#lowlevelprogramming

It's wild how wrong the amd's programmer manual(https://www.amd.com/content/dam/amd/en/documents/processor-tech-docs/programmer-references/26568.pdf) is wrong. it says one thing and then later on contrast it....

for example,
In AESDEC instruction the description says "Performs one decryption round on a state value in xmm1 using the key value in xmm2 or mem128. Writes results to xmm1." so we can assume that the xmm1 will be the destination register right?
wrong it's the xmm2 register! why I don't know ask AMD.

#linux #gnu #lowlevelprogramming #programming #assembly

N-gated Hacker Newsngate
2025-03-12

๐ŸŽฉโœจ Behold, the riveting saga of on OpenBSD! Because, naturally, manually entering addresses for every build wasn't enough of a party ๐Ÿš€. Now, watch in awe as one brave soul ports a "real" application to raw syscallsโ€”truly, the Shakespeare of low-level programming! ๐Ÿข๐Ÿ”ง
nullprogram.com/blog/2025/03/0

github.com/kolunmi/gtk-crusade is a AIV editor made by @kolunmi is so cool! please check him out ๐Ÿฅบ

#gamedev #c #lowlevelprogramming #GTK

Valeriy M., PhD, MBA, CQFpredict_addict@sigmoid.social
2025-03-01

They hire based on raw skill, competitive coding, and deep understanding.

Bin your Coursera subscription. Learn the real stuff.

#AI #DeepSeek #Mathematics #LowLevelProgramming #NoMoreVCBailouts

G33kst4 :verified:geeksta@hachyderm.io
2025-02-25

๐Ÿ’ป CodeForge Live | S1E4 starts today!

Weโ€™re diving into x86 32-bit assembly, breaking down how registers work and writing a simple program to reinforce key concepts. If youโ€™re into low-level programming, pull up a chairโ€”weโ€™re getting hands-on.

๐Ÿ”ด Live soon! #Assembly #LowLevelProgramming #CodeForgeLive
#Programming
#ComputerScience

youtube.com/@geekstaparadise

G33kst4 :verified:geeksta@hachyderm.io
2025-02-11

โš™๏ธ CodeForge Live - S1E2! ๐Ÿ”ฅ

Weโ€™re taking a step back before moving forwardโ€”today, weโ€™re diving into the fundamentals of x86 Assembly before continuing our bootloader journey. Understanding the low-level stuff is key, so weโ€™re breaking it down in a hands-on, beginner-friendly way! ๐Ÿ’ปโœจ

๐Ÿ”ด Live later today! youtube.com/@geekstaparadise

#CodeForge #Assembly #x86 #LowLevelProgramming #LiveCoding

2024-12-15

I'm working on a new project called #fox #monitor.
This project is a simple system monitor #software for #linux os.
Check this out :honeybadger:
#c #cpp #lowlevelprogramming #clanguage #code #programming #systemmonitor #application #app
github.com/Mr-Fox-h/fox_monito

Ricardo Alvesopqam
2024-12-01

๐Ÿ’ฅ Want to see how simple ASM can be and dilly-dally some more with syscalls and OS security mechanisms?

Then, "Let's Reflect: Simple ASM Review and OS Security Mechanisms"

๐ŸŽฏ Want to level up your low-level programming?

Check out yet another blog entry: dreaming-of-dragons.blogspot.c

dvrbsdvrbs
2024-10-31

Have you ever followed this rule when programming in C++ ?

Inclusive Language

Use inclusive language and avoid terms that other programmers might find disrespectful or offensive (such as "master", "slave" and "blacklist")

google.github.io/styleguide/cp

Ricardo Alvesopqam
2024-10-22

๐Ÿ” Lost in the maze of debugging? I've got your map: the "Useful GDB Commands" Quick Reference Guide!

In this post you'll find:

--> ๐ŸŽฏ Essential commands to control program execution

--> ๐Ÿ”ฌ Memory inspection tricks that actually work

--> ๐Ÿ› ๏ธ Compilation flags to make debugging easier

๐Ÿ‘‰ Check out the full guide here: dreaming-of-dragons.blogspot.c

2024-10-21

Exciting news for low-level devs! Learn Rust the Dangerous Way series is a game-changer for firmware, game engine and OS kernel devs looking to up their game with Rust. You won't regret digging in. #Rust #LowLevelProgramming #SystemsProgramming cliffle.com/p/dangerust/

Ricardo Alvesopqam
2024-10-20

Ready to navigate the treacherous waters of buffer overflows?

Check my latest blog post: "Wherein We Study A Buffer Overflow And Ready Our Aim: testing the waters"

We'll now be ready to actually exploit the return address and use it for our own means.

Consider this the first step before shellcoding gallore.

๐Ÿฆถ Dip your toe here: dreaming-of-dragons.blogspot.c

Ricardo Alvesopqam
2024-10-17

Ready for the troubled waters of shellcode? I'm not. Not just yet, at least. But I'm by the shore and telling you about it in my latest blog post: "Wherein We Wade Through A Shellcode Shore: before the dive

"

Spoiler alert: shellcode remains relevant (and fun).

๐Ÿ‘‰ Check out: dreaming-of-dragons.blogspot.c

Ricardo Alvesopqam
2024-10-10

Gibson machine loaded, let's crack another program's password in my latest blog post:

'Wherein I Crack A Simple Program: level Leviathan'

All within a real, true, certified, classy Gibson machine (or so I was told).

This post is the second in my series on breaking increasingly secure programs.

So letโ€™s unravel these fun topics togetherโ€”one byte at a time!

๐Ÿ‘‰ Check out the full post here: dreaming-of-dragons.blogspot.c

Akshat Singhakshatsingh
2024-10-06
Ricardo Alvesopqam
2024-10-06

New blog post:

"Wherein I Crack A Simple Program: level 1"

In this post I'll cover:
๐Ÿ–ฅ๏ธ xxd to view binary data
๐Ÿ“œ readable strings with strings
๐Ÿ” function calls with ltrace
๐Ÿ•ต๏ธ gdb for deeper insights

๐Ÿ‘‰ Check out the full journey here:
dreaming-of-dragons.blogspot.c

Next level, we'll be tackling basic obfuscation techniques and environment variables.

๐Ÿ Join me in this exploration of Reverse Engineering!

Ricardo Alvesopqam
2024-09-30

Want to play some fun hacking games? ๐Ÿ•ต๏ธโ€โ™‚๏ธ

Then this intermezzo is for you ๐Ÿ‘‰ dreaming-of-dragons.blogspot.c

I've recently finished the Bandit game in Over The Wire and decided to share a couple of tips and ideas I'd like to have known before starting the game myself.

No spoilers. Or your money back! โ˜บ๏ธ

Ricardo Alvesopqam
2024-09-28

๐Ÿ•ต๏ธโ€โ™‚๏ธ I got hacked, and because of that you get my 6th blog post: "Wherein I Get Hacked And Learn In The Process: OTW" ๐Ÿ”

Ever had a friendly chat with a "hacker" in OverTheWire? I have.

๐Ÿ‘‰ Join the adventure here: dreaming-of-dragons.blogspot.c

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst