basic ROP-chaining with arguments check


reverse engineering a memory dump to obtain the password


buffer overflow exploitation with static canary


reverse engineering the executable to obtain a valid serial



reverse engineering the executable to decrypt the flag stored in memory


using gdb macro to read a register every breakpoint stop


binary task with simple format string vulnerability


third binary task where speeding up the executable is required


second binary task where speeding up the executable is required