Devlet destekli ve organize tehdit aktörlerinin pornografik içerikli psikolojik operasyonlarDevlet destekli ve organize tehdit aktörleri, pornografik içerikleri giderek daha sık şekilde psikolojik operasyon (PSYOP) aracı olarak…1d ago1d ago
SS7, Sahte Baz İstasyonları, SMS Swapping ve Sinyal İstihbaratı: Teknik Bir İncelemeSignaling System (SS7), telekomünikasyon ağlarında farklı santraller arasındaki iletişimi sağlayan bir protokoldür. 1970'lerin sonunda…5d ago15d ago1
How I passed eMAPTHello everyone, In this blog, I will share my experiences about eMAPT. On 17th January, I took the exam. But before I read many blogs about…Feb 22Feb 22
PT_LOAD injection and modifying the Entrypoint in CHello everyone, welcome back! Today I am going to write a blog about pt_load injection. Lets get started!Jan 171Jan 171
KASLR (Finding Kernel address)Hello everyone, welcome to my blogpost. Today, I will be covering Linux kernel address space layout randomization. In this blogpost, I will…Dec 29, 2024Dec 29, 2024
Linux Kernel Programming <char_drive>Hello everyone, welcome back to my blogpost. Before starting to write about char drives, I would like to say that my blogs will be driven…Dec 21, 20241Dec 21, 20241
Minesweeper Reverse #1Today, I’ll be writing a blog on the steps that can be taken to reverse-engineer a Minesweeper game. First of all, as always, we should…Nov 8, 2024Nov 8, 2024
CPU Simulator + C codeHello, everyone. Welcome to my blog. Today, I want to cover the topic of CPUs and write a CPU simulator in C code. This aims to help people…Jul 12, 20246Jul 12, 20246
Elliptic Curves And Web-3 (Part-2)Hello everyone! Today I will introduce the ECC algorithm from a mathematical perspective. In my previous blog, I wrote about the…Apr 26, 2024Apr 26, 2024