No edit summary |
mNo edit summary |
||
Line 7: | Line 7: | ||
| github = @barbieauglend | | github = @barbieauglend | ||
| has_memberbox = true | | has_memberbox = true | ||
| blog = https://barbieauglend.re | |||
}} | }} | ||
Line 14: | Line 15: | ||
== Projects == | == Projects == | ||
== | === [[52455645525345]] - Reverse Engineering Group === | ||
Reverse Engineering is fun! It's like a puzzle and if there is an algorithm out there that can solve this puzzle, it's your brain. =) | |||
I, {{U|barbieauglend}}, would love to take a look at compiled binaries with you and figure out together what the programs do. They are often a lot easier than you might think! If you are interested in RE, join us! | |||
=== [[Assembly_x86]] - x86 Group === | |||
We notice that a low level curiosity was there and it helps a lot to understand how Intel processors work, if one is interest in reverse engineering, compiler design, code optimization or OS design. I suggested another afternoon/evening working in the low level computing mechanisms of the Intel processors, understanding the Intel architecture and talking about the x86 assembly language. I expect a lot of fun and... that we are all able to understand at least the 20 most common x86 instructions. If you are interested in the x86 ISA, again, join us! | |||
== Events == | |||
* [https://wiki.chaosdorf.de/Freitagsfoo/2017-05-19 Do you WNCRY?] | * [https://wiki.chaosdorf.de/Freitagsfoo/2017-05-19 Do you WNCRY?] | ||
* [http://blog.deepsec.net/bsideslondon-2017-sharing-indeed-caring/ On BSidesLondon 2017] | * [http://blog.deepsec.net/bsideslondon-2017-sharing-indeed-caring/ On BSidesLondon 2017] | ||
Line 30: | Line 39: | ||
== Can be also found == | == Can be also found == | ||
* [https://www.twitter.com/barbieauglend Twitter] | * [https://www.twitter.com/barbieauglend Twitter] | ||
* [https://barbieauglend.re/ My pink logical world] | * [https://barbieauglend.re/ My pink logical world] | ||
* PGP-key B531FCBF | * PGP-key B531FCBF |