• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up

Author: mr.grogrig

Vicious exploitation. Searching for buffer overflow vulnerabilities with Angr
Coding

Vicious exploitation. Searching for buffer overflow vulnerabilities with Angr

2 weeks ago31/08/2025mr.grogrig140
Angr, a powerful symbolic emulator, makes it possible to seize control over execution of someone else’s code; all you have to do is specify the search direction. Today you will learn how to find similar holes in applications using Angr; in addition, you will write an inline…
CONTINUE READING 🡒
Modologic. Decompiling proprietary Assembler into C++ code
Coding

Modologic. Decompiling proprietary Assembler into C++ code

3 weeks agomr.grogrig60
This article describes the creation of a Hex-Rays-like decompiler for an exotic programming language used in the game “Pathologic”. You will learn how cross-compilation works and master the basics of the compilation theory so that you can write such a decompiler yourself.
CONTINUE READING 🡒
Modologic. Dissecting the Pathologic virtual machine
Coding

Modologic. Dissecting the Pathologic virtual machine

1 month ago11/08/2025mr.grogrig50
Many years ago, I was eager to understand how the game “Pathologic” actually works. But at that time, the format of its scripts was beyond my capacity. Today, I will show you how to crack the game engine to find out how its scripts operate.…
CONTINUE READING 🡒
Anger management. Welcome to Angr, a symbolic emulation framework
Coding Security

Anger management. Welcome to Angr, a symbolic emulation framework

3 months agomr.grogrig230
Angr is an unbelievably powerful emulator. This crossplatform tool supports all most popular architectures; using it, you can search for vulnerabilities both in PE32 on Linux and in router firmware on Windows. Let’s examine this binary analysis framework in more detail using Linux…
CONTINUE READING 🡒
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com