The Stack In Operating Systemπ₯πUnderstand the stack in operating systems: its purpose, memory layout, functionality, Endianness, and Little-Endian format.22h ago422h ago4
What is Memory & How Does It Work?ππππππππππLearn about what memory is and how it functions from a hackerβs point of view, including virtual memory and memory structure.22h ago122h ago1
Published inOSINT TeamCPU Flags in Nutshell πDiscover what CPU flags are and explore some common types of flags.23h ago23h ago
Published inOSINT TeamThe CPU Register π₯Learn about CPU registers and how many there are, and go through every important register. Understanding these will help you betterβ¦1d ago11d ago1
Windows Ring Level For Hackers in NutshellπͺβLearn about the different Ring levels in Windows and their importance for exploitationβ¦1d ago1d ago
What is The Kernel For Hackers?βNow, this article is going to get you an idea of what the kernel is, the structure around it, how itβs architected, and why itβs importantβ¦2d ago12d ago1
Linux Run LevelsβοΈπUnderstand the run levels in Linux, and how they function, and get a guide for levels 0 to 6, along with their importance to hackers.4d ago4d ago
Symbolic Links in LinuxπLearn about symbolic links, their uses, soft links, hard links, and dead links, among other topicsβ¦4d ago14d ago1
Published inInfoSec Write-upsWorking with Linux Open FilesποΈUnderstand Open Files in Linux, including the lsof command, file descriptors (FD), and the Type field.π§4d ago4d ago
What Are INodes In Linux?!Learn about inodes in Linux: what they are, how to see inodes, and why they're important for exploitation and penetration testing.Feb 26Feb 26