#LowLevelProgramming

Kenzel K. DsouzaKenzKD
2026-01-21

Simple Vulkan Renderer in C++ : Low-Level Graphics

This Simple Vulkan Renderer was made by following the Vulkan Tutorial series by BrendanGalea : youtube.com/playlist?list=PL83

2025-12-10

Viết lại lệnh 'sleep' từ đầu - không dùng thư viện, kể cả libc - chỉ dùng lệnh gọi hệ thống và mẹo lập trình assembly. Bài đăng khám phá cách cài đặt lệnh này ở cấp độ底层 giúp nâng cao hiểu biết về hệ điều hành và lập trình hệ thống. #Programming #Syscall #Assembly #LậpTrìnhC #HệThống #LowLevelProgramming

reddit.com/r/programming/comme

Paolo Fabio Zaino ☮️🌍💻🎸🎮☕️🍩🍕DarkL0rd@mastodon.online
2025-11-22

💻 Weekend project: I finally got time to update the #MerlinOS presentation with the newest features.

Highlights:

* Source level debugging for ROM and flash images in MS VSCode
* UART debugging features that support source symbols, showing the module and line number in the source that triggered a panic
👇
paolozaino.wordpress.com/portf
#OperatingSystem #KernelDevelopment #SystemsProgramming #EmbeddedSystems #MemorySafety #FormalVerification #OpenSource #SoftwareEngineering #LowLevelProgramming

It's wild how wrong the amd's programmer manual(https://www.amd.com/content/dam/amd/en/documents/processor-tech-docs/programmer-references/26568.pdf) is wrong. it says one thing and then later on contrast it....

for example,
In AESDEC instruction the description says "Performs one decryption round on a state value in xmm1 using the key value in xmm2 or mem128. Writes results to xmm1." so we can assume that the xmm1 will be the destination register right?
wrong it's the xmm2 register! why I don't know ask AMD.

#linux #gnu #lowlevelprogramming #programming #assembly

N-gated Hacker Newsngate
2025-03-12

🎩✨ Behold, the riveting saga of on OpenBSD! Because, naturally, manually entering addresses for every build wasn't enough of a party 🚀. Now, watch in awe as one brave soul ports a "real" application to raw syscalls—truly, the Shakespeare of low-level programming! 🐢🔧
nullprogram.com/blog/2025/03/0

github.com/kolunmi/gtk-crusade is a AIV editor made by @kolunmi is so cool! please check him out 🥺

#gamedev #c #lowlevelprogramming #GTK

G33kst4 :verified:geeksta@hachyderm.io
2025-02-25

💻 CodeForge Live | S1E4 starts today!

We’re diving into x86 32-bit assembly, breaking down how registers work and writing a simple program to reinforce key concepts. If you’re into low-level programming, pull up a chair—we’re getting hands-on.

🔴 Live soon! #Assembly #LowLevelProgramming #CodeForgeLive
#Programming
#ComputerScience

youtube.com/@geekstaparadise

G33kst4 :verified:geeksta@hachyderm.io
2025-02-11

⚙️ CodeForge Live - S1E2! 🔥

We’re taking a step back before moving forward—today, we’re diving into the fundamentals of x86 Assembly before continuing our bootloader journey. Understanding the low-level stuff is key, so we’re breaking it down in a hands-on, beginner-friendly way! 💻✨

🔴 Live later today! youtube.com/@geekstaparadise

#CodeForge #Assembly #x86 #LowLevelProgramming #LiveCoding

2024-12-15

I'm working on a new project called #fox #monitor.
This project is a simple system monitor #software for #linux os.
Check this out :honeybadger:
#c #cpp #lowlevelprogramming #clanguage #code #programming #systemmonitor #application #app
github.com/Mr-Fox-h/fox_monito

Ricardo Alvesopqam
2024-12-01

💥 Want to see how simple ASM can be and dilly-dally some more with syscalls and OS security mechanisms?

Then, "Let's Reflect: Simple ASM Review and OS Security Mechanisms"

🎯 Want to level up your low-level programming?

Check out yet another blog entry: dreaming-of-dragons.blogspot.c

dvrbsdvrbs
2024-10-31

Have you ever followed this rule when programming in C++ ?

Inclusive Language

Use inclusive language and avoid terms that other programmers might find disrespectful or offensive (such as "master", "slave" and "blacklist")

google.github.io/styleguide/cp

Ricardo Alvesopqam
2024-10-22

🔍 Lost in the maze of debugging? I've got your map: the "Useful GDB Commands" Quick Reference Guide!

In this post you'll find:

--> 🎯 Essential commands to control program execution

--> 🔬 Memory inspection tricks that actually work

--> 🛠️ Compilation flags to make debugging easier

👉 Check out the full guide here: dreaming-of-dragons.blogspot.c

2024-10-21

Exciting news for low-level devs! Learn Rust the Dangerous Way series is a game-changer for firmware, game engine and OS kernel devs looking to up their game with Rust. You won't regret digging in. #Rust #LowLevelProgramming #SystemsProgramming cliffle.com/p/dangerust/

Ricardo Alvesopqam
2024-10-20

Ready to navigate the treacherous waters of buffer overflows?

Check my latest blog post: "Wherein We Study A Buffer Overflow And Ready Our Aim: testing the waters"

We'll now be ready to actually exploit the return address and use it for our own means.

Consider this the first step before shellcoding gallore.

🦶 Dip your toe here: dreaming-of-dragons.blogspot.c

Ricardo Alvesopqam
2024-10-17

Ready for the troubled waters of shellcode? I'm not. Not just yet, at least. But I'm by the shore and telling you about it in my latest blog post: "Wherein We Wade Through A Shellcode Shore: before the dive

"

Spoiler alert: shellcode remains relevant (and fun).

👉 Check out: dreaming-of-dragons.blogspot.c

Ricardo Alvesopqam
2024-10-10

Gibson machine loaded, let's crack another program's password in my latest blog post:

'Wherein I Crack A Simple Program: level Leviathan'

All within a real, true, certified, classy Gibson machine (or so I was told).

This post is the second in my series on breaking increasingly secure programs.

So let’s unravel these fun topics together—one byte at a time!

👉 Check out the full post here: dreaming-of-dragons.blogspot.c

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst