About
How to contribute
If you like code obfuscation, breaking protection schemes, weird machines, anti-debugging tricks, packers, bug-exploitation or anything about binaries, get in touch with us if you are willing to get involved somehow! As a writer, a correcter, ideas-giver, ..anything!
You can also contact the owners:
- Axel Souchet: twitter, github
 - Jonathan Salwan: twitter, github
 - Jeremy Fetiveau: twitter, github
 - yrp: twitter, github
 
Come hang out on our Discord server (invite) and follow us on twitter (@doar_e); don't be shy & join us!
Wall of fame
- Awesome Amat Cama for his "Corrupting the ARM Exception Vector Table" article:
 - Brilliant Emilien Girault for co-authoring "Taming a wild nanomite-protected MIPS binary with symbolic execution: No Such Crackme":
    
- Personal blog: segmentationfault.fr
 - Twitter account: @emiliengirault
 - Github account: egirault
 
 - 
    Symbolic-keygenner Michele Bertasi for his "Keygenning With KLEE":
    
- Twitter account: @brt_device
 - Github account: mbrt
 
 - Chabroni yrp for "Happy unikernels" and "CVE-2017-2446 or JSC::JSGlobalObject::isHavingABadTime":
 - Legendary Nicolas Devillers, Jean-Romain Garnier and Raphaƫl Rigo for their "Pwn2Own 2021 Canon ImageCLASS MF644Cdw writeup" article:
    
- Personal blogs: jean-romain.fr and syscall.eu
 - Twitter accounts: @nikaiw, @JRomainG and @_trou_
 - Github accounts: nikaiw, JRomainG and trou