⌨️
Penetration testing & ethical hacking concepts
Ctrl
k
Copy
Reverse Engineering/Binary Exploitation
Assembly
Common
Examples
x86 assembly (32-bit)
Previous
Endianness, stack growth (GDB & Ghidra experiments)
Next
Common
Last updated
1 month ago