0xwanCYDES 2023 Pwn Challenge WriteupDuring the competition, I wasnt able to finish the challenge. I was close to finish it but my script doesnt work for some reason. So, after…Jul 13, 20231Jul 13, 20231
0xwanBinary Exploitation: Heap Overflow to Overwrite GOTHeap overflow attack and overwrite Global Offset Table in a simple binary exploitation challengeSep 19, 2022Sep 19, 2022
0xwanHow To Reverse Engineer Executable FilesHi readers! In this blog I will show you step by step on how to reverse engineer an executable file written in C. Reverse engineering can…Apr 25, 20223Apr 25, 20223
0xwanVulnhub Nezuko writeupWalkthrough vulnhub machine by yunaranyancat called NezukoJan 22, 20221Jan 22, 20221
0xwanEasy Buffer OverflowSolving a simple buffer overflow challenge from HackThebox Cyber Santa (Mr Snowy)Jan 12, 2022Jan 12, 2022
0xwanPNG structure for beginnerLearn PNG file structure to solve basic CTF forensics challengeNov 7, 2021Nov 7, 2021