0.D.
(Move to ...)
Home
▼
Sunday, April 16, 2023
A Guide to Multi-Level Pointer Analysis
›
A Comprehensive Guide to Multi-Level Pointer Analysis A regular pointer points to only one address, but when it's accompanied by a l...
Finding the Module Base Address in C++ for Malware Analysis
›
dododododo inspect the process dodododo hoohoo dododododo inspect the process dododododo.. hoohoo ...🎜♫♫ When analyzing malware, it's...
Saturday, April 15, 2023
Strings, Strang, Strung, Unicode, Shmoonicode, ASCII - The Wonderful Life of Strings
›
Stringssssssssss Thy Precious' Intro Strings are fascinating entities in the world of programming. For C# and Java programmers, they ...
Unicode and Windows: A Toxic Love Story
›
Intro Unicode string support in Windows is a topic that has intrigued many developers over the years. When Microsoft was tasked with dev...
Thursday, April 13, 2023
Kernel32.dll: Understanding Windows Kernel Functions - Rootkits and More!
›
Overview Kernel32.dll is a system library file that contains various functions used by Windows programs. It serves as a bridge between sof...
NT.DLL and Its Role in Security Research: A Comprehensive Guide
›
NT.DLL and Its Role in Security Research: A Comprehensive Guide Are you a security researcher looking to find vulnerabilities or weakn...
Wednesday, April 12, 2023
Reverse Engineering Notes - Windows API
›
Introduction The Windows API (Application Programming Interface) is a collection of functions and resources that are available to soft...
›
Home
View web version