x86   4524

« earlier    

Pony Playground
The play ground supports assembly output
x86  code-generation 
6 days ago by tomcam
Latency, throughput, and port usage data for x86
"provides more than 200,000 pages with detailed latency, throughput, and port usage data for most x86 instructions on all generations of Intel's Core architecture (i.e., from Nehalem to Coffee Lake). While such data is important for understanding, predicting, and optimizing the performance of software running on these microarchitectures, most of it is not documented in Intel's official processor manuals."
hardware  intel  performance  reference  x86 
7 days ago by mechazoidal
Supply Chain Security Speculation – the grugq – Medium
The real takeaway from this is that IPMI is a raging tire fire, BMCs are Satan spawn, and never ever expose IPMI interfaces to the Internet
ipmi  x86  supermicro  security  apple  aws  supermicrocaper 
11 days ago by yorksranter
rv8
RISC-V simulator for x86-64
riscv  x86  hardware 
12 days ago by Z303
Positive Technologies - learn and secure : Intel ME Manufacturing Mode: obscured dangers and their relationship to Apple MacBook vulnerability CVE-2018-4251
"Our research shows that Intel ME has a Manufacturing Mode problem, and that even giant manufacturers such as Apple are not immune to configuration mistakes on Intel platforms. Worse still, there is no public information on the topic, leaving end users in the dark about weaknesses that could result in data theft, persistent irremovable rootkits, and even "bricking" of hardware.
We also suspect that the ability to reset ME without resetting the main CPU may lead to yet additional security issues, due to the states of the BIOS/UEFI and ME falling out of sync.
intel_me  intel  x86  security  2018 
17 days ago by mechazoidal
mu/subx at master · akkartik/mu · GitHub
SubX is a thin layer of syntactic sugar over (32-bit x86) machine code. The SubX translator (it's too simple to be called a compiler, or even an assembler) generates ELF binaries that require just a Unix-like kernel to run. (The translator isn't self-hosted yet; generating the binaries does require a C++ compiler and runtime.)
programming  assembler  X86  ELF  unix 
17 days ago by mwishek
radare - a portable reversing framework
Disassemble (and assemble for) many different architectures
Debug with local native and remote debuggers (gdb, rap, webui, r2pipe, winedbg, windbg)
Run on Linux, *BSD, Windows, OSX, Android, iOS, Solaris and Haiku
Perform forensics on filesystems and data carving
Be scripted in Python, Javascript, Go and more
Support collaborative analysis using the embedded webserver
Visualize data structures of several file types
Patch programs to uncover new features or fix vulnerabilities
Use powerful analysis capabilities to speed up reversing
Aid in software exploitation
assembly  x86  arm  radare 
19 days ago by vilcans
x86 Addressing Under the Hood — Paul Bone
In this article we take a look at how the operands of x86 instructions are encoded.
x86_64  x86  memory  addressing-mode 
23 days ago by grinful

« earlier    

related tags

//  1st  2018  64-bit  64  64bit  8087  addressing-mode  advanced  amd  amd64  analysis  android  appimage  apple  applications  apps  arch  architecture  archived.version  archived  arduino  arm  article  asm  assembler  assembly  avx  aws  backdoor  badtech  bbs  big-endian  bit  book  books  boost  boot  bootsector  browser  bug  build  byte-order  byte-ordering  c  c3  cache  centos  chess  china  chips  cli  cloud  code-generation  code  coding  command  comparch  comparison  compiler  compilers  computing  course  cpu  critcode  culture  debian  demo  demos  demoscene  development  disassembler  disassemblers  disassembly  discovered  discussion  documentation  dos  double  downloads  dynamic  egghunter  elf  embedded  emulator  emulators  endianness  engineering  example  explainingcomputers  exploit  exploits  fedora  float  floss  fpu  free  freeware  from:arstechnica  fuzzing  game  github  gpu  hackernews  hacking  hardware  haxm  history  howto  hsa  hsail  https://twitter.com/thatcks/status/1035743689254100992  hyper-v  hypervisor  in  install  instrumentation  intel  intel_me  iopb  iphone  ipmi  isa  javascript  jit  kernel  lanner  learning  leartn  lecture  links  linux  little-endian  llvm  lua  mechanism  memcpy  memory  mini  minimal  minipc  minix  mint  mips  music  nacl  nasm  nehemiah  no  of  officeapp  openbsd  opensource  operating_systems  optimisation  os  os2museum  osdev  overview  ovum  packages  packaging  palmos  pc  pdf  pentesting  performance  pfsense  pi  plus  pmz  powerpc  processors  productivity  programming  proxmox  qualcomm  radare  redhat  reference  repo:github  repository  reveng  reverse-engineering  reverse  reverse_engineering  reverseengineering  review  risc  riscv  rop  rust  sandpile  scene  security  server  shaders  simd  size  slice  snake  software  source  sourcecode  sparc  spectre  speed  supermicro  supermicrocaper  suse  sysadmin  systemsprogramming  tech  terminal  the  ti  tiny-code  tiny  tip  tips  tool  tools  tracking  tss  tut  tutorial  ubuntu  udoo  underground  unix  unknown  usecases  via  video  videos  virtualization  vlsi  vm  vulnerability  warez  webassembly  windows  x11  x64  x86-64  x86:  x86_64 

Copy this bookmark:



description:


tags: