Software Exploitation
Hackers are the wizards of the digital age. By now, you are a hacker yourself, but there is still room for your skills to grow. Have you mastered the truly occult? The deep, secret knowledge passed down from generation to secretive generation? The power to truly take control of complex software with cutting-edge security mitigations, and bend it to your will... Push on, now, into the depths of security, and use this dojo to fill your stores of the arcane knowledge that will power your digital sorcery.
Stats
Hacking Now: 17
Hackers: 2,171
Challenges: 173
Solves: 68,945
Awardees: 139
Earliest Awardees:
frqmod
·
r00t
·
/etc/shadow⚡️ (Danial Yunus)
·
X3eRo0
·
nullptr
Latest Awardees:
NiRaMaX
·
usdk
·
kolmus
·
ziggy
·
seamaner
Modules
-
Return Oriented Programming
1 Hacking
0 / 30 -
Format String Exploits
3 Hacking
0 / 24 -
File Struct Exploits
5 Hacking
0 / 20 -
Dynamic Allocator Misuse
1 Hacking
0 / 40 -
Exploitation Primitives
1 Hacking
0 / 20 -
Dynamic Allocator Exploitation
1 Hacking
0 / 16 -
Microarchitecture Exploitation
2 Hacking
0 / 15 -
Kernel Exploitation
3 Hacking
0 / 8
30-Day Scoreboard:
Rank | Hacker | Badges | Score |