<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>PIC on Netacoding | Cybersecurity, Assembly &amp; Network Research</title>
    <link>https://netacoding.com/tags/pic/</link>
    <description>Recent content in PIC on Netacoding | Cybersecurity, Assembly &amp; Network Research</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Fri, 03 Apr 2026 17:20:50 +0300</lastBuildDate>
    <atom:link href="https://netacoding.com/tags/pic/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Introduction to Position Independent Code (PIC) Architecture</title>
      <link>https://netacoding.com/posts/pic-entry/</link>
      <pubDate>Fri, 03 Apr 2026 17:20:50 +0300</pubDate>
      <guid>https://netacoding.com/posts/pic-entry/</guid>
      <description>Discover the fundamentals of Position Independent Code (PIC) in x64 Assembly. Learn why it is essential for advanced payloads and how to implement the Stack Anchor technique for sectionless memory management.</description>
    </item>
    <item>
      <title>Building a Reverse Shell in x86-64 Assembly: A Syscall Chain Deep Dive</title>
      <link>https://netacoding.com/posts/reverse_shell-assembly/</link>
      <pubDate>Fri, 03 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://netacoding.com/posts/reverse_shell-assembly/</guid>
      <description>Complete technical breakdown of a TCP reverse shell implementation using Position Independent Code, syscall chains, and the Stack Anchor technique in x86-64 assembly.</description>
    </item>
  </channel>
</rss>
