Software Exploitation.
Hackers are the wizards of the digital age. By now, you are a hacker yourself, but there is still room for your skills to grow. Have you mastered the truly occult? The deep, secret knowledge passed down from generation to secretive generation? The power to truly take control of complex software with cutting-edge security mitigations, and bend it to your will... Push on, now, into the depths of security, and use this dojo to fill your stores of the arcane knowledge that will power your digital sorcery.
Stats
Hacking Now: 17
Hackers: 1,108
Challenges: 104
Solves: 22,956
Awardees: 164
Earliest Awardees:
frqmod
·
Neural ASCENDED
·
gallium
·
r00t
·
Torashulk ASCENDED
Latest Awardees:
syedisamhashmi
·
CredinDumnezeu
·
nendo
·
Augustus
·
p1ain0
Modules
-
Format String Exploits
3 Hacking
0 / 24 -
File Struct Exploits
5 Hacking
0 / 21 -
Exploitation Primitives
1 Hacking
0 / 20 -
Dynamic Allocator Exploitation
3 Hacking
0 / 16 -
Microarchitecture Exploitation
2 Hacking
0 / 15 -
Kernel Exploitation
3 Hacking
0 / 8
30-Day Scoreboard:
Rank | Hacker | Badges | Score |