Forwarded from GOJO
๐ง๐ต๐ฒ ๐น๐ฒ๐ด๐ฒ๐ป๐ฑ ๐ผ๐ณ "๐
๐ด๐ฒ ๐๐ฃ๐จ๐ ๐ฑ๐ฒ๐ฐ๐ผ๐ฑ๐ฒ ๐ถ๐ป๐๐๐ฟ๐๐ฐ๐๐ถ๐ผ๐ป๐ ๐ถ๐ป๐๐ผ ๐ฅ๐๐ฆ๐ ๐ณ๐ผ๐ฟ๐บ ๐ถ๐ป๐๐ฒ๐ฟ๐ป๐ฎ๐น๐น๐"
Link ๐:-
https://fanael.github.io/is-x86-risc-internally.html
Link ๐:-
https://fanael.github.io/is-x86-risc-internally.html
fanael.github.io
The legend of "x86 CPUs decode instructions into RISC form internally" - Fanael's random ruminations
A dive into what x86 instruction are decoded into various processors, to determine the truth of the idea that they're just RISC-like internally.
โคโ๐ฅ2
Forwarded from epic links / resources (โ โ Arcana of Sin and Misfortune)
โคโ๐ฅ1
Forwarded from Mr T0nY ฮป
EXPLOIT DEVELOPMENT.
๐โ ๏ธ
๐ Part 1 : Intro :-
https://0xninjacyclone.github.io/posts/exploitdev_1_intro/
๐ Part 2 : Understanding Stack Memory :-
https://0xninjacyclone.github.io/posts/exploitdev_2_stack/
๐ Part 3 : Understanding Heap Memory :-
https://0xninjacyclone.github.io/posts/exploitdev_3_heap/
๐ Part 4 : Understanding Binary Files :-
https://0xninjacyclone.github.io/posts/exploitdev_4_binfiles/
๐ Part 5 : Dealing with Windows PE files programmatically :-
https://0xninjacyclone.github.io/posts/exploitdev_5_winpe/
๐ Part 6 : Dealing with ELF files programmatically :-
https://0xninjacyclone.github.io/posts/exploitdev_6_elf/
๐ Part 7 : How to do magic with string format bugs :-
https://0xninjacyclone.github.io/posts/exploitdev_7_strfmt/
๐ Part 8 : Buffer Over-Read Attacks and Developing a Real Exploit :-
https://0xninjacyclone.github.io/posts/exploitdev_8_bor/
๐โ ๏ธ
๐ Part 1 : Intro :-
https://0xninjacyclone.github.io/posts/exploitdev_1_intro/
๐ Part 2 : Understanding Stack Memory :-
https://0xninjacyclone.github.io/posts/exploitdev_2_stack/
๐ Part 3 : Understanding Heap Memory :-
https://0xninjacyclone.github.io/posts/exploitdev_3_heap/
๐ Part 4 : Understanding Binary Files :-
https://0xninjacyclone.github.io/posts/exploitdev_4_binfiles/
๐ Part 5 : Dealing with Windows PE files programmatically :-
https://0xninjacyclone.github.io/posts/exploitdev_5_winpe/
๐ Part 6 : Dealing with ELF files programmatically :-
https://0xninjacyclone.github.io/posts/exploitdev_6_elf/
๐ Part 7 : How to do magic with string format bugs :-
https://0xninjacyclone.github.io/posts/exploitdev_7_strfmt/
๐ Part 8 : Buffer Over-Read Attacks and Developing a Real Exploit :-
https://0xninjacyclone.github.io/posts/exploitdev_8_bor/
โคโ๐ฅ2
As compsci nerds, I think it wise do notetaking of our nerd knowledge.
Yeah, notetaking is not simple shit to done and can grow monstrously complex, I found a quite unique yet simple way for that (I not affliate with them, I just care about sharing).
https://johnnydecimal.com
https://lucaf.eu/2023/02/23/luca-decimal.html
https://github.com/lucafrance/luca-decimal
You can do this with Obsidian, Spreadsheet, or just (mkdir, cd, touch, vim) with terminal.
There are two system but almost no difference, rec start with Johnny Dec, Luca Dec if you dislike Johnny Dec.
Yeah, notetaking is not simple shit to done and can grow monstrously complex, I found a quite unique yet simple way for that (I not affliate with them, I just care about sharing).
https://johnnydecimal.com
https://lucaf.eu/2023/02/23/luca-decimal.html
https://github.com/lucafrance/luca-decimal
You can do this with Obsidian, Spreadsheet, or just (mkdir, cd, touch, vim) with terminal.
There are two system but almost no difference, rec start with Johnny Dec, Luca Dec if you dislike Johnny Dec.
Johnnydecimal
A system to organise your life
Johnny.Decimal is a system to organise your life. Find things, quickly, with more confidence, and less stress. It's free to use and the concepts are the same at home or work.
โ8โคโ๐ฅ1๐ด1
https://www.leviathansecurity.com/blog/tunnelvision
Beside speaking about vulnerability, they have good explanation about basic computer network.
Beside speaking about vulnerability, they have good explanation about basic computer network.
Leviathan Security Group - Penetration Testing, Security Assessment, Risk Advisory
CVE-2024-3661: TunnelVision - How Attackers Can Decloak Routing-Based VPNs For a Total VPN Leak โ Leviathan Security Group - Penetrationโฆ
We discovered a fundamental design problem in VPNs and we're calling it TunnelVision. This problem lets someone see what you're doing online, even if you think you're safely using a VPN.
Search for Easier Safe Systems Programming
https://www.sophiajt.com/search-for-easier-safe-systems-programming/
https://www.sophiajt.com/search-for-easier-safe-systems-programming/
๐1
Forwarded from Zer0Day Lab
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Zer0Day Lab
Please open Telegram to view this post
VIEW IN TELEGRAM
Natural Language Processing Course
https://www.cs.utexas.edu/~gdurrett/courses/online-course/materials.html
https://www.cs.utexas.edu/~gdurrett/courses/online-course/materials.html