https://github.com/dungwinux/diamond
A reversing CTF challenge created based on compile-time string and Xtensa.
https://github.com/dungwinux/diamond
compile-time reverse-engineering xtensa
Last synced: 9 months ago
JSON representation
A reversing CTF challenge created based on compile-time string and Xtensa.
- Host: GitHub
- URL: https://github.com/dungwinux/diamond
- Owner: dungwinux
- Created: 2023-03-26T16:48:42.000Z (about 3 years ago)
- Default Branch: main
- Last Pushed: 2023-03-26T16:48:57.000Z (about 3 years ago)
- Last Synced: 2024-04-15T02:08:19.874Z (almost 2 years ago)
- Topics: compile-time, reverse-engineering, xtensa
- Language: C++
- Homepage:
- Size: 2.93 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# diamond
---
A reversing CTF challenge created based on compile-time string and Xtensa.
Diamond is a reference to ESP8266 processor: Tensilica Diamond Standard 106Micro.
Also see: https://github.com/UMassCybersecurity/UMassCTF-2023-challenges/