Chaining PLT calls with a multi-argument ROP gadget to invoke three functions in sequence
Chaining PLT calls with a multi-argument ROP gadget to invoke three functions in sequence
Classic buffer overflow exploiting a vulnerable read() to redirect execution to a win function
Intercepting & monitoring Windows API calls to find a flag in a hidden buffer
Reversing decompiled C++ code to extract a flag by tracing string manipulation logic
Bypassing an infinite debugger-killing loop by NOP'ing an unconditional jump
Bypassing simple anti-debugging techniques in a Windows executable through dynamic analysis