#reverse-engineering
Read more stories on Hashnode
Articles with this tag
https://pwnable.tw The challenge description says: Only open read write syscalls are allowed to use. But is that enforced? How? Seccomp Taking a look...