section .data
msg1 db 'currently learning Reverse Engineering', 0Ah
len1 equ $-msg1
msg2 db 'working with languages like Python, C++, Rust, Intel x86/64 Assembly and more', 0Ah
len2 equ $-msg2
section .text
global _start
_start:
mov eax, 4
mov ebx, 1
mov ecx, msg1
mov edx, len1
int 0x80
mov eax, 4
mov ebx, 1
mov ecx, msg2
mov edx, len2
int 0x80
; mov al, [milkshake]
; mov [mouth], al
; int 0x80
; mov [milkshake], 0
mov eax, 1
xor ebx, ebx
int 0x80
👾
searching for bugs
Popular repositories Loading
-
zip-cracker
zip-cracker PublicZip Cracker is a tool for cracking password-protected ZIP files
Rust 2
-
-
-
-
-
Something went wrong, please refresh the page to try again.
If the problem persists, check the GitHub status page or contact support.
If the problem persists, check the GitHub status page or contact support.