Creating and sharing actual malware code, including assembly snippets that demonstrate how to use Windows API calls for malicious purposes such as...
Browse Posts by Category
Reverse Engineering_
A technical deep dive into Reverse Engineering, covering topics like malware decompilation, assembly language, calling conventions, and cybersecurity tools across different platforms and architectures.
Reverse Engineering #5 – C++ Calls on Mac OS X ARM 64 | Default Calling Convention
In the dynamic and frequently contested world of cybersecurity, proficiency in reverse engineering is a vital ability, essential for comprehending...
Reverse Engineering #4 – C++ Calling Convention in MAC OS X Intel 64-Bits
In the ever-changing and often competitive realm of cybersecurity, mastering reverse engineering is a crucial skill, indispensable for understanding...
Reverse Engineering #3 – C++ Calling Convention on Windows x64
In the fluctuating and frequently competitive world of cyber security, the ability to reverse engineer is an essential skill, vital for...
Reverse Engineering #2 – Default Calling Convention in C++ & Rust on Linux x64
In the dynamic and often adversarial realm of cyber defense, reverse engineering stands as a fundamental skill set, crucial for understanding and...
Reverse Engineering #1 – Arithmetic Operations in C++ & Rust on Linux
Today, it is not very common to meet programmers working in assembly language (also called assembler language) because high-level languages are much...





