Skip to content

Latest commit

 

History

History
11 lines (6 loc) · 424 Bytes

binary-exploitation.md

File metadata and controls

11 lines (6 loc) · 424 Bytes

Binary Exploitation

This category focuses on exploiting vulnerabilities in "binaries", or compiled programs, such as buffer overflow attacks, return-oriented programming, etc. The binary exploitation challenges this year include: