Research notes on reverse engineering, malware analysis, and hacking.
A compromised MongoDB instance
Mar 04, 2026 Defensive Writeups
A Linux machine with a successful brute force incident
Mar 04, 2026 Reverse EngineeringLearn how to hack Assault Cube with this step-by-step guide. In Part 2, we use memory offsets to code a working aimbot with C and WinAPI.
Aug 27, 2025