Reverse Engineering for Pwn

Understand the binary and find vulnerabilities by analyzing it

Last updated