tags:CTFbinary_ninjadecompilationstack_overflowrop original link: LEVERAGING BINARY NINJA IL TO REVERSE A CUSTOM ISA: CRACKING THE “POT OF GOLD” 37C3 newsletter link: exploits.club Weekly Newsletter 03
Exploits Club Summary:
A detailed write-up solving a custom architecture PWN challenge from the 37C3 CTF. This post does an excellent job highlighting the Binary Ninja Plugin API, and the solution ends up being relatively straight forward after just writing just a few 100 lines of Python.