CTF solving using radare2 / Blogs
SecurisecCTF
SecurisecCTF is looking for new members! We are an open to all Slack community focused on all aspects of information security, and CTF team! Anyone with any skill level is welcome to join. Our goal is to teach/learn from each other. #ctf #infosec http://www.securisec.com This is not a radare2 group, or is not affiliated with radare2 in anyway We do promote healthy discussions on reverse enginnering!
-
Tools! Tools! Tools! Capitol City's solvingest binaries. They're not even obfuscating their bytes.
-
-
Google CTF 2017 qualifier PWN challenge
-
-
-
TUCTF 2017 Unknown writeup. This is an example of brute forcing strings based on a returned true statement using by patching on the fly
-
-
Write-ups from RHME3 pre-qualifications at RADARE2 conference - Riscure
-
Three different writeups for the same challenge all using radare2
-
- CMU Binary bomb phase 2 by ctfsolver
-
Using radare2 and angr to solve the challenge
-
- Solving game2 from the badge of Black Alps 2017 with radare2
- TUMCTF Zwiebel
-
-
Writeup using r2 is halfway into the post
-
- Intro to r2 Insinuator
- Linux Malware Analysis — Why Homebrew Encryption is Bad
- Redvelvet codegate 2017 r2+angr+ida :(
- Ioli crackme writeups (various)
- Xiomara 2018 slammer
- TAMUCTF 18 Cutter
- Harekaze 2018 EzReverse
- Self modifying binary
- Solving bomblab with r2
- Gynvael mission 22
- Bomblab moveax
- ROPping to victory
- 📼 Solving a Self-modifying Crackme with r2pipe EMU vs DBG vs XOR
- Reversing MalwareTech challenge with Radare2 and inline assembly
- ROPping to Victory
- smcauth defcon qual 2018
- Emulating decryption function with radare2
- Hackcon-2018-WarChange