Lim8en1HTB Write-up: [Kernel Adventures: Part 1]Linux Kernel exploitation CTF challenge write-upJul 18
0x00Spooky License — Reversing Challenge — HackTheBox WriteupGreetings everyone. In this write-up, I’ll be tackling the “Spooky License” challenge — an easy-level (20 points) reversing challenge. I…Feb 17, 2023
Mahmoud ElfawairBITSCTF babyrev writeup using angrHello You, babyrev is an easy rev challenge that you can solve in so many ways, but today i’m going to explain how to solve it using a…Feb 18Feb 18
Mahesh-T (MT)Solving the Trycrackme Challenge using Angr!In my previous article, I discussed about solving the ELF reversing challenge using gdb-PEDA. In this article, I will be solving the same…Jan 19, 2022Jan 19, 2022
Mahmoud Elfawairangr callableHello You, Today I’m going to explain the callable class in angr and how to use it to turn a c binary function into a python function and…Feb 11Feb 11
Lim8en1HTB Write-up: [Kernel Adventures: Part 1]Linux Kernel exploitation CTF challenge write-upJul 18
0x00Spooky License — Reversing Challenge — HackTheBox WriteupGreetings everyone. In this write-up, I’ll be tackling the “Spooky License” challenge — an easy-level (20 points) reversing challenge. I…Feb 17, 2023
Mahmoud ElfawairBITSCTF babyrev writeup using angrHello You, babyrev is an easy rev challenge that you can solve in so many ways, but today i’m going to explain how to solve it using a…Feb 18
Mahesh-T (MT)Solving the Trycrackme Challenge using Angr!In my previous article, I discussed about solving the ELF reversing challenge using gdb-PEDA. In this article, I will be solving the same…Jan 19, 2022
Mahmoud Elfawairangr callableHello You, Today I’m going to explain the callable class in angr and how to use it to turn a c binary function into a python function and…Feb 11
InInfoSec Write-upsbyElNiakUnlocking Malware Mysteries: The Power of SEMAIn a digital landscape besieged by ever-evolving cyber threats, the proliferation of malware poses a formidable challenge. With thousands…Jan 24