Files
patate.dev/rss/feed.xml
ALittlePatate af4fbd3355
All checks were successful
Deploy Website / deploy (push) Successful in 7s
feat: added rss feed
2025-12-05 18:35:22 +01:00

32 lines
1.4 KiB
XML

<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0">
<channel>
<title>~Blog of a French coder~</title>
<link>https://patate.dev</link>
<description>Blog Posts</description>
<item>
<title>Reverse engineering Guardian-rs's virtualization</title>
<link>https://patate.dev/pages/reversing_guardianrs1.html</link>
<guid>https://patate.dev/pages/reversing_guardianrs1.html</guid>
<pubDate>Mon, 21 Oct 2024 00:00:00 +0000</pubDate>
<description>Analysis of the Guardian-rs code virtualization project.</description>
</item>
<item>
<title>Reversing VAC winapi hooks</title>
<link>https://patate.dev/pages/reversing_vac_winapi_hooks.html</link>
<guid>https://patate.dev/pages/reversing_vac_winapi_hooks.html</guid>
<pubDate>Sun, 02 Jan 2022 00:00:00 +0000</pubDate>
<description>This article is about the implementation of winapi hooks inside Valve Anti Cheat (aka VAC).</description>
</item>
<item>
<title>-insecure mode bypass in CS:GO</title>
<link>https://patate.dev/pages/insecure_mode_bypass.html</link>
<guid>https://patate.dev/pages/insecure_mode_bypass.html</guid>
<pubDate>Mon, 31 Jan 2022 00:00:00 +0000</pubDate>
<description>I will present you how i found an exploit to join VAC secured community servers with the -insecure flag enabled on CS:GO.</description>
</item>
</channel>
</rss>