~/forbannet/blog~index
now compiling: io_uring branch, --releaselatest push: e8af13c → main · 12 min agoreading: "What Every Programmer Should Know About Memory" — Drepper, 2007currently playing with: ftrace + perf for syscall latencyopen PRs: 3 · issues triaged today: 14now compiling: io_uring branch, --releaselatest push: e8af13c → main · 12 min agoreading: "What Every Programmer Should Know About Memory" — Drepper, 2007currently playing with: ftrace + perf for syscall latencyopen PRs: 3 · issues triaged today: 14
Techie#5782
Techie#5782guest
index of /blog

writing about the things i break for fun.

kernels, packet decoders, mmorpg internals, the occasional rant.

posts 11
drafts 0
last commit live
FILTER / SORT
//·dev·2025·001·0xD240published
4D 55 5F 4F 4E 4C 49 4E 45 5F 50 52 4F 54 4F 43 4F 4C
0040A0F0  55                PUSH    EBP
0040A0F1  8B EC             MOV     EBP, ESP
0040A0F3  83 EC 14          SUB     ESP, 14h
0040A0F6  E8 25 00 00 00    CALL    0x0040A120
0040A0FB  0F B6 45 08       MOVZX   EAX, BYTE [EBP+8]
0040A0FF  85 C0             TEST    EAX, EAX
0040A101  74 0A             JZ      0x0040A10D
0040A103  8B 45 08          MOV     EAX, [EBP+8]
0040A106  50                PUSH    EAX
0040A107  E8 14 00 00 00    CALL    DecryptPacket
0040A10C  C9                LEAVE
0040A10D  C3                RET
4D 55 5F 5F 5F 0xDEADBEEF 5F 5F 4D 55 5F 5F 5F 5F 5F 5F
target·main.cs
Programming

μBiT::EYE MinerPulse

MicroBT WhatsMiner Observability Tool. Free and Open Source. It is really, really cool, come check it out.

Date
14.09.25
Read
15 min
Cmnt
5
~/blog/clbiteyecl-minerpulse
//·hw·2022·002·0xAB8Bpublished
4D 55 5F 4F 4E 4C 49 4E 45 5F 50 52 4F 54 4F 43 4F 4C
0040A0F0  55                PUSH    EBP
0040A0F1  8B EC             MOV     EBP, ESP
0040A0F3  83 EC 14          SUB     ESP, 14h
0040A0F6  E8 25 00 00 00    CALL    0x0040A120
0040A0FB  0F B6 45 08       MOVZX   EAX, BYTE [EBP+8]
0040A0FF  85 C0             TEST    EAX, EAX
0040A101  74 0A             JZ      0x0040A10D
0040A103  8B 45 08          MOV     EAX, [EBP+8]
0040A106  50                PUSH    EAX
0040A107  E8 14 00 00 00    CALL    DecryptPacket
0040A10C  C9                LEAVE
0040A10D  C3                RET
4D 55 5F 5F 5F 0xDEADBEEF 5F 5F 4D 55 5F 5F 5F 5F 5F 5F
target·ddr5.bin
Hardware / OC

*Fresh* DDR5 Benchmark Results

Fiddling with my current DDR5 kit and collecting some benchmark results (trying to match Quad DDR4 Performance).

Date
16.12.22
Read
6 min
Cmnt
0
~/blog/fresh-ddr5-benchmark-results
//·misc·2022·004·0xB838published
4D 55 5F 4F 4E 4C 49 4E 45 5F 50 52 4F 54 4F 43 4F 4C
0040A0F0  55                PUSH    EBP
0040A0F1  8B EC             MOV     EBP, ESP
0040A0F3  83 EC 14          SUB     ESP, 14h
0040A0F6  E8 25 00 00 00    CALL    0x0040A120
0040A0FB  0F B6 45 08       MOVZX   EAX, BYTE [EBP+8]
0040A0FF  85 C0             TEST    EAX, EAX
0040A101  74 0A             JZ      0x0040A10D
0040A103  8B 45 08          MOV     EAX, [EBP+8]
0040A106  50                PUSH    EAX
0040A107  E8 14 00 00 00    CALL    DecryptPacket
0040A10C  C9                LEAVE
0040A10D  C3                RET
4D 55 5F 5F 5F 0xDEADBEEF 5F 5F 4D 55 5F 5F 5F 5F 5F 5F
target·notes.txt
Misc / Random

A Working Detours Guide (っ◔◡◔)っ

If you are struggling with Detours and everything you find on Github doesn't compile? Well, this one will compile! <clb>It works!</clb>

Date
16.06.22
Read
11 min
Cmnt
0
~/blog/a-working-detours-guide
//·dev·2022·003·0x88C1published
4D 55 5F 4F 4E 4C 49 4E 45 5F 50 52 4F 54 4F 43 4F 4C
0040A0F0  55                PUSH    EBP
0040A0F1  8B EC             MOV     EBP, ESP
0040A0F3  83 EC 14          SUB     ESP, 14h
0040A0F6  E8 25 00 00 00    CALL    0x0040A120
0040A0FB  0F B6 45 08       MOVZX   EAX, BYTE [EBP+8]
0040A0FF  85 C0             TEST    EAX, EAX
0040A101  74 0A             JZ      0x0040A10D
0040A103  8B 45 08          MOV     EAX, [EBP+8]
0040A106  50                PUSH    EAX
0040A107  E8 14 00 00 00    CALL    DecryptPacket
0040A10C  C9                LEAVE
0040A10D  C3                RET
4D 55 5F 5F 5F 0xDEADBEEF 5F 5F 4D 55 5F 5F 5F 5F 5F 5F
target·main.cs
Programming

HWHash beta is out!

Thank you all for over 12,000 downloads of the alpha version! And a huge shoutout for the 1,400+ NuGet downloads on the current version!

Date
16.06.22
Read
6 min
Cmnt
0
~/blog/hwhash-beta-is-out
//·dev·2021·005·0xA889published
4D 55 5F 4F 4E 4C 49 4E 45 5F 50 52 4F 54 4F 43 4F 4C
0040A0F0  55                PUSH    EBP
0040A0F1  8B EC             MOV     EBP, ESP
0040A0F3  83 EC 14          SUB     ESP, 14h
0040A0F6  E8 25 00 00 00    CALL    0x0040A120
0040A0FB  0F B6 45 08       MOVZX   EAX, BYTE [EBP+8]
0040A0FF  85 C0             TEST    EAX, EAX
0040A101  74 0A             JZ      0x0040A10D
0040A103  8B 45 08          MOV     EAX, [EBP+8]
0040A106  50                PUSH    EAX
0040A107  E8 14 00 00 00    CALL    DecryptPacket
0040A10C  C9                LEAVE
0040A10D  C3                RET
4D 55 5F 5F 5F 0xDEADBEEF 5F 5F 4D 55 5F 5F 5F 5F 5F 5F
target·main.cs
Programming

A quirky Terminal in HTML/CSS/JS

I dedicated a few hours to creating a <clb>punk</clb> terminal for a personal project.

Date
09.09.21
Read
4 min
Cmnt
0
~/blog/a-quirky-terminal-in-htmlcssjs
//·misc·2017·010·0x930Fpublished
4D 55 5F 4F 4E 4C 49 4E 45 5F 50 52 4F 54 4F 43 4F 4C
0040A0F0  55                PUSH    EBP
0040A0F1  8B EC             MOV     EBP, ESP
0040A0F3  83 EC 14          SUB     ESP, 14h
0040A0F6  E8 25 00 00 00    CALL    0x0040A120
0040A0FB  0F B6 45 08       MOVZX   EAX, BYTE [EBP+8]
0040A0FF  85 C0             TEST    EAX, EAX
0040A101  74 0A             JZ      0x0040A10D
0040A103  8B 45 08          MOV     EAX, [EBP+8]
0040A106  50                PUSH    EAX
0040A107  E8 14 00 00 00    CALL    DecryptPacket
0040A10C  C9                LEAVE
0040A10D  C3                RET
4D 55 5F 5F 5F 0xDEADBEEF 5F 5F 4D 55 5F 5F 5F 5F 5F 5F
target·notes.txt
Misc / Random

Socks5 Proxy Server For the Lazy

If you ever need a Socks 5 Proxy server, and you need it quick, like, <cl>RIGHT NOW</cl>, I can help you out!

Date
10.02.17
Read
2 min
Cmnt
0
~/blog/socks5-proxy-server-for-the-lazy
//·dev·2021·006·0x1F82published
4D 55 5F 4F 4E 4C 49 4E 45 5F 50 52 4F 54 4F 43 4F 4C
0040A0F0  55                PUSH    EBP
0040A0F1  8B EC             MOV     EBP, ESP
0040A0F3  83 EC 14          SUB     ESP, 14h
0040A0F6  E8 25 00 00 00    CALL    0x0040A120
0040A0FB  0F B6 45 08       MOVZX   EAX, BYTE [EBP+8]
0040A0FF  85 C0             TEST    EAX, EAX
0040A101  74 0A             JZ      0x0040A10D
0040A103  8B 45 08          MOV     EAX, [EBP+8]
0040A106  50                PUSH    EAX
0040A107  E8 14 00 00 00    CALL    DecryptPacket
0040A10C  C9                LEAVE
0040A10D  C3                RET
4D 55 5F 5F 5F 0xDEADBEEF 5F 5F 4D 55 5F 5F 5F 5F 5F 5F
target·main.cs
Programming

Reverse Engineering MU Online Protocol

MU Online is old, ancient, but their protocol is something that I still enjoy to this day! And I've learned a lot from what could be called the first <cl>real</cl> MMORPG networking. And it has been done right.

Date
12.02.21
Read
8 min
Cmnt
0
~/blog/reverse-engineering-mu-online-protocol
//·dev·2020·007·0x71D7published
4D 55 5F 4F 4E 4C 49 4E 45 5F 50 52 4F 54 4F 43 4F 4C
0040A0F0  55                PUSH    EBP
0040A0F1  8B EC             MOV     EBP, ESP
0040A0F3  83 EC 14          SUB     ESP, 14h
0040A0F6  E8 25 00 00 00    CALL    0x0040A120
0040A0FB  0F B6 45 08       MOVZX   EAX, BYTE [EBP+8]
0040A0FF  85 C0             TEST    EAX, EAX
0040A101  74 0A             JZ      0x0040A10D
0040A103  8B 45 08          MOV     EAX, [EBP+8]
0040A106  50                PUSH    EAX
0040A107  E8 14 00 00 00    CALL    DecryptPacket
0040A10C  C9                LEAVE
0040A10D  C3                RET
4D 55 5F 5F 5F 0xDEADBEEF 5F 5F 4D 55 5F 5F 5F 5F 5F 5F
target·main.cs
Programming

Encapsulation is not a Silver Bullet

Pretty self explanatory, yeah?

Date
14.02.20
Read
8 min
Cmnt
0
~/blog/encapsulation-is-not-a-silver-bullet
//·hw·2019·008·0x9E6Bpublished
4D 55 5F 4F 4E 4C 49 4E 45 5F 50 52 4F 54 4F 43 4F 4C
0040A0F0  55                PUSH    EBP
0040A0F1  8B EC             MOV     EBP, ESP
0040A0F3  83 EC 14          SUB     ESP, 14h
0040A0F6  E8 25 00 00 00    CALL    0x0040A120
0040A0FB  0F B6 45 08       MOVZX   EAX, BYTE [EBP+8]
0040A0FF  85 C0             TEST    EAX, EAX
0040A101  74 0A             JZ      0x0040A10D
0040A103  8B 45 08          MOV     EAX, [EBP+8]
0040A106  50                PUSH    EAX
0040A107  E8 14 00 00 00    CALL    DecryptPacket
0040A10C  C9                LEAVE
0040A10D  C3                RET
4D 55 5F 5F 5F 0xDEADBEEF 5F 5F 4D 55 5F 5F 5F 5F 5F 5F
target·ddr5.bin
Hardware / OC

X299X, Windows&Linux

Ranting on Intel's HEDT, performance, monitoring, stability, internet hype and real world usage.

Date
17.10.19
Read
4 min
Cmnt
0
~/blog/x299x-windowslinux
//·misc·2019·009·0x93F3published
4D 55 5F 4F 4E 4C 49 4E 45 5F 50 52 4F 54 4F 43 4F 4C
0040A0F0  55                PUSH    EBP
0040A0F1  8B EC             MOV     EBP, ESP
0040A0F3  83 EC 14          SUB     ESP, 14h
0040A0F6  E8 25 00 00 00    CALL    0x0040A120
0040A0FB  0F B6 45 08       MOVZX   EAX, BYTE [EBP+8]
0040A0FF  85 C0             TEST    EAX, EAX
0040A101  74 0A             JZ      0x0040A10D
0040A103  8B 45 08          MOV     EAX, [EBP+8]
0040A106  50                PUSH    EAX
0040A107  E8 14 00 00 00    CALL    DecryptPacket
0040A10C  C9                LEAVE
0040A10D  C3                RET
4D 55 5F 5F 5F 0xDEADBEEF 5F 5F 4D 55 5F 5F 5F 5F 5F 5F
target·notes.txt
Misc / Random

Silkroad Online Clientless Bot

Just showcasing my Silkroad Online Bot! It works for both iSRO (International Silkroad) and TRSRO.

Date
08.02.19
Read
1 min
Cmnt
0
~/blog/silkroad-online-clientless-bot
//·dev·2015·011·0x5B66published
4D 55 5F 4F 4E 4C 49 4E 45 5F 50 52 4F 54 4F 43 4F 4C
0040A0F0  55                PUSH    EBP
0040A0F1  8B EC             MOV     EBP, ESP
0040A0F3  83 EC 14          SUB     ESP, 14h
0040A0F6  E8 25 00 00 00    CALL    0x0040A120
0040A0FB  0F B6 45 08       MOVZX   EAX, BYTE [EBP+8]
0040A0FF  85 C0             TEST    EAX, EAX
0040A101  74 0A             JZ      0x0040A10D
0040A103  8B 45 08          MOV     EAX, [EBP+8]
0040A106  50                PUSH    EAX
0040A107  E8 14 00 00 00    CALL    DecryptPacket
0040A10C  C9                LEAVE
0040A10D  C3                RET
4D 55 5F 5F 5F 0xDEADBEEF 5F 5F 4D 55 5F 5F 5F 5F 5F 5F
target·main.cs
Programming

How 4 bytes got me into programming

It was around 2004 when I decided that I wanted to be a programmer, and all because of C1 04 37 BE.

Date
15.01.15
Read
2 min
Cmnt
0
~/blog/how-4-bytes-got-me-into-programming