Go to file
0x35c a3ea938eb1 level05: done (exploit modified to a better shellcode)
level07: walkthrough done
level08: done
level09: done
2025-05-15 14:00:44 +02:00
level00 core: add flags for the first 4 levels 2025-05-10 11:19:07 +02:00
level01 core: add flags for the first 4 levels 2025-05-10 11:19:07 +02:00
level02 core: add flags for the first 4 levels 2025-05-10 11:19:07 +02:00
level03 core: add flags for the first 4 levels 2025-05-10 11:19:07 +02:00
level04 core: add flags for the first 4 levels 2025-05-10 11:19:07 +02:00
level05 level05: done (exploit modified to a better shellcode) 2025-05-15 14:00:44 +02:00
level06 level06: done (uwu) 2025-05-10 15:31:59 +02:00
level07 level05: done (exploit modified to a better shellcode) 2025-05-15 14:00:44 +02:00
level08 level05: done (exploit modified to a better shellcode) 2025-05-15 14:00:44 +02:00
level09 level05: done (exploit modified to a better shellcode) 2025-05-15 14:00:44 +02:00
en.subject.pdf clean: remove useless dir 2025-05-15 12:37:10 +02:00
README.md Add README.md 2025-05-15 06:34:11 -04:00

OverRide

Override is a project where the goal is to exploit vulnerabilities in binaries by reverse engineering them to make them display a file containing passwords. It is divided into 10 levels (level00 to level09).

Methodology

This project was carried out using peer programming. Working together on the same machine, we decompiled binaries, tested various exploits, and analyzed vulnerabilities collaboratively.

Subject