0.D.

▼
Sunday, April 16, 2023

A Guide to Multi-Level Pointer Analysis

›
  A Comprehensive Guide to Multi-Level Pointer Analysis   A regular pointer points to only one address, but when it's accompanied by a l...

Finding the Module Base Address in C++ for Malware Analysis

›
  dododododo inspect the process dodododo hoohoo dododododo inspect the process dododododo.. hoohoo ...🎜♫♫ When analyzing malware, it's...
Saturday, April 15, 2023

Strings, Strang, Strung, Unicode, Shmoonicode, ASCII - The Wonderful Life of Strings

›
 Stringssssssssss Thy Precious'   Intro Strings are fascinating entities in the world of programming. For C# and Java programmers, they ...

Unicode and Windows: A Toxic Love Story

›
    Intro Unicode string support in Windows is a topic that has intrigued many developers over the years. When Microsoft was tasked with dev...
Thursday, April 13, 2023

Kernel32.dll: Understanding Windows Kernel Functions - Rootkits and More!

›
  Overview Kernel32.dll is a system library file that contains various functions used by Windows programs. It serves as a bridge between sof...

NT.DLL and Its Role in Security Research: A Comprehensive Guide

›
  NT.DLL and Its Role in Security Research: A Comprehensive Guide     Are you a security researcher looking to find vulnerabilities or weakn...
Wednesday, April 12, 2023

Reverse Engineering Notes - Windows API

›
      Introduction The Windows API (Application Programming Interface) is a collection of functions and resources that are available to soft...
›
Home
View web version

About Me

intro
-intro
View my complete profile
Powered by Blogger.