loader
Introduction to Lua using Cheat Engine: Beginner to Basic Script Writer!

Introduction to Lua using Cheat Engine: Beginner to Basic Script Writer! May 25, 2017

So you want to get started learning Lua and creating scripts, huh? Well you’ve come to the right place, so LET’S DO IT! =) To note, this article will soon take the form of a video, so if that’s your preferred medium, then just know that’s coming soon and I’ll populate this article with it once it’s done. I’ll spare you the details about what Lua is and how to generically learn the language in 0.013 seconds, and instead we’ll…

How to Crack and Patch Applications with Cheat Engine

How to Crack and Patch Applications with Cheat Engine February 1, 2017

You may or may not have heard of Cheat Engine (CE henceforth), a tool developed primarily for hacking video games. Its workflow bodes well for dynamic analysis commonplace in hacking games, but as it turns out, it’s also a wonderful tool for reversing non-game applications. It can be a bit of a bear initially if you’re used to tools like IDA Pro, Ollydbg, etc. — and the lack of straight-forward features like patching bytes (though it can be achieved in…

Introduction to Hacking Websites with JavaScript

Introduction to Hacking Websites with JavaScript December 31, 2016

In this introductory article, I’m going to show you how to use JavaScript to hack some custom functionality into Google’s search results pages. JavaScript is a huge, ginormous topic, so instead of concentrating on teaching JavaScript fundamentals, I’m going to give you a scenario, show you my solution, explain some things along the way, and ultimately send you off with a handful of excellent resources. Last of note, I’ll be using Google Chrome as my browser of choice throughout the…

The Piracy Paradox: Google and Lumen Database

The Piracy Paradox: Google and Lumen Database November 15, 2016

As Google becomes richer with honeypots and other false positives in place of working links for for-pay content, one constant remains: DMCA notices are publicized, thus neatly culminating working download links and making them readily available. For example, let’s say I’m searching for a new album from a band: As you can see, I’ve searched for the artist name (Testament), a part of the album name (Brotherhood), and I’ve specified a site I would like to see results from (site:zippyshare.com)….

Bug Bounties: Security Isn’t the Only Attack Vector

Bug Bounties: Security Isn’t the Only Attack Vector November 1, 2016

With the ever-growing popularity of bug bounty programs, I thought I would take a moment to share another consideration outside of security when bug-hunting, and that is matters affecting a company’s bottom line (e.g., access to files you’d otherwise have to pay for). I’ll begin with the results of my last successful bug bounty report: $500 in my bank account and a loophole closed that allowed anyone to download any game from a certain popular digital game merchant without paying…

Accessing and Modifying Upper Bits in x86 and x64 Registers

Accessing and Modifying Upper Bits in x86 and x64 Registers August 15, 2016

Through one’s journey with x86/x64 Assembly, there comes a time where one might want to access or modify the contents of the upper half of a register — that is, the upper 16 bits of 32-bit registers, or the upper 32 bits of 64-bit registers. In this post, I’m going to show you a number of ways to go about accessing and modifying your data. We’ll even get a bit crazy and take two nibbles from one register and replace…

DSASMBLR | 2016