlFlow to SCF (Structured Control Flow) lifting passplus-squarereviews.llvm.orgexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMLIR: ControlFlow to SCF (Structured Control Flow) lifting passplus-squarereviews.llvm.orgbOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoUnderground Ransomware deployed by Storm-0978 that exploited CVE-2023-36884plus-squareresources.securityscorecard.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkUnderground Ransomware deployed by Storm-0978 that exploited CVE-2023-36884plus-squareresources.securityscorecard.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year ago/r/ReverseEngineering's Weekly Questions Threadplus-squaremessage-squaremessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1message-square/r/ReverseEngineering's Weekly Questions Threadplus-squarebOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoWin32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developersplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkWin32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developersplus-squaregithub.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoMy Favorite Things: Hardware Hacking and Reverse Engineeringplus-squareeclypsium.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkMy Favorite Things: Hardware Hacking and Reverse Engineeringplus-squareeclypsium.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoCracking DesignWare's The Grammar Examiner on the C64plus-squareoldvcr.blogspot.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkCracking DesignWare's The Grammar Examiner on the C64plus-squareoldvcr.blogspot.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoTracing the roots of the 8086 instruction set to the Datapoint 2200 minicomputerplus-squarewww.righto.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkTracing the roots of the 8086 instruction set to the Datapoint 2200 minicomputerplus-squarewww.righto.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoSo I started decompiling LEGO Island... -- video by MattKCplus-squarewww.youtube.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkSo I started decompiling LEGO Island... -- video by MattKCplus-squarewww.youtube.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoreadexe: a program for inspecting EXE files (currently for legacy DOS/Win16 EXEs) - version 0.1 (0.1.1 is now out!)plus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkreadexe: a program for inspecting EXE files (currently for legacy DOS/Win16 EXEs) - version 0.1 (0.1.1 is now out!)plus-squaregithub.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoJTAG 'Hacking' the Original Xbox in 2023plus-squareblog.ret2.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkJTAG 'Hacking' the Original Xbox in 2023plus-squareblog.ret2.iobOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoUnveiling the Clock Fault Injection on Mocor OSplus-squareonekey.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkUnveiling the Clock Fault Injection on Mocor OSplus-squareonekey.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoLooking for feedback on my Game Hacking Course (it's free), mostly regarding content and how I explain concepts. If you are completely new please let me know if you understood the explanations and...plus-squarewww.udemy.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkLooking for feedback on my Game Hacking Course (it's free), mostly regarding content and how I explain concepts. If you are completely new please let me know if you understood the explanations and...plus-squarewww.udemy.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoGithub - ZygiskFrida: Injecting frida gadget via Zygiskplus-squaregithub.comexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkGithub - ZygiskFrida: Injecting frida gadget via Zygiskplus-squaregithub.combOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 1 year agoVulnerability Uncovered in Salesforce’s Email Services Exploited for Phishing Facebook Accounts In-The-Wildplus-squarelabs.guard.ioexternal-linkmessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1external-linkVulnerability Uncovered in Salesforce’s Email Services Exploited for Phishing Facebook Accounts In-The-Wildplus-squarelabs.guard.iobOt@zerobytes.monsterM · 1 year agomessage-square0fedilink
bOt@zerobytes.monsterM · 8 months agoBusiness casualplus-squarei.redd.itimagemessage-square0fedilinkarrow-up11arrow-down10
arrow-up11arrow-down1imageBusiness casualplus-squarei.redd.itbOt@zerobytes.monsterM · 8 months agomessage-square0fedilink