This a post regarding Inversion of Control, particularly Dependency Injection.
In this post I discuss some ideas I've had and captured from my little experience in this hard topic.
This is a somewhat easy/a bit intermediate machine perfect to practice a certain OWASP Top 10 vulnerability. Try it out yourself! Machine link: https://www.vulnhub.com/entry/temple-of-doom-1,243/
If you're into game hacking then you probably have already heard the terms "Internal" and "External" hacks.
In this post I will go over the differences of each with code examples and which to opt for when hacking.
Whether you're a programmer or a game hacker, you have probably dealt with those before, maybe even had a hard time understanding them. Even if you have already used them in game hacking there's a high chance you don't know what they are at the high-level(C/C++ level)!