💥We had 18 years to solve the IOLI crackmes!
Today Pau Oliva (pof) released their source code! Those simple crackmes to learn the basics of reverse engineering can now be recompiled for new targets and update all the tutorials from the r2book \o/ #radare2 #reverseengineering #crackmes https://github.com/poliva/IOLI-crackmes
🎺 Training alert!
Join Kara Nance and Brian Hay at #Honeynet2025 in Prague for a hands-on Reverse Engineering CTF session.
You’ll work through a diverse set of #crackmes using #Ghidra, uncovering hidden flags and sharpening your binary analysis abilities. Whether you’re new to RE or a seasoned CTF player, this session has something for you.
🛠️ Learn by doing with real reverse engineering challenges
🪑 Limited seats available – don’t wait!
🔗 Register now: https://prague2025.honeynet.org
How cool is this --> https://github.com/f1sty/crackmes_one