• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up

Author: mr.grogrig

Auto-obfuscator. Obfuscating code with LLVM
Coding Security

Auto-obfuscator. Obfuscating code with LLVM

3 days ago24/10/2025mr.grogrig1270
This article discusses obfuscating compilers, their operational principle, and the LLVM architecture. You will learn how to write your own code obfuscation passes. Using practical examples, I will explain how to create a string obfuscator, build LLVM from the source code, and integrate…
CONTINUE READING 🡒
Automating IDA Pro. Polishing debugger with coarse file
Coding

Automating IDA Pro. Polishing debugger with coarse file

6 days agomr.grogrig4170
Debugger management plugins make it possible to delegate routine debugging and vulnerability identification tasks to the machine. Using practical examples, I am going to demonstrate how to bypass anti-debugging, identify paths to vulnerable functions, and highlight important code sections. You will write a plugin in C++,…
CONTINUE READING 🡒
Automating x64dbg. How to transform a debugger into a hacker machine
Coding

Automating x64dbg. How to transform a debugger into a hacker…

3 weeks agomr.grogrig4240
Why automate x64dbg? Because an automated debugger enables you to create custom tools for standard debugging tasks: unpack files, search for signatures, intercept or substitute function outputs on the fly, and even perform fuzzing in RAM! Let’s see how this can be done.
CONTINUE READING 🡒
Dangerous skin: Exploiting a glitch in GTA Vice City
Coding

Dangerous skin: Exploiting a glitch in GTA Vice City

2 months ago29/09/2025mr.grogrig870
Today I will demonstrate the full exploit development cycle: from creating a fuzzer to shellcode start. The target that will be exploited is a parser of BMP files embedded in GTA Vice City: the game takes these files as user skins. A correctly crafted file should cause…
CONTINUE READING 🡒
Vicious exploitation. Searching for buffer overflow vulnerabilities with Angr
Coding

Vicious exploitation. Searching for buffer overflow vulnerabilities with Angr

2 months ago31/08/2025mr.grogrig1510
Angr, a powerful symbolic emulator, makes it possible to seize control over execution of someone else’s code; all you have to do is specify the search direction. Today you will learn how to find similar holes in applications using Angr; in addition, you will write an inline…
CONTINUE READING 🡒
Modologic. Decompiling proprietary Assembler into C++ code
Coding

Modologic. Decompiling proprietary Assembler into C++ code

2 months agomr.grogrig1090
This article describes the creation of a Hex-Rays-like decompiler for an exotic programming language used in the game “Pathologic”. You will learn how cross-compilation works and master the basics of the compilation theory so that you can write such a decompiler yourself.
CONTINUE READING 🡒
Modologic. Dissecting the Pathologic virtual machine
Coding

Modologic. Dissecting the Pathologic virtual machine

3 months ago11/08/2025mr.grogrig1110
Many years ago, I was eager to understand how the game “Pathologic” actually works. But at that time, the format of its scripts was beyond my capacity. Today, I will show you how to crack the game engine to find out how its scripts operate.…
CONTINUE READING 🡒
Anger management. Welcome to Angr, a symbolic emulation framework
Coding Security

Anger management. Welcome to Angr, a symbolic emulation framework

30.06.2025mr.grogrig2610
Angr is an unbelievably powerful emulator. This crossplatform tool supports all most popular architectures; using it, you can search for vulnerabilities both in PE32 on Linux and in router firmware on Windows. Let’s examine this binary analysis framework in more detail using Linux…
CONTINUE READING 🡒
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com