Author: cybercb5

  • Beginner Binary Exploitation Lab

    We are given four files, an e.py file containing pwntools skeleton code to develop and send a payload, the compiled flag c executable, a readable flag.c file with the c program code, and a user.txt file with my student ID to calculate the flag value for submission. Read more