River

  • Home
  • Archive
  • Categories
  • Tags
  • Search
  • 2025

  • 2025-02-08
    picoCTF: WinAntiDbg0x100

    Bypassing simple anti-debugging techniques in a Windows executable through dynamic analysis

  • 2024

  • 2024-11-02
    picoCTF: Crackme-py

    A simple python challenge

  • 2024-11-02
    picoCTF: Shop

    Learning Ghidra basics

  • 2024-11-02
    PicoCTF: Weird Snake

    Analyzing bytecode to reverse engineer an XOR key

  • 2024-10-30
    PicoCTF: Packer

    Reverse engineering a simple linux executable

  • 2024-10-22
    PicoCTF: Heap 1

    Writing and understanding a buffer overflow payloads

  • 2024-10-22
    PicoCTF: Heap 2

    Utilizing a buffer overflow payloads to override pointers

  • 2024-10-22
    picoCTF: Heap 3

    Leveraging a UAF vulnerability to manipulate heap allocation

  • 2024-09-14
    picoCTF: Trickster

    Exploiting a site that only accepts PNG files

  • 2024-08-27
    picoCTF: Format String 1

    Easy format string vulnerability

Page 2 of 3
Copyright © 2024-2026 River
  • Home
  • Archive
  • Categories
  • Tags
  • Search