#hacking
Read more stories on Hashnode
Articles with this tag
Introduction · Abstract Human Interface Devices attacks are as powerful as disregarded. In this article, we'll define the foundations of this family of...
MacOS Shellcode Primer #4 · Abstract In this series of articles, I am analysing the pieces of shellcode written by Odzhan on the page Shellcode: Mac OSX...
MacOS Shellcode Primer #3 · Abstract In this series of articles, I am analysing the pieces of shellcode written by Odzhan on the page Shellcode: Mac OSX...
MacOS Shellcode Primer #2 · Abstract In this series of articles, I am analysing the pieces of shellcode written by Odzhan on the page Shellcode: Mac OSX...
MacOS Shellcode Primer #1 · Abstract In this series of articles, I am analysing the pieces of shellcode written by Odzhan on the page Shellcode: Mac OSX...
Binary Analysis 101 · Abstract In the previous article (MachO Binary Analysis with objdump), we have followed step-by-step the compilation of an...