Zack Yang’s Blog
首页
搜索
归档
Forum
Friends
Github
文章
15
分类
5
标签
11
Forum
Friends
Github
归档
搜索
分类
标签
Reverse Engineering
Win32 Thread Control
Reverse Engineering
2023-7-6
Win32
multi-thread programming
PE Resource Table
Reverse Engineering
2023-7-6
Win32
PE
x64dbg Message/Memory Breakpoint
Reverse Engineering
2023-7-6
Win32
x64dbg
Wide Character Types - What We Need Them For?
Reverse Engineering
2023-7-4
Win32
Win32 Event Queue
Reverse Engineering
2023-7-1
Win32
C++ Virtual Table Implementation Details
Reverse Engineering
2023-6-13
assembly
x86
C++
Injecting a DLL into a Windows Executable By Modifying PE Import Table
Reverse Engineering
2023-6-2
assembly
x86
IAT Table
Reverse Engineering
2023-5-31
assembly
x86
Injecting a Simple Message Box at the Startup of a Windows Application
Reverse Engineering
2023-5-24
assembly
x86
C++
How C/C++ Compiler Generate Assembly Code For Switch Statement
Reverse Engineering
2023-5-17
assembly
x86
C++
How C/C++ Compiler Generate x86 Assembly Code For Large Return Values
Reverse Engineering
2023-5-12
assembly
x86
C++
C/C++ Runtime Memory Layout
Reverse Engineering
2023-5-9
assembly
x86
1
2
Zack Yang
Just a humble bounty hunter🥷
文章
15
分类
5
标签
11
最新发布
C++ Type Deduction
2023-12-28
C++ noexcept Keyword
2023-12-22
enum vs enum class
2023-12-21
deleted functions
2023-12-21
C++ Object Initialization
2023-12-21
C++ Virtual Table Implementation Details
2023-11-17
公告
type
status
date
slug
summary
tags
category
icon
password
Hey there, welcome to my blog
👋
-- 这个博客写些什么 --
定期技术分享
🤖
不定期发疯文学
🤡