pwn
Babiersteps
Babiersteps
· ☕ 1 min read
A classic ret2win challenge on a 64-bit binary, overflow RIP with win() address to get flag.

Babysteps
Babysteps
· ☕ 2 min read
A classic ret2shellcode with a twist, we use a gadget to execute our code off the stack. binary is 32-bit.

Detour
Detour
· ☕ 3 min read
A write-what-where scenario that enables us to overwrite the destructor (dtor) in the relocations table with our win() function to get a shell.

Dweeno
Dweeno
· ☕ 3 min read
A hardware challenge where we're given some serial output from a Arduino and the corresponding wiring diagram and encryption source code.

Leaky Pipe - 0xL4ugh CTF
· ☕ 3 min read
In this challenge we recieved a binary in which we are asked to exploit and somehow retrieve the flag.

Trigger Happy - 0xL4ugh CTF
· ☕ 7 min read
This is a challenge from 0xl4ugh CTF which was inspired by RACTF's not really ai challenge.

Not Really AI - RA CTF
· ☕ 6 min read
This is a Binary exploitaion challenge, based around a format string vulnerability.