The Art of Profiling C++ Applications
A practical guide to profiling C++ applications without guessing. It covers workloads, tools, flame graphs, memory behavior, and how to turn measurements into dependable performance wins.
Filter by discipline. Narrow by format. Get straight to the articles that fit the work.
A practical guide to profiling C++ applications without guessing. It covers workloads, tools, flame graphs, memory behavior, and how to turn measurements into dependable performance wins.
Hello dear friends! In this article, we’ll cover the basics of the PE format and build our own parser from scratch. It will be useful for those working in cybersecurity with system software, antivirus solutions, and protection systems.
Friends, hello everyone! In this article, we will talk about such an important part of every antivirus engine as the hashing module. We will talk about data verification, blacklisting and whitelisting, finding out how similar or different data is, and touching on the topic of fuzzy hashing algorithms. Get comfortable in your chairs!
Build your first Windows kernel driver in Rust with a practical, step by step setup that covers WDK, Windows SDK, nightly toolchain, linker flags, and a clean no_std driver entry using DbgPrint. This guide walks through compiling a Rust .sys driver, enabling Windows test signing mode, signing the driver, and validating output with Sysinternals DebugView on Windows 10 or Windows 11.
Hello friends! In this article, we will analyze an executable file that repeatedly found itself on the work network of one of our clients and created problems for the client. The client asked to reverse-engineer the threat, conduct a security audit and provide a solution, which we did. We are always glad to cooperate in the field of cyber security, reverse engineering and security audit!