Published inOSINT TeamExtra information on Type of MemoryThis article explores Writable Memory, Non-Writable Memory, Executable Memory, and Non-Executable Memory, clarifying each type and itsβ¦2d ago12d ago1
What is a Debugger?πͺ²π’₯π·Learn what debuggers are, their types, layout, and applications. Also, discovered how to use debuggers effectively.3d ago33d ago3
The Stack In Operating Systemπ₯πUnderstand the stack in operating systems: its purpose, memory layout, functionality, Endianness, and Little-Endian format.4d ago44d ago4
What is Memory & How Does It Work?ππππππππππLearn about what memory is and how it functions from a hackerβs point of view, including virtual memory and memory structure.4d ago14d ago1
Published inOSINT TeamCPU Flags in Nutshell πDiscover what CPU flags are and explore some common types of flags.4d ago4d ago
Published inOSINT TeamThe CPU Register π₯Learn about CPU registers and how many there are, and go through every important register. Understanding these will help you betterβ¦5d ago15d ago1
Published inSystem WeaknessWindows Ring Level For Hackers in NutshellπͺβLearn about the different Ring levels in Windows and their importance for exploitationβ¦5d ago5d ago
What is The Kernel For Hackers?βNow, this article is going to get you an idea of what the kernel is, the structure around it, how itβs architected, and why itβs importantβ¦5d ago15d ago1
Published inSystem WeaknessLinux Run LevelsβοΈπUnderstand the run levels in Linux, and how they function, and get a guide for levels 0 to 6, along with their importance to hackers.Mar 23Mar 23
Symbolic Links in LinuxπLearn about symbolic links, their uses, soft links, hard links, and dead links, among other topicsβ¦Mar 231Mar 231