Telaga Biru Buku Online

'Filter' kepada Kejahilan, 'Ubat' kepada Hati, 'Makanan' kepada Minda

▼
Sunday, January 28, 2024

How Do I Get Started With Bug Bounty ?

›
How do I get started with bug bounty hunting? How do I improve my skills? These are some simple steps that every bug bounty hunter can ...

Malware Arsenal Used By Ember Bear (Aka UAC-0056,Saint Bear, UNC2589, Lorec53, TA471, Nodaria, Nascent Ursa, LorecBear, Bleeding Bear, And DEV-0586) In Attacks Targeting Ukraine (Samples)

›

DMitry: Deepmagic Information Gathering Tool

›
"DMitry (Deepmagic Information Gathering Tool) is a UNIX/(GNU)Linux Command Line Application coded in C. DMitry has the ability to gat...
Saturday, January 27, 2024

Reversing Pascal String Object

›
There are many goodware and malware developed in pascal, and we will see that the binary generated by the pascal compilers is fascinating, n...

Mojo Vs Rust, Basic Test And Binary Perspective.

›
Hello, In first place I'm not going to do an algorithmic benchmark, just a simple loop + print test and some checks on the generated bin...
›
Home
View web version
Powered by Blogger.