𧬠Join the GenX revolution.
π‘ Learn. π οΈ Build. π£ Break. π Defend.
Because in GenXCyber, every packet tells a story. π‘π
[{"id":204,"link":"https:\/\/genxcyber.com\/x86-and-x64-assembly-from-scratch\/","name":"x86-and-x64-assembly-from-scratch","thumbnail":{"url":"https:\/\/genxcyber.com\/wp-content\/uploads\/2025\/04\/assembly.png","alt":""},"title":"x86 and x64 Assembly from Scratch","author":{"name":"admin","link":"https:\/\/genxcyber.com\/author\/debrajbasakofficial\/"},"date":"Apr 25, 2025","dateGMT":"2025-04-25 17:13:34","modifiedDate":"2025-04-25 17:13:35","modifiedDateGMT":"2025-04-25 17:13:35","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/genxcyber.com\/category\/tutorials\/exploit-development\/\" rel=\"category tag\">Exploit Development<\/a>","space":"<a href=\"https:\/\/genxcyber.com\/category\/tutorials\/exploit-development\/\" rel=\"category tag\">Exploit Development<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":4,"sec":5},"status":"publish","excerpt":"To gain a deep, foundational understanding of how x86 and x64 assembly work, from CPU registers and calling conventions to memory addressing and function calls. This is critical for exploit developers who need precise control over memory, registers, and the instruction pointer."},{"id":200,"link":"https:\/\/genxcyber.com\/what-is-exploit-development\/","name":"what-is-exploit-development","thumbnail":{"url":"https:\/\/genxcyber.com\/wp-content\/uploads\/2025\/04\/What-is-Exploit-Development.png","alt":""},"title":"What is Exploit Development?","author":{"name":"admin","link":"https:\/\/genxcyber.com\/author\/debrajbasakofficial\/"},"date":"Apr 25, 2025","dateGMT":"2025-04-25 16:54:43","modifiedDate":"2025-04-25 16:54:44","modifiedDateGMT":"2025-04-25 16:54:44","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/genxcyber.com\/category\/tutorials\/exploit-development\/\" rel=\"category tag\">Exploit Development<\/a>","space":"<a href=\"https:\/\/genxcyber.com\/category\/tutorials\/exploit-development\/\" rel=\"category tag\">Exploit Development<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":3,"sec":47},"status":"publish","excerpt":"To build a comprehensive understanding of what exploit development is, its goals, classifications, and how attackers leverage vulnerabilities to hijack program execution. This chapter covers vulnerability classes, real-world scenarios, memory manipulation techniques, and low-level primitives that form the core of exploitation."},{"id":185,"link":"https:\/\/genxcyber.com\/pe-file-format-deep-dive\/","name":"pe-file-format-deep-dive","thumbnail":{"url":"https:\/\/genxcyber.com\/wp-content\/uploads\/2025\/04\/win-pe.png","alt":""},"title":"PE File Format Deep Dive","author":{"name":"admin","link":"https:\/\/genxcyber.com\/author\/debrajbasakofficial\/"},"date":"Apr 25, 2025","dateGMT":"2025-04-25 13:43:43","modifiedDate":"2025-04-25 14:31:06","modifiedDateGMT":"2025-04-25 14:31:06","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/genxcyber.com\/category\/tutorials\/windows-internals\/\" rel=\"category tag\">Windows Internals<\/a>","space":"<a href=\"https:\/\/genxcyber.com\/category\/tutorials\/windows-internals\/\" rel=\"category tag\">Windows Internals<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":3,"sec":40},"status":"publish","excerpt":"Understand the internal structure of Windows Portable Executable (PE) files, including the DOS and NT headers, section table, and directory structures like the Import and Export Address Tables. This is foundational for reverse engineering, malware analysis, loader development, and shellcode injection."},{"id":167,"link":"https:\/\/genxcyber.com\/windows-services-scm-internals\/","name":"windows-services-scm-internals","thumbnail":{"url":"https:\/\/genxcyber.com\/wp-content\/uploads\/2025\/04\/win-sc.png","alt":""},"title":"Windows Services & SCM Internals","author":{"name":"admin","link":"https:\/\/genxcyber.com\/author\/debrajbasakofficial\/"},"date":"Apr 25, 2025","dateGMT":"2025-04-25 13:16:07","modifiedDate":"2025-04-25 14:30:48","modifiedDateGMT":"2025-04-25 14:30:48","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/genxcyber.com\/category\/tutorials\/windows-internals\/\" rel=\"category tag\">Windows Internals<\/a>","space":"<a href=\"https:\/\/genxcyber.com\/category\/tutorials\/windows-internals\/\" rel=\"category tag\">Windows Internals<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":3,"sec":13},"status":"publish","excerpt":"Understand the architecture and functioning of Windows services, how the Service Control Manager (SCM) manages service lifecycles, service types, and dependencies, and how services can be created via the Windows API or directly through the registry. This is essential for both system developers and security professionals analyzing persistence or privilege escalation mechanisms."},{"id":163,"link":"https:\/\/genxcyber.com\/windows-scheduled-tasks\/","name":"windows-scheduled-tasks","thumbnail":{"url":"https:\/\/genxcyber.com\/wp-content\/uploads\/2025\/04\/win-scdl.png","alt":""},"title":"Windows Scheduled Tasks","author":{"name":"admin","link":"https:\/\/genxcyber.com\/author\/debrajbasakofficial\/"},"date":"Apr 25, 2025","dateGMT":"2025-04-25 13:06:42","modifiedDate":"2025-04-25 14:30:21","modifiedDateGMT":"2025-04-25 14:30:21","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/genxcyber.com\/category\/tutorials\/windows-internals\/\" rel=\"category tag\">Windows Internals<\/a>","space":"<a href=\"https:\/\/genxcyber.com\/category\/tutorials\/windows-internals\/\" rel=\"category tag\">Windows Internals<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":3,"sec":15},"status":"publish","excerpt":"Understand the architecture and internals of Windows Task Scheduler, how scheduled tasks are created and executed, and how adversaries abuse them for persistence, privilege escalation, and lateral movement."},{"id":160,"link":"https:\/\/genxcyber.com\/windows-registry-internals\/","name":"windows-registry-internals","thumbnail":{"url":"https:\/\/genxcyber.com\/wp-content\/uploads\/2025\/04\/win-reg.png","alt":""},"title":"Windows Registry Internals","author":{"name":"admin","link":"https:\/\/genxcyber.com\/author\/debrajbasakofficial\/"},"date":"Apr 25, 2025","dateGMT":"2025-04-25 12:48:15","modifiedDate":"2025-04-25 14:29:57","modifiedDateGMT":"2025-04-25 14:29:57","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/genxcyber.com\/category\/tutorials\/windows-internals\/\" rel=\"category tag\">Windows Internals<\/a>","space":"<a href=\"https:\/\/genxcyber.com\/category\/tutorials\/windows-internals\/\" rel=\"category tag\">Windows Internals<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":3,"sec":26},"status":"publish","excerpt":"Explore the internal structure and functionality of the Windows Registry, including its hive-based architecture, key-value model, data types, and how it enables system configuration. Understand how attackers leverage registry paths such as Run keys for persistence, and how defenders can detect and investigate these techniques."}]
[{"id":80,"link":"https:\/\/genxcyber.com\/tools\/advance-code-obfuscator\/","name":"advance-code-obfuscator","thumbnail":{"url":"https:\/\/genxcyber.com\/wp-content\/uploads\/2025\/04\/adv-code-obfs.png","alt":"adv code obfs"},"title":"Advance Code Obfuscator","author":{"name":"admin","link":"https:\/\/genxcyber.com\/author\/debrajbasakofficial\/"},"date":"Apr 25, 2025","dateGMT":"2025-04-25 06:02:22","modifiedDate":"2025-04-25 14:31:33","modifiedDateGMT":"2025-04-25 14:31:33","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/genxcyber.com\/category\/tools\/\" rel=\"category tag\">Tools<\/a>","space":"<a href=\"https:\/\/genxcyber.com\/category\/tools\/\" rel=\"category tag\">Tools<\/a>"},"taxonomies":[],"readTime":{"min":2,"sec":2},"status":"publish","excerpt":"The Advanced Code Obfuscator is a powerful tool designed for developers and security professionals to obscure source code, making it difficult to reverse-engineer or analyze. It supports Python, C++, and C#, and incorporates advanced features such as variable name randomization, string encryption, and comment removal."}]