Moving artificial intelligence to the cloud
2 notes
·
View notes
Experimenting with Wake-on-LAN
0 notes
Ready for some nights of automated exploitation
1 note
·
View note
Centralizing code bits
0 notes
Deploying an automated bufferoverflow detector
0 notes
Ready for some reverse engineering
0 notes
Extracting instructions and register values with PIN
0 notes
Building a virtual stack simulation #Reverse #Engineering #Coding #Exploitation #Hacking
0 notes
Reversing engineering program input step by step #Reverse #Engineering #Automated #Exploitation #Hacking
0 notes
Tracing the argc parameter #Automated #Exploitation #Buffer #Overflow #Coding #ArtificialIntelligence
0 notes
Adding more layers of context #Debugging #Low #Level #Coding #ArtificialIntelligence #Hacking
0 notes
Finding new paths for exploitation #Coding #Exploitation #Windows #API #ArtificialIntelligence #Exploration
0 notes
Looking at the invisible side of code #Hidden #Side #Coding #Kernel #Debugging
0 notes
Kernel mode debugging #Low #Level #Debugging #Kernel #Mode #Coding #ArtificialIntelligence
0 notes
The glorious wine of all #Resting #Gold #Wine #Reflection #Thoughts
0 notes
Injecting a dll into a process #Windows #API #Call #Hook #Coding #Hacking
0 notes
Building a taint engine #Instrumentation #Symbolic #Execution#Exploitation
0 notes