leap's blog

leap's blog

zack

hacking network security

Analysing Network-Traffic

In today’s hyper-connected world, network traffic analysis isn’t just a skill—it’s an art form that blends deep protocol knowledge, familiarity with powerful tools, and a detective’s mindset. Whether you’re troubleshooting a sluggish network or hunting for malicious activity, the ability to dissect packets at a granular level can make you Read more…

By zack, 2 yearsNovember 14, 2022 ago
hacking programming security

Reverse Engineering in a Nutshell: A Comprehensive Guide

Reverse engineering is a fascinating yet often misunderstood discipline that involves dissecting software to understand its inner workings. While it can be a powerful tool for vulnerability research, software interoperability, or even academic curiosity, it also raises important considerations around legality and ethics. In this blog post, I’ll walk you Read more…

By zack, 3 yearsOctober 20, 2022 ago
hardware kernel programming

Assembly instructions on a x64-Architecture

Introduction Hello fellow tech enthusiasts! Today, I’m taking a deep dive into a subject close to my heart and central to my career since the late 2000s – x64 architecture and its assembly instructions. Having journeyed through the evolving landscapes of programming and network engineering for over a decade, I’ve Read more…

By zack, 3 yearsOctober 5, 2022 ago
hacking kernel programming security

Hooking into the Windows API

What is Windows API Hooking? First things first, Windows API hooking is a technique used by developers to intercept API function calls. This means you can monitor or modify the behavior of applications or the operating system itself. Pretty cool, right? But why is this useful? Well, it’s great for Read more…

By zack, 3 yearsJuly 27, 2022 ago

Posts pagination

Previous 1 2
Archives
  • November 2023
  • May 2023
  • February 2023
  • December 2022
  • November 2022
  • October 2022
  • July 2022
Categories
  • hacking
  • hardware
  • kernel
  • network
  • programming
  • security
  • Uncategorized
Recent Posts
  • NTP Amplification Attacks: A Deep Technical Exploration
  • Deep Dive into CrystalDiskMark
  • The Zero Trust Model: A Deep Dive into the Future of Cybersecurity
  • Debugging Techniques for Kernel Development
  • SQL Injection at its finest
Recent Comments
  1. Ling Vongxay on Mastering Regular Expressions: A Deep Dive into the Art of Pattern Matching
  2. Travel Blog on Mastering Regular Expressions: A Deep Dive into the Art of Pattern Matching
  3. Travel Blog on SQL Injection at its finest
  4. Jerold Mattsen on Networking 101 – The layers a packet goes through
  5. Marcelino Buckson on SQL Injection at its finest
  • About
  • Blog
Hestia | Developed by ThemeIsle