Lobsters
- Using a PIE binary as a Shared Library https://medium.com/bugbountywriteup/using-a-pie-binary-as-a-shared-library-hcsc-2020-ctf-writeup-390a8a437f31 4 comments reversing
- Using a PIE binary as a Shared Library — My HCSC-2020 CTF Writeup of a hard Reverse Engineering challenge https://medium.com/@an0n_r0/using-a-pie-binary-as-a-shared-library-hcsc-2020-ctf-writeup-390a8a437f31 3 comments netsec
Linked pages
- Ghidra https://ghidra-sre.org/ 368 comments
- hashcat - advanced password recovery https://hashcat.net/hashcat/ 56 comments
- SQLite Home Page http://www.sqlite.org/ 39 comments
- Medium https://medium.com/m/signin?isDraft=1&operation=login&redirect=https%3A%2F%2Fmedium.com%2F%40jamie_34747%2F79d382edf22b%3Fsource%3D 19 comments
- ltrace(1): library call tracer - Linux man page http://linux.die.net/man/1/ltrace 17 comments
- GitHub - Gallopsled/pwntools: CTF framework and exploit development library https://github.com/Gallopsled/pwntools 13 comments
- 08 - Transforming an ELF executable into a library — LIEF Documentation https://lief.quarkslab.com/doc/latest/tutorials/08_elf_bin2lib.html 0 comments
- GitHub - lief-project/LIEF: LIEF - Library to Instrument Executable Formats https://github.com/lief-project/LIEF 0 comments
Related searches:
Search whole site: site:medium.com
Search title: Using a PIE binary as a Shared Library — HCSC-2020 CTF Writeup | by István Tóth | InfoSec Write-ups
See how to search.