CYDES 2023 Pwn Challenge WriteupDuring the competition, I wasnt able to finish the challenge. I was close to finish it but my script doesnt work for some reason. So, after…Jul 13, 2023A response icon1Jul 13, 2023A response icon1
Binary Exploitation: Heap Overflow to Overwrite GOTHeap overflow attack and overwrite Global Offset Table in a simple binary exploitation challengeSep 19, 2022Sep 19, 2022
How To Reverse Engineer Executable FilesHi readers! In this blog I will show you step by step on how to reverse engineer an executable file written in C. Reverse engineering can…Apr 25, 2022A response icon3Apr 25, 2022A response icon3
Vulnhub Nezuko writeupWalkthrough vulnhub machine by yunaranyancat called NezukoJan 22, 2022A response icon1Jan 22, 2022A response icon1
Easy Buffer OverflowSolving a simple buffer overflow challenge from HackThebox Cyber Santa (Mr Snowy)Jan 12, 2022Jan 12, 2022
PNG structure for beginnerLearn PNG file structure to solve basic CTF forensics challengeNov 7, 2021Nov 7, 2021