• News
  • Mobile
  • Security
  • Malware
  • Coding
  • Unix
  • DevOps
  • Log In
  • Sign Up
  • No bullshit
  • Cookie Policy
  • Privacy Policy
Log In / Sign Up

Author: Yury "Yurembo" Yazev

Choosing the Best PE Editor for Windows Executables: A Reverse Engineering Shootout
Security

Choosing the Best PE Editor for Windows Executables: A Reverse…

2 weeks ago13/09/2025Yury "Yurembo" Yazev2030
The primary—and hardest—task for a hacker during a software break-in is to identify the protection mechanism and bypass it. For reconnaissance I typically use the WinDbg debugger, and for “patching” the application I rely on the Hiew…
CONTINUE READING 🡒
Reverse Engineering Fundamentals: Hands-On Executable Analysis in IDA Pro
Security

Reverse Engineering Fundamentals: Hands-On Executable Analysis in IDA Pro

3 weeks ago13/09/2025Yury "Yurembo" Yazev2980
In this article, we’ll dive into an in-depth static analysis using IDA Pro—the go-to disassembler for hackers and security professionals. We’ll start with the basics and steadily work our way forward, cutting through the thicket of code…
CONTINUE READING 🡒
Introduction to Hacking: Authentication Testing and Basic Security Exploits
Security

Introduction to Hacking: Authentication Testing and Basic Security Exploits

3 months ago20/07/2025Yury "Yurembo" Yazev590
Fifteen years ago, Chris Kaspersky's epic work "Fundamental Principles of Hacking" was the go-to guide for every budding computer security researcher. The editors of "Hacker" have taken on the challenge of updating this substantial work, bringing it…
CONTINUE READING 🡒
Learning heterogeneous parallelism in C++ with AMP
Coding

Learning heterogeneous parallelism in C++ with AMP

29.09.201514/10/2015Yury "Yurembo" Yazev5010
When it became physically impossible to further increase the number of transistors in a single microprocessor core, the manufacturers started to put several cores on a chip. This was accompanied by the emergence of such frameworks, that…
CONTINUE READING 🡒
  • No bullshit
  • Cookie Policy
  • Privacy Policy
HackMag — Top-notch cybersecurity magazine © 2025
Support:support@hackmag.com