Sector: Reverse Engineering / Binary Exploitation

In this section, I publish walkthroughs for Reverse Engineering challenges related to binary analysis and exploitation. These reports document my methodology for disassembling and debugging code to understand its inner mechanisms without access to source code and subvert execution to the attacker’s favor.

0 items under this folder.