Skip to main content
Analyzing CTF Binaries with Reverse Engineering and Symbolic Execution

Analyzing CTF Binaries with Reverse Engineering and Symbolic Execution

·1 min
Zachary Etters
Author
Zachary Etters
Graduate Student in Cybersecurity Analytics and Operations at Penn State, focused on network security and infrastructure design.

Content coming soon. Check back for updates!