Mark H4CK
Create your home lab for CORPORATE PENTESTING (active directory) | ethical hacking (part 2)
27:50
Mark H4CK
Exploitation of corporate networks (Active Directory + brute force) | ethical hacking (Part 1)
15:54
Mark H4CK
This happens exactly when you execute a function (something no one explains to you)
16:28
Mark H4CK
Emulating ARM in Windows
0:56
Mark H4CK
Is ARM harder than x86? (crack me CTF with Qemu and Ghidra)
15:47
Mark H4CK
Understand STACK POINTER and BASE POINTER (once and for all)
11:35
Mark H4CK
Why does EVERYTHING start on the MAIN?
0:55
Mark H4CK
Playing with the stack
0:57
Mark H4CK
How to analyze software with x64dbg and IDA Pro
1:00
Mark H4CK
I tried to crack this program... Is it IMPOSSIBLE? (Reversing)
21:40
Mark H4CK
Debugger y X64dbg #shorts #markh4ck #programming #windows
1:00
Mark H4CK
Create Your Own Game Cheat with Python
0:43
Mark H4CK
This is how I created an ESP cheat in Python
30:09
Mark H4CK
🔐How to solve a packaged crackme?
0:41
Mark H4CK
Reverse Engineering with IDA Pro
0:22
Mark H4CK
Analysis of Sections of Windows Executables
0:42
Mark H4CK
Your antivirus is useless: this is how hackers hide malware
22:14
Mark H4CK
.BSS Section (Uninitialized Variables)
0:43
Mark H4CK
Why was the PE format created? Windows executables
0:47
Mark H4CK
Sections of an EXE (data and rdata)
0:38
Mark H4CK
The key is in the Optional Header | Reversing explained
0:32
Mark H4CK
Constant variables and functions in programming
0:46
Mark H4CK
This is what's inside an .EXE file (Reverse Engineering)
38:57
Mark H4CK
Everything is Open Source if you know REVERSE ENGINEERING | Tutorial for Beginners
24:37
Mark H4CK
Aprende a CRACKEAR un PROGRAMA desde 0 | Crackmes.one (CTF)
21:20
Mark H4CK
CREA tu PRIMER EXPLOIT en WINDOWS con KALI LINUX | Tutorial en Español
34:41
Mark H4CK
¿Qué hay dentro de Windows? TEB, PEB y ASLR explicado | Windows Internals
37:14
Mark H4CK
CÓMO CREAR HACKS para JUEGOS | Guía para PRINCIPIANTES
7:24
Mark H4CK
Buffer Overflow in Vulnserver | Computer Course 101
29:25
Mark H4CK
Crack your first program with reverse engineering | Crackmes tutorial for beginners
12:00
Mark H4CK
Cómo crear un PAYLOAD y EXPLOTAR un BUFFER OVERFLOW
21:37
Mark H4CK
Cómo explotar un BUFFER OVERFLOW en Windows | Curso computación 101
30:58
Mark H4CK
Así funciona la pila en la memoria RAM 💡
0:36
Mark H4CK
Claves de la memoria RAM: ¿Qué hacen ESP y EBP en el stack?
0:31
Mark H4CK
Cómo funciona el STACK en memoria | Curso computación 101
32:07
Mark H4CK
Estructura del código ensamblador en MASM
0:47
Mark H4CK
¿Cuantos bits representan 4 dígitos? | Assembly
0:49
Mark H4CK
Así funcionan los registros de la CPU y los punteros
0:47
Mark H4CK
Class 3 (Part 1/2): XOR Logic Operation in x86 Assembly Language (Assembly)
15:13
Mark H4CK
Reverse Engineering con Ghidra: Analizando el Entry Point
0:33
Mark H4CK
Direcciones de Memoria y Offset
0:35
Mark H4CK
La mejor herramienta para Ciberseguridad | Ghidra
24:31