Sector: Reverse Engineering / Binary Exploitation
In this section, I publish walkthroughs for Reverse Engineering challenges related to binary analysis and exploitation. These reports document my methodology for disassembling and debugging code to understand its inner mechanisms without access to source code and subvert execution to the attacker’s favor.