Zack Yang’s Blog
首页
搜索
归档
Forum
Friends
Github
文章
10
分类
5
标签
11
Forum
Friends
Github
归档
搜索
分类
标签
#x86
C++ Virtual Table Implementation Details
Reverse Engineering
2023-6-13
assembly
x86
C++
Injecting a DLL into a Windows Executable By Modifying PE Import Table
Reverse Engineering
2023-6-2
assembly
x86
IAT Table
Reverse Engineering
2023-5-31
assembly
x86
Injecting a Simple Message Box at the Startup of a Windows Application
Reverse Engineering
2023-5-24
assembly
x86
C++
How C/C++ Compiler Generate Assembly Code For Switch Statement
Reverse Engineering
2023-5-17
assembly
x86
C++
How C/C++ Compiler Generate x86 Assembly Code For Large Return Values
Reverse Engineering
2023-5-12
assembly
x86
C++
C/C++ Runtime Memory Layout
Reverse Engineering
2023-5-9
assembly
x86
Naked Functions & C/C++ Calling Conventions
Reverse Engineering
2023-5-7
assembly
x86
Subroutines and Stacks in x86 Assembly
Reverse Engineering
2023-5-7
assembly
x86
x86 Registers and Memory Read/Write
Reverse Engineering
2023-5-2
assembly
x86
Zack Yang
Just a humble bounty hunter🥷
文章
10
分类
5
标签
11
最新发布
C++ Type Deduction
2023-12-28
C++ noexcept Keyword
2023-12-22
enum vs enum class
2023-12-21
deleted functions
2023-12-21
C++ Object Initialization
2023-12-21
C++ Virtual Table Implementation Details
2023-11-17
公告
type
status
date
slug
summary
tags
category
icon
password
Hey there, welcome to my blog
👋
-- 这个博客写些什么 --
定期技术分享
🤖
不定期发疯文学
🤡