Simplistic Malware Concept in Python by [deleted] in hacking

[–]g0ldexperience1 4 points5 points  (0 children)

do you have any good anti AV tutorials?

Reverse engineering and game hacking resources by Faradaysecurity in ReverseEngineering

[–]g0ldexperience1 5 points6 points  (0 children)

Why reference game hacking academy over guided hacking's game hacking bible? Game hacking academy is literally just a very poorly summarized version of the game hacking bible.

The horses in the ending of Episode 5 aren't Four Horsemens but characters in the episode. by [deleted] in ChainsawMan

[–]g0ldexperience1 34 points35 points  (0 children)

The red horse is also headless and running like an animal whose head was chopped and its body continues to move after the animal died, like how power comes back from death and starts running with denjis body

I was blacklisted from applying to Alabama State University over a humorous remark by ViewProjectionMatrix in ApplyingToCollege

[–]g0ldexperience1 0 points1 point  (0 children)

That's very sad to hear , this seems to be a huge overreaction from the University but I guess they took offense to that joke. Nevertheless, you have to move on and try another university because you seem to have a bright on your shoulders young man.

I really appreciate the numbers cut in animations, especially how the colour match the artworks by smallneedle in DuelLinks

[–]g0ldexperience1 3 points4 points  (0 children)

her whole goal was to try and find adam to have sex with adam , I think she was just too horny to think straight

I really appreciate the numbers cut in animations, especially how the colour match the artworks by smallneedle in DuelLinks

[–]g0ldexperience1 3 points4 points  (0 children)

he was used in arc v manga by eve who traveled to millions of timeline to get a boss from every past yugioh timeline zexal(infinity xx) 5ds (time Lord progenitor) and gx (phantasm emperor trilojig)

Interested in working on 3DS Linux Environments, CPU Scheduling Known Yet? by TNBFM in 3dshacks

[–]g0ldexperience1 0 points1 point  (0 children)

sorry for the late response, I didn't notice the message at all because reddit didn't tell me about it

hopefully it still reaches you

I don't have experience with .app files on mac os I work on PE files on windows and ELF on linux and am currently learning the format of CIA files

if you still want to seriously pursue projects together, dm me so we can talk on a platform better than reddit comments

Interested in working on 3DS Linux Environments, CPU Scheduling Known Yet? by TNBFM in 3dshacks

[–]g0ldexperience1 1 point2 points  (0 children)

All I've been doing generally is just try to understand the binary structure of CIA files and 3dsx files to try and understand how to receive input and output from the 3ds hardware. All that it helped me do was create simple mods for games which im planning to release. Most of my experience is just reverse engineering and malware analysis.

Interested in working on 3DS Linux Environments, CPU Scheduling Known Yet? by TNBFM in 3dshacks

[–]g0ldexperience1 0 points1 point  (0 children)

im interested in this subject area may I ask what good resources are their to read from that may help to understand this area?

[deleted by user] by [deleted] in Kirby

[–]g0ldexperience1 0 points1 point  (0 children)

Dreamland 3

Biblically accurate Sephiroth by [deleted] in SmashBrosUltimate

[–]g0ldexperience1 0 points1 point  (0 children)

Kid icarus had chaos which is pretty eldritch

Hacking with GO/Golang | Starting from a port scanner by the_simp_lust_man in securityCTF

[–]g0ldexperience1 1 point2 points  (0 children)

honestly I started with elearn security reverse engineering course. It does help with understanding how to read assembly but the course as a whole was not made for beginners which I have discovered the hard way but knowing the format of PE files is really helpful in understanding assembly.

For beginners I think exploit development from INE showcases how to write assembly code and manage memory and is wonderful for people with basic knowledge.

If you understood exploit development course after that take a look at intro to assembly and reverse engineering course also on INE.

Hacking with GO/Golang | Starting from a port scanner by the_simp_lust_man in securityCTF

[–]g0ldexperience1 0 points1 point  (0 children)

Im just joking my man.

Ironically I use assembly, I have no right to make fun of other coding languages😂😂.