Explore >> Select a destination


You are here

satharus.me
| | gebir.ge
2.5 parsecs away

Travel
| | [AI summary] The author documents their learning journey into binary analysis by manually patching assembly instructions and using LD_PRELOAD hooking to reverse the logic of a string comparison function.
| | www.bitsnbites.eu
2.8 parsecs away

Travel
| | [AI summary] This article provides a quick introduction to developing software for the open-source MRISC32 32-bit RISC architecture using a GCC-based toolchain and a simulator, including examples from compiling C code and running DOOM.
| | squanderingti.me
1.1 parsecs away

Travel
| | Exploring the innards of an ELF binary to find the physical location of main.
| | blog.nuculabs.de
15.6 parsecs away

Travel
| I've recently finished reading a book called Practical Binary Analysis which I consider a state of the art book (review will come soon) and I would like to post my solution to the crackme found in chapter 5. 1. A New CTF ChallengeComplete the new CTF challenge unlocked by the oracle program!You can complete the entire challenge using only the tools discussedin this chapter and what you learned in Chapter 2. After completingthe challenge, don't forget to give the flag you found to the oracle tounlock the next challenge