Software Exploitation
Hackers are the wizards of the digital age. By now, you are a hacker yourself, but there is still room for your skills to grow. Have you mastered the truly occult? The deep, secret knowledge passed down from generation to secretive generation? The power to truly take control of complex software with cutting-edge security mitigations, and bend it to your will... Push on, now, into the depths of security, and use this dojo to fill your stores of the arcane knowledge that will power your digital sorcery.
Stats
Hacking Now: 12
Hackers: 2,059
Challenges: 173
Solves: 64,647
Awardees: 138
Earliest Awardees:
frqmod
·
r00t
·
/etc/shadow⚡️ (Danial Yunus)
·
X3eRo0
·
nullptr
Latest Awardees:
usdk
·
kolmus
·
ziggy
·
seamaner
·
Dimitri
Modules
-
Return Oriented Programming
2 Hacking
0 / 30 -
Format String Exploits
4 Hacking
0 / 24 -
File Struct Exploits
1 Hacking
0 / 20 -
Dynamic Allocator Misuse
1 Hacking
0 / 40 -
Exploitation Primitives
1 Hacking
0 / 20 -
Dynamic Allocator Exploitation
0 / 16 -
Microarchitecture Exploitation
3 Hacking
0 / 15 -
Kernel Exploitation
0 / 8
30-Day Scoreboard:
Rank | Hacker | Badges | Score |