How stack works in function call
HacksLand
by
11M ago
The stack is an important concept in computer science. If you are planning to learn reverse engineering, malware analyzing, exploitation, etc this concept is a must to learn. After learning about the ..read more
Visit website
Basic linux file commands
HacksLand
by
1y ago
1) Creating an empty file. We can use touch command for make a new file in Linux. Syntax is following. touch [new file name] 2) Deleting a file When deleting a file we use the command rm. rm ..read more
Visit website
IP address and subnet mask explained
HacksLand
by
1y ago
In this document, we're going to talk about an important topic in networking. It's internet protocol. Internet and every other network are built on some rules. We call them network protocols. When ..read more
Visit website
IP Addressing & Subnets
HacksLand
by
2y ago
In this document, we're going to talk about an important topic in networking. It's internet protocol. Internet and every other network are built on some rules. We call them network protocols. When ..read more
Visit website
Reverse engineering tutorial for beginners
HacksLand
by
2y ago
So you want to learn Reverse engineering. That's great. RE is used in various topics such as malware analysis, exploit development, software cracking, etc. In this document, we are going to take a ..read more
Visit website
GDB reverse engineering tutorial
HacksLand
by
2y ago
So you want to learn Reverse engineering. That's great. RE is used in various topics such as malware analysis, exploit development, software cracking, etc. In this document, we are going to take a ..read more
Visit website
SEO friendly url with PHP
HacksLand
by
2y ago
When it comes to search engine optimization, URL structure plays an important role. If the URL structure of your website is easy to understand and it is readable then you have a good chance of ..read more
Visit website
Remote File Inclusion [RFI]
HacksLand
by
2y ago
Remote File Inclusion or RFI is a vulnerability occurs in web applications. We use a Linux distribution called "Web for pen testers". You can download it from hear. Now boot the virtual mashing ..read more
Visit website
Protostar Stack0 walkthrough
HacksLand
by
2y ago
Hello there, In this tutorial we are going to learn Linux exploit development. We use protostar Linux mashing for this purpose. Protostar was developed by exploit-exercises.com. Unfortunately, The ..read more
Visit website
Python Inputs and Outputs
HacksLand
by
2y ago
Getting user inputs is an essential part of a program. In python we have several ways to get inputs like direct keyboard , arguments, environment variables etc. In this document I'll explain about ..read more
Visit website

Follow HacksLand on Feedspot

Continue with Google
OR