SecTemple: hacking, threat hunting, pentesting y Ciberseguridad
▼
Showing posts with label assembly. Show all posts
Showing posts with label assembly. Show all posts

Anatomy of a Fork Bomb: Understanding and Defending Against Infinite Recursion Attacks

›
The flickering cursor on the terminal, a silent sentinel in the dead of night. Then, the cascade. A few characters, innocent-looking in th...

Anatomy of a Pointer: A Reverse Engineer's Defensive Guide to Assembly Memory Management

›
The digital realm is built on layers. At its foundation, raw memory, a chaotic expanse waiting for order. Pointers. They are the architect...
›
Home
View web version
Powered by Blogger.