Microcorruption

Using buffer overflows, breakpoints and guesswork, I worked my way through a series of reverse engineering challenges.

Posted on