battlewise
Hacking-Windows
battlewise | Hacking-Windows | |
---|---|---|
3 | 4 | |
1 | 1,254 | |
- | - | |
1.8 | 0.0 | |
about 2 years ago | over 1 year ago | |
C | C | |
GNU General Public License v3.0 only | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
battlewise
-
Below averge programmers
Develop a coding style - curly braces, parenthesis, function length/name, variable names/types, structures, macros. This is work at module level (.c). See for inspiration: https://github.com/dellfer/battlewise/blob/main/src/common/berrors.h
-
Why is my output a garbage while displaying the contents of an array?
// Read-able code is always easier to debug code. #include "berrors.h" // see https://github.com/dellfer/battlewise/blob/main/src/common/berrors.h #include #define MAX_ELEMENTS (10) static STATUS readInt(int *pRetInt) { STATUS status = OK; // scanf is not considered a safe function // good news - you only need to fix this one function to remedy if (1 != scanf("%d", pRetInt)) status = ERR_GEN_NOT_FOUND; return status; } static STATUS readPostiveInt(int *pRetInt) { STATUS status; if (OK > (status = readInt(pRetInt))) goto exit; if (0 > (*pRetInt)) status = ERR_GEN_NOT_FOUND; // we would want to add a more specific // error for this condition // maybe out of expected range exit: return status; } int main() { int elements[MAX_ELEMENTS]; int maxElements; int numElements; int index; int lowIndex; \\ a range (lowIndex, highIndex) int highIndex; STATUS status; printf("Enter the array size:"); if (OK > (status = readPostiveInt(&maxElements))) goto exit; if (maxElements > MAX_ELEMENTS) { status = ERR_GEN_BAD_LENGTH; goto exit; } /* read the entire an array of elements */ for (index = 0; index < maxElements; index++) if (OK > (status = readInt(&(elements[index])))) goto exit; // we read positive integers to ensure range is good // otherwise, we have a buffer underflow bug printf("Input Two Points:"); if (OK > (status = readPostiveInt(&lowIndex))) goto exit; if (OK > (status = readPostiveInt(&highIndex))) goto exit; // recall indices are zero-based in C (we need '>=') // we don't check if lowIndex is lower than highIndex if ((lowIndex >= maxElements) || (highIndex >= maxElements)) { printf("0"); goto exit; } for (numElements = 0; lowIndex <= highIndex; lowIndex++) { printf("%d, ", elements[lowIndex]); numElements++; } printf("Number Of Elements Are: %d\n", numElements); exit: if (OK > status) printf("main: error occurred. status = %d\n", status); return 0; }
-
C-Programming Tips (advance beginners and higher): Error code strategy plus source code
Declare error codes: https://github.com/dellfer/battlewise/blob/main/src/common/berrors.h
Hacking-Windows
- Hacking-Windows: A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment.
- Hacking-Windows: A FREE Windows C development course where we will learn the Win32API and reverse engineer each step utilizing IDA Free in both an x86 and x64 environment. (UNDER DEVELOPMENT)
What are some alternatives?
CTFs - CTF Cheat Sheet + Writeups / Files for some of the Cyber CTFs that I've done
dc540-0x00005b - DC540 hacking challenge 0x00005b.
Reverse-Engineering-Tutorial - A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures.
0x01-ARM-32-Hacking-Hello-World - ARM 32-bit Raspberry Pi Hacking Hello World example in Kali Linux.
FunctionStomping - Shellcode injection technique. Given as C++ header, standalone Rust program or library.
Hacking-Rust - A FREE comprehensive online Rust hacking tutorial utilizing the x64, ARM64 and ARM32 architectures going step-by-step into the world of reverse engineering Rust from scratch.
pythonlibs - A Python wrapper for the extremely fast Blosc compression library
RainFall - Binary exploitation & Reverse engineering (assembly to C)
idaxex - Xbox360/Xenon loader plugin for IDA 7.2+, and xex1tool, supporting most known Xbox360/Xenon .XEX executable file formats.
Crackme - 「👾」Some binaries for you to crack
Embedded-Hacking - A FREE comprehensive step-by-step embedded hacking tutorial covering Embedded Software Development to Reverse Engineering.
Motion_Control_Examples - Software examples for Thorlabs motion control products (e.g. T-Cube, K-Cube, and benchtop brushless, DC, stepper, and Piezo motor controllers)