yapping
- Unauthenticated Broken Access Control in the Department of Defense [ 2026-03-24 ]
- Finding a Serial Key in a Binary and Patching It [ 2026-03-03 ]
- Multiplication and Division in x86-64 Assembly [ 2026-03-03 ]
- Bit Shifting in Assembly [ 2026-02-17 ]
- Repeatable instructions in Assembly [ 2026-02-17 ]
- Boolean Operators in Assembly [ 2026-02-15 ]
- Understanding Control Flow in x86-64 assembly [ 2026-02-12 ]
- x86-64 Assembly: Function Parameters and Calling Conventions [ 2026-02-11 ]
- How Local Variables Look in the Stack [ 2026-02-09 ]
- Understanding Function Calls in x86-64 Assembly [ 2026-01-30 ]
- The Stack Part 2: PUSH, POP, and Stack Operations [ 2026-01-28 ]
- The Stack Part 1: Stack Frames and Function calls [ 2026-01-27 ]
- What Is NOP? [ 2026-01-26 ]
- x86-64 Assembly Registers [ 2026-01-26 ]
- Understanding the Computer Memory Hierarchy [ 2026-01-23 ]
- Endianness [ 2026-01-21 ]
- Decimal, Binary, and Hexadecimal conversion: Part 2 [ 2026-01-21 ]
- Decimal, Binary, and Hexadecimal conversion [ 2026-01-20 ]
- Writing a program that monitor keystrokes [ 2026-01-19 ]
- SYBAU: You Are Not Tracking Anyone With an IP Address [ 2025-12-18 ]
- CVE-2025-10767 [ 2025-12-05 ]