22 results for “topic:binaryexploitation”
GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.
These are CTF writeups (Pwn & Reverse Engineering)
Crack this exe
A collection of Pwn writeups.
A Collection of Writeups for Binary Exploitation CTF Problems
ROF - Raw Overflow Forge 🔥 An all-in-one ROP exploitation engine that automates binary analysis, gadget extraction, and payload generation. Perfect for CTF challenges, security research, and learning return-oriented programming techniques.
This repo contains scripts & documentation for buffer overflow exploit development and windows executable(Vulnserver).
binary exploitation project
Write-up on TryHackMe Side quest 2 (SQ2) - Advent of cyber 2025
Cybersecurity - Binary Exploitation
Cybersecurity - Binary Exploitation
Miscellaneous scripts (for CTFs among other things)
Binary Exploitation Challenges Solving and a lot of Binaries Exploitation Challenge i came across through out time
Return-oriented programming (ROP)
I will upload any writeups that I complete for rop emporium
Write up of solutions to the picoCTF 2023 capture the flag (CTF) event from my submissions during the competition.
Cyberchallenge CTF write ups
Tips & Tricks on Binary Exploitation & Reverse Engineering
Solutions and write-up for 2025 PicoCTF competition
CTF writeups covering challenges in Cryptography, Forensics, Programming, Binary Exploitation, Reverse Engineering, and Web Exploitation
Override is a hands-on binary exploitation project focused on identifying and exploiting low-level vulnerabilities in C programs, while bypassing modern protections like Canary, RELRO, NX and PIE.
PicoCTF-Writeup: A collection of solutions and writeups for PicoCTF challenges, documenting problem-solving steps and techniques.