River

  • Home
  • Archive
  • Categories
  • Tags
  • Search
  • 2026

  • 2026-01-27
    ROP Emporium: split

    Building a ROP chain to call system() with a custom string argument

  • 2026-01-25
    ROP Emporium: ret2win

    Classic buffer overflow exploiting a vulnerable read() to redirect execution to a win function

  • 2025

  • 2025-05-02
    picoCTF: Binary Instrumentation II

    Intercepting & monitoring Windows API calls to find a flag in a hidden buffer

  • 2025-05-01
    PicoCTF: Binary Instrumentation I

    Bypassing sleep functions using Frida

  • 2025-04-23
    picoCTF: FactCheck

    Reversing decompiled C++ code to extract a flag by tracing string manipulation logic

  • 2025-04-22
    PicoCTF: WinAntiDbg0x300

    Bypassing an infinite debugger-killing loop by NOP'ing an unconditional jump

  • 2025-04-03
    picoCTF: WinAntiDbg0x200

    Further bypassing anti-debugging checks by editing register values

  • 2025-02-08
    picoCTF: WinAntiDbg0x100

    Bypassing simple anti-debugging techniques in a Windows executable through dynamic analysis

  • 2024

  • 2024-11-02
    picoCTF: Crackme-py

    A simple python challenge

  • 2024-11-02
    picoCTF: Shop

    Learning Ghidra basics

Page 1 of 3
Copyright © 2024-2026 River
  • Home
  • Archive
  • Categories
  • Tags
  • Search