Aditya KrishnanforAditya Krishnan's Bloggetschwfty.hashnode.net·Feb 5, 2023Video Editors & Timeline Filmstrips - Part 2In my last blog, I explained the need for filmstrips and how to create them. But that was just the tip of the iceberg. Professional video editors have complex use cases on the timeline and a filmstrip falls under that. A timeline can zoom, a layer ca...Discuss·50 likes·67 readsIn The DepthsWeb Development
Ononiwu IfeanyiforWisdom Blogswisdomblogs.hashnode.net·Nov 25, 2022Solve Crackmes Without Knowledge of AssemblyHello, dear reader. This is my first post on this blog and I wanted to use it to explain something that bugged me for a while. At ALX-Holberton, we had some optional tasks which involved cracking the passwords to compiled programs. We were told we co...Discuss·1 like·483 reads#crackme
Sudip SenguptaforSudip's Blog on Cloud, DevOps, Cybersecurity and ITSMssengupta3.hashnode.net·Apr 21, 2023Reverse Engineering Malware: Techniques And Tools For Analyzing And Dissecting Malicious SoftwareCybercriminals commonly employ malicious programs to obtain unauthorized system access, exfiltrate sensitive information, or disrupt essential services. In order to defend against these threats, cybersecurity professionals use various approaches to a...Discuss·1 likemalware analysis
Sudip SenguptaforSudip's Blog on Cloud, DevOps, Cybersecurity and ITSMssengupta3.hashnode.net·Apr 21, 2023Reverse Engineering Malware: Techniques And Tools For Analyzing And Dissecting Malicious SoftwareCybercriminals commonly employ malicious programs to obtain unauthorized system access, exfiltrate sensitive information, or disrupt essential services. In order to defend against these threats, cybersecurity professionals use various approaches to a...Discuss·1 likemalware analysis
prg skids forPRG "Hackers"trgskids.hashnode.net·Apr 3, 2023Uncovering Self-Proclaimed Korean Hackers' Use of Social Engineering and Fake 0-Days to Hack "Researchers"Informed by T1G I was enjoying my morning when I was prompted by T1G (alias) regarding a self-proclaimed Korean hacking group that managed to hack a "Security Researcher" in February. While I was not overly interested, I was curious about what had ha...Discuss·114 readskorea
ReaminatedforReaminated's Blogreaminated-1680439082603.hashnode.net·Apr 2, 2023Transform Your Viewing Experience: How to Create an Immersive Ambient Monitor with Simple LED Lights and Code Magichttps://youtu.be/az-va7ofef8 Introduction For those not familiar with Ambient TVs, it’s a way to soften the jump from the edge of the TV screen and its immediate surroundings to provide a more immersive experience. I had some LED lights lying aroun...Discuss·121 readsPython
Aditya KrishnanforAditya Krishnan's Bloggetschwfty.hashnode.net·Feb 5, 2023Video Editors & Timeline Filmstrips - Part 2In my last blog, I explained the need for filmstrips and how to create them. But that was just the tip of the iceberg. Professional video editors have complex use cases on the timeline and a filmstrip falls under that. A timeline can zoom, a layer ca...Discuss·50 likes·67 readsIn The DepthsWeb Development
Karthikeyan SubramaniamforCMU Bomb's Lab Walkthroughtechiekarthik.hashnode.net·Jan 19, 2023CMU BombLab WalkthroughIntroduction CMU Bomblab is a Reverse Engineering challenge. Students are provided with Binary which has six phases(six challenges to solve). BombLab provides the main() code of the Binary. Let us take a look at the main function below int main(int a...Discuss·510 readsreverse engineering
shafouzforshafouz.hashnode.net·Jan 11, 2023Solving pwnable's - orw - 2/???https://pwnable.tw The challenge description says: Only open read write syscalls are allowed to use. But is that enforced? How? Seccomp Taking a look using the ghidra decompiler: void orw_seccomp(void) { int iVar1; undefined4 *puVar2; undefined...Discuss·47 readsWrite Up
Sam RussellforLODSBsamrussell.hashnode.net·Jan 3, 2023Bypassing app protection using proxy DLLsI've been modding some games on Steam recently, and some of them make use of the Steamworks product to add an extra layer of security, as well as adding other features such as the overlay and cloud saves. This isn't an article on how Steam DRM and St...Discuss·1.9K readsreverse engineering
Liaichi_MustaphaforLiaichi's Blogit-lounge.hashnode.net·Dec 25, 2022Web Scraping 101 -> P1What's Web Scraping? Web scraping is a process of extracting data from websites. It involves making HTTP requests to a website's server to retrieve the HTML or XML source code and then parsing that code to extract the data of interest. Web scraping c...Discuss·35 readsPython
Malcolm MikaZukiforMalcolm MikaZuki's blogmikacodez.hashnode.net·Dec 19, 2022What is Reverse Email Lookup and How to Use it EffectivelyHow has everyone been lately? I hope you are all doing well out there. Today's topic will be about the Simple methods in which Reverse Email Lookup can be utilised. First of all, what exactly is Reverse Email Lookup? It is first of all, the process i...Discuss#Marketing strategy
Simon DiehmforSimon Diehmsimondiehm.hashnode.net·Nov 30, 2022Reverse engineering file share shortcut processUpon starting a new role in a new team at a new company, one of the IT processes that was not fully understood by existing staff was how desktop shortcuts to file shares were created on user's desktops. Here is a rundown of my process to "reverse eng...Discuss·46 readsreverse engineering