About
How to contribute
If you like code obfuscation, breaking protection schemes, weird machines, anti-debugging tricks, packers, bug-exploitation or anything about binaries, get in touch with us if you are willing to get involved somehow! As a writer, a correcter, ideas-giver, ..anything!
You can also contact the owners:
- Axel Souchet: twitter, github
- Jonathan Salwan: twitter, github
- Jeremy Fetiveau: twitter, github
- yrp: twitter, github
Come hang out on our Discord server (invite) and follow us on twitter (@doar_e); don't be shy & join us!
Wall of fame
- Awesome Amat Cama for his "Corrupting the ARM Exception Vector Table" article:
- Brilliant Emilien Girault for co-authoring "Taming a wild nanomite-protected MIPS binary with symbolic execution: No Such Crackme":
- Personal blog: segmentationfault.fr
- Twitter account: @emiliengirault
- Github account: egirault
-
Symbolic-keygenner Michele Bertasi for his "Keygenning With KLEE":
- Twitter account: @brt_device
- Github account: mbrt
- Chabroni yrp for "Happy unikernels" and "CVE-2017-2446 or JSC::JSGlobalObject::isHavingABadTime":
- Legendary Nicolas Devillers, Jean-Romain Garnier and Raphaƫl Rigo for their "Pwn2Own 2021 Canon ImageCLASS MF644Cdw writeup" article:
- Personal blogs: jean-romain.fr and syscall.eu
- Twitter accounts: @nikaiw, @JRomainG and @_trou_
- Github accounts: nikaiw, JRomainG and trou