Analyzing CTF Binaries with Reverse Engineering and Symbolic ExecutionDecember 3, 2025·1 minAuthorZachary EttersGraduate Student in Cybersecurity Analytics and Operations at Penn State, focused on network security and infrastructure design. Content coming soon. Check back for updates!