setting up an armv8 aarch64 arch linux qemu image (uefi booted)


walkthrough for gaining access on lightweight machine on hackthebox


walkthrough for gaining access on irked machine on hackthebox



basic ROP-chaining with arguments check


reverse engineering a memory dump to obtain the password


buffer overflow exploitation with static canary


reverse engineering the executable to obtain a valid serial



reverse engineering the executable to decrypt the flag stored in memory