In this post, I explain a technique used to implement Inversion of Control, namely Dependency Injection.
Temple of DOOM – Vulnhub Walkthrough
This is a somewhat easy/a bit intermediate machine perfect to practice a certain OWASP Top 10 vulnerability.
Try it out yourself!
Machine link: https://www.vulnhub.com/entry/temple-of-doom-1,243/
Internal vs External Game Hacks
If you're into game hacking then you probably have already heard the terms "Internal" and "External" hacks.
In this post I go over the differences of each with code examples and which to opt for when hacking.
What are Multi-Level Pointers
Whether you're a programmer or a reverse-engineer, you have probably dealt with those before, maybe even had a hard time understanding them.
Even if you have already used them in game hacking there's a high chance you don't know what they are at the high-level (C/C++)!
Brainpan: 1 – OSCP-Like Vulnhub Walkthrough
Yet another OSCP-Like Vulnhub machine, this one is recommended if you're looking to challenge your exploitation skills. Try it out by yourself first!
Machine link: https://www.vulnhub.com/entry/brainpan-1,51/