• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up

Author: mr.grogrig

Automating x64dbg. How to transform a debugger into a hacker machine
Coding

Automating x64dbg. How to transform a debugger into a hacker…

3 days agomr.grogrig1020
Why automate x64dbg? Because an automated debugger enables you to create custom tools for standard debugging tasks: unpack files, search for signatures, intercept or substitute function outputs on the fly, and even perform fuzzing in RAM! Let’s see how this can be done.
CONTINUE READING 🡒
Dangerous skin: Exploiting a glitch in GTA Vice City
Coding

Dangerous skin: Exploiting a glitch in GTA Vice City

1 month ago29/09/2025mr.grogrig470
Today I will demonstrate the full exploit development cycle: from creating a fuzzer to shellcode start. The target that will be exploited is a parser of BMP files embedded in GTA Vice City: the game takes these files as user skins. A correctly crafted file should cause…
CONTINUE READING 🡒
Vicious exploitation. Searching for buffer overflow vulnerabilities with Angr
Coding

Vicious exploitation. Searching for buffer overflow vulnerabilities with Angr

1 month ago31/08/2025mr.grogrig740
Angr, a powerful symbolic emulator, makes it possible to seize control over execution of someone else’s code; all you have to do is specify the search direction. Today you will learn how to find similar holes in applications using Angr; in addition, you will write an inline…
CONTINUE READING 🡒
Modologic. Decompiling proprietary Assembler into C++ code
Coding

Modologic. Decompiling proprietary Assembler into C++ code

2 months agomr.grogrig650
This article describes the creation of a Hex-Rays-like decompiler for an exotic programming language used in the game “Pathologic”. You will learn how cross-compilation works and master the basics of the compilation theory so that you can write such a decompiler yourself.
CONTINUE READING 🡒
Modologic. Dissecting the Pathologic virtual machine
Coding

Modologic. Dissecting the Pathologic virtual machine

2 months ago11/08/2025mr.grogrig630
Many years ago, I was eager to understand how the game “Pathologic” actually works. But at that time, the format of its scripts was beyond my capacity. Today, I will show you how to crack the game engine to find out how its scripts operate.…
CONTINUE READING 🡒
Anger management. Welcome to Angr, a symbolic emulation framework
Coding Security

Anger management. Welcome to Angr, a symbolic emulation framework

30.06.2025mr.grogrig1350
Angr is an unbelievably powerful emulator. This crossplatform tool supports all most popular architectures; using it, you can search for vulnerabilities both in PE32 on Linux and in router firmware on Windows. Let’s examine this binary analysis framework in more detail using Linux…
CONTINUE READING 🡒
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com