<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0">
<channel>
  <title>~Blog of a French coder~</title>
  <link>https://patate.dev</link>
  <description>Blog Posts</description>
  
    
    <item>
      <title>Reverse engineering Guardian-rs's virtualization</title>
      <link>https://patate.dev/pages/reversing_guardianrs1.html</link>
      <guid>https://patate.dev/pages/reversing_guardianrs1.html</guid>
      <pubDate>Mon, 21 Oct 2024 00:00:00 +0000</pubDate>
      <description>Analysis of the Guardian-rs code virtualization project.</description>
    </item>
    <item>
      <title>Reversing VAC winapi hooks</title>
      <link>https://patate.dev/pages/reversing_vac_winapi_hooks.html</link>
      <guid>https://patate.dev/pages/reversing_vac_winapi_hooks.html</guid>
      <pubDate>Sun, 02 Jan 2022 00:00:00 +0000</pubDate>
      <description>This article is about the implementation of winapi hooks inside Valve Anti Cheat (aka VAC).</description>
    </item>
    <item>
      <title>-insecure mode bypass in CS:GO</title>
      <link>https://patate.dev/pages/insecure_mode_bypass.html</link>
      <guid>https://patate.dev/pages/insecure_mode_bypass.html</guid>
      <pubDate>Mon, 31 Jan 2022 00:00:00 +0000</pubDate>
      <description>I will present you how i found an exploit to join VAC secured community servers with the -insecure flag enabled on CS:GO.</description>
    </item>
    <item>
      <title>Introduction to virtualization-based obfuscation</title>
      <link>https://patate.dev/pages/intro_to_virtualization.html</link>
      <guid>https://patate.dev/pages/intro_to_virtualization.html</guid>
      <pubDate>Wen, 01 Apr 2026 00:00:00 +0000</pubDate>
      <description>An introduction to virtualization-based obfuscation, my submission to tmpout volume 5</description>
    </item>
</channel>
</rss>
