This repository contains my write-ups of some reversing and exploiting challenges I have done.
The goal of these writeups is not only to reach a solution, but to understand the internal logic, control flow, and security implications of each binary.
This repository contains my notes and analysis of the IOLI crackme challenges, a classic set of binaries used to practice binary reversing.
📄 Challenge information and scope → IOLI INFORMATION
| Level | Platform | Writeup |
|---|---|---|
| 0x00 | Windows x86 (32-bit) | Level 0x00 |
| 0x01 | Windows x86 (32-bit) | Level 0x01 |
| 0x02 | Windows x86 (32-bit) | Level 0x02 |
| 0x03 | Windows x86 (32-bit) | Level 0x03 |
| 0x04 | Windows x86 (32-bit) | Level 0x04 |
| 0x05 | Windows x86 (32-bit) | Level 0x05 |
| 0x06 | Windows x86 (32-bit) | Level 0x06 |
| 0x07 | Windows x86 (32-bit) | Level 0x07 |
| 0x08 | Windows x86 (32-bit) | Level 0x08 |
| 0x09 | Windows x86 (32-bit) | Level 0x09 |