<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Systems Programming on Netacoding | Cybersecurity, Assembly &amp; Network Research</title>
    <link>https://netacoding.com/categories/systems-programming/</link>
    <description>Recent content in Systems Programming on Netacoding | Cybersecurity, Assembly &amp; Network Research</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Fri, 03 Apr 2026 17:20:50 +0300</lastBuildDate>
    <atom:link href="https://netacoding.com/categories/systems-programming/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Introduction to Position Independent Code (PIC) Architecture</title>
      <link>https://netacoding.com/posts/pic-entry/</link>
      <pubDate>Fri, 03 Apr 2026 17:20:50 +0300</pubDate>
      <guid>https://netacoding.com/posts/pic-entry/</guid>
      <description>Discover the fundamentals of Position Independent Code (PIC) in x64 Assembly. Learn why it is essential for advanced payloads and how to implement the Stack Anchor technique for sectionless memory management.</description>
    </item>
    <item>
      <title>Building a Reverse Shell in x86-64 Assembly: A Syscall Chain Deep Dive</title>
      <link>https://netacoding.com/posts/reverse_shell-assembly/</link>
      <pubDate>Fri, 03 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://netacoding.com/posts/reverse_shell-assembly/</guid>
      <description>Complete technical breakdown of a TCP reverse shell implementation using Position Independent Code, syscall chains, and the Stack Anchor technique in x86-64 assembly.</description>
    </item>
    <item>
      <title>Defying Python: Building a Bare-Metal HTTP Server in x86_64 Assembly</title>
      <link>https://netacoding.com/posts/assembly-httpserver/</link>
      <pubDate>Sun, 29 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://netacoding.com/posts/assembly-httpserver/</guid>
      <description>Deep dive into building a zero-dependency HTTP server in pure x64 Assembly. Learn how sys_sendfile and direct syscalls outperform standard implementations.</description>
    </item>
    <item>
      <title>Volatile Storage Mechanisms: A Deep Dive into memfd_create for Memory-Resident Operations</title>
      <link>https://netacoding.com/posts/volatile-storage/</link>
      <pubDate>Fri, 27 Mar 2026 11:30:25 +0300</pubDate>
      <guid>https://netacoding.com/posts/volatile-storage/</guid>
      <description>Master Linux memory-resident operations with memfd_create. Deep dive into syscall 319, x64 Assembly implementation, and forensic resilience for security research.</description>
    </item>
    <item>
      <title>Linux x64 Assembly: The Anatomy of Syscalls and the Secrets of the .bss Segment</title>
      <link>https://netacoding.com/posts/syscall-bss/</link>
      <pubDate>Fri, 27 Mar 2026 11:27:01 +0300</pubDate>
      <guid>https://netacoding.com/posts/syscall-bss/</guid>
      <description>Master Linux x64 Assembly syscalls (open, read, write, exit) and memory management. Understand how registers and the .bss segment handle data flow.</description>
    </item>
    <item>
      <title>Data Sealing to RFC 1071 Standards: Anatomy of a Checksum with x64 Assembly</title>
      <link>https://netacoding.com/posts/rfc-1071/</link>
      <pubDate>Fri, 27 Mar 2026 11:25:05 +0300</pubDate>
      <guid>https://netacoding.com/posts/rfc-1071/</guid>
      <description>Deep dive into RFC 1071 Checksum calculation using x64 Assembly. Master One&amp;#39;s Complement sum, carry handling, and ICMP data integrity for network research.</description>
    </item>
    <item>
      <title>Building a Low-Level ICMP Sniffer in x64 Assembly (Raw Sockets)</title>
      <link>https://netacoding.com/posts/icmp_sniffer/</link>
      <pubDate>Fri, 27 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://netacoding.com/posts/icmp_sniffer/</guid>
      <description>Build a zero-dependency ICMP Sniffer in x64 Assembly using Linux Raw Sockets (syscall 41). Master header stripping and custom Integer-to-ASCII IP conversion.</description>
    </item>
    <item>
      <title>Network Programming in Assembly: A Single-Pass Algorithm for Printing IP Addresses</title>
      <link>https://netacoding.com/posts/algorithmforprinting-ip_addresses/</link>
      <pubDate>Fri, 27 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://netacoding.com/posts/algorithmforprinting-ip_addresses/</guid>
      <description>Solve the IP endianness problem in x64 Assembly. Learn a high-performance single-pass algorithm to convert Big-Endian network bytes to human-readable ASCII strings.</description>
    </item>
  </channel>
</rss>
