Thuri
published on 2021-12-17 The goal of this challenge is to understand how function arguments are passed in 64-bit machine when doing return oriented programming.
Thuri
published on 2021-12-17 Goal of the challenge is to understand how to abuse readable and writable memory regions in binary files
Thuri
published on 2021-12-07 The goal of strings challenges is to understand implementation of strings in malware through static analysis. Strings are very useful in storing the configurations, decryption keys, data and C2 server addresses.
Thuri
published on 2021-12-07 vm1.exe implements a simple 8-bit virtual machine (VM) to try and stop reverse engineers from retrieving the flag
Thuri
published on 2021-11-20 Android application security is an important aspect in developer workflow in ensuring confidentility, integrity and Accessibility of an application.