@z3r01k Profile picture

z3r0xk.dll 🇵🇸

@z3r01k

ودِدْتُ أنِّي نَجَوْتُ منها كَفَافًا، لا لي ولَا عَلَيَّ

Similar User
Mohamed Fodil photo

@_public_void

a7madn1 photo

@a7mad__n1

Abdelrhman Amin🇵🇸 photo

@0xUchihamrx

0xRAYAN photo

@0xRAYAN7

Vedavyasan S photo

@ved4vyasan

foysal_joy photo

@Error_foysal

Godfather Orwa 🇯🇴 photo

@GodfatherOrwa

ℤ𝔼ℝ𝟘 photo

@_Zer0Sec_

mhmd berro (badcracker) photo

@badcrack3r

Abdelrhman Allam 🇵🇸 photo

@sl4x0

Fares photo

@_2os5

Bug X Hunter 💻 photo

@Bug_X_hunter

Sourav Khan🇧🇩 🇵🇸 photo

@Br0k3n_1337

encodedguy - jsmon.sh photo

@3nc0d3dGuY

Rahmat Qurishi photo

@RahmatQurishi

z3r0xk.dll 🇵🇸 Reposted

بمناسبة الاخت نضال دودة الكتب الشقية "طريقة قراءة الكتب هى التى تخرج العلماء و أنصاف العلماء و أشباه العلماء" -دكتور محمد أبو موسى


z3r0xk.dll 🇵🇸 Reposted

- أبو حامد الغزالي.

Tweet Image 1

z3r0xk.dll 🇵🇸 Reposted

It is one of the best sites to improve your reverse engineering skills. Site Link: crackmes.one Reverse Engineering Toolkit: github.com/mohitmishra786…

Tweet Image 1

z3r0xk.dll 🇵🇸 Reposted

From Code to Execution: The Journey of a C/C++ Program Compilation Mini-Book On ELF Executables: github.com/mohitmishra786… This flow illustrates the transformation of high-level language source code into an executable program, highlighting the roles of preprocessing, compilation,…

Tweet Image 1

z3r0xk.dll 🇵🇸 Reposted

z3r0xk.dll 🇵🇸 Reposted

z3r0xk.dll 🇵🇸 Reposted

Exploit Development (Format Strings Series 1 - 6 which covers : Intro & dumping sensitive data Redirecting code flow More control over the writing process Rewriting the GOT table Memory leak + ASLR bypass x86 exploitation : youtube.com/playlist?list=… credits @0x4ndr3


z3r0xk.dll 🇵🇸 Reposted

Linux (x86) Exploit Development Series : sploitfun.wordpress.com/2015/06/26/lin… A-1 ) Classic Stack Based Buffer Overflow : sploitfun.wordpress.com/2015/05/08/cla… A-2 ) Integer Overflow : sploitfun.wordpress.com/2015/06/23/int… A-3 ) Off-By-One Vulnerability (Stack Based) : sploitfun.wordpress.com/2015/06/07/off…


z3r0xk.dll 🇵🇸 Reposted

100 Days of Hacking! Day 40 #Special ⬇ ~# Exploit Development 🔥📢 - Learn Assembly Language asmtutor.com/#lesson1 - Lectures on Operating Systems cse.iitb.ac.in/~mythili/os - PWN college is organized as a set of modules covering different topics. Each module has a set of…

Tweet Image 1

z3r0xk.dll 🇵🇸 Reposted

Introduction to x64 Linux Binary Exploitation Author: Valsamaras Source: valsamaras.medium.com/introduction-t…

Tweet Image 1
Tweet Image 2
Tweet Image 3
Tweet Image 4

z3r0xk.dll 🇵🇸 Reposted

Just found the holy grail of binary exploitation and reverse engineering education. Fully browser-based and gamified, it's the best I've seen in my life. 🧵1/2👇Link

Tweet Image 1

z3r0xk.dll 🇵🇸 Reposted

انا كنت معيدة و بدرس مادة الcompilers في قسم علوم حاسب كنا بندرس الBNF و lexical analysis و Javacc و اشياء من ضمنها الgarbage collection و الmemory handling و ازاي تعمل اي layer انت عايزها فوق الكود بتاعك. الاستفادة الاولى كانت و لازالت تبقى حاسس بحتة الحديد و البلاستيك دي…

نفسي افهم ايه الاستفادة من أننا ناخد ازاي نعمل compiler معمول أصلا وناخد لغه اسمها cool 💀



z3r0xk.dll 🇵🇸 Reposted

straight to the point, no bullshit, low-level systems programming tutorials peak kino

Tweet Image 1

z3r0xk.dll 🇵🇸 Reposted

A god tier introduction to reverse engineering and a breakdown of Portable Executable image file headers and sections! Read this entire thing right now! x86re . com

Tweet Image 1
Tweet Image 2

z3r0xk.dll 🇵🇸 Reposted

Loading...

Something went wrong.


Something went wrong.