Don't wanna be here? Send us removal request.
Photo
Moving artificial intelligence to the cloud
2 notes
·
View notes
Photo
Experimenting with Wake-on-LAN
0 notes
Photo

Ready for some nights of automated exploitation
1 note
·
View note
Photo
Centralizing code bits
0 notes
Photo

Deploying an automated bufferoverflow detector
0 notes
Photo

Ready for some reverse engineering
0 notes
Video
tumblr
Extracting instructions and register values with PIN
0 notes
Photo
Building a virtual stack simulation #Reverse #Engineering #Coding #Exploitation #Hacking
0 notes
Photo
Reversing engineering program input step by step #Reverse #Engineering #Automated #Exploitation #Hacking
0 notes
Photo
Tracing the argc parameter #Automated #Exploitation #Buffer #Overflow #Coding #ArtificialIntelligence
0 notes
Photo
Adding more layers of context #Debugging #Low #Level #Coding #ArtificialIntelligence #Hacking
0 notes
Photo
Finding new paths for exploitation #Coding #Exploitation #Windows #API #ArtificialIntelligence #Exploration
0 notes
Photo
Looking at the invisible side of code #Hidden #Side #Coding #Kernel #Debugging
0 notes
Photo
Kernel mode debugging #Low #Level #Debugging #Kernel #Mode #Coding #ArtificialIntelligence
0 notes
Photo

The glorious wine of all #Resting #Gold #Wine #Reflection #Thoughts
0 notes
Video
tumblr
Injecting a dll into a process #Windows #API #Call #Hook #Coding #Hacking
0 notes
Video
tumblr
Building a taint engine #Instrumentation #Symbolic #Execution#Exploitation
0 notes