Hide VM from Detection
How to hide the virtual machine from detection.
rev-eng
malware
Build my own CPU
The best way to know how something works is to create it.
c
hardware
Differences between BIOS/UEFI
Behind your OS, kernel and motherboard, there is MORE SOFTWARE!
Understanding Bootloaders
Beyond the booting up of a computer system
How to Pentest
A Comprehensive Guide to Penetration Testing Commands.
hacking
Understanding ASM
Beyond the basics of Assembly Language
assembly
asm
The Minecraft protocol
A deep dive into the Minecraft protocol and networking stack.
minecraft
networking
Proc Memory hacking
Reading and writing to the memory of an arbitrary process with Rust.
rust
hacking
bc1q4uzvtx6nsgt7pt7678p9rqel4hkhskpxvck8uq
0x7a70a0C1889A9956460c3c9DCa8169F25Bb098af
7UcE4PzrHoGqFKHyVgsme6CdRSECCZAoWipsHntu5rZx