Archives
- 20 Dec Qt gif parsing, Null deref rediscovered
- 13 Dec LINE.exe unpacking
- 06 Nov How to Detect Vulnerabilities in Software When No Source Code Is Available
- 10 Oct Finding Vulnerabilities in Closed Source Windows Software by Applying Fuzzing
- 25 Jun [gCTF: MicroServiceDaemonOS] Reversing and exploiting ELF file.
- 08 Oct [InCTF:Kernel Reversing Part 2] NetBSD kernel module.
- 30 Sep [DragonSector Teaser:Production] Analyzing C sources.
- 17 Sep [CSAW:doubletrouble] Floating point sort.
- 08 Sep [noxCTF:Avatar] Just reversing, bruteforcing and guessing.
- 13 Aug [TJCTF:Super Secure Secrets] x64 formatstring
- 01 Aug [ISITDTU CTF:inter] Reversing inter.exe
- 28 Jun [Google CTF:APT42 - Part 1] Unfinished RE
- 26 Jun [Google CTF:sftp] Randomized heap :D
- 17 Jun [MatesCTF:The Numbers] Using Z3 to solve math equations.
- 24 May [RCTF:simple-vm] Solving simple VM.
- 24 May [RCTF:babyre] RE without IDA.
- 18 Feb How to solve OWASP Juice shop. Part1. Score table.