Binary Jiujitsu
Master the art of reverse engineering and binary exploitation
Progress through the belt system as you learn to analyze, disassemble, and exploit binaries. From white belt fundamentals to black belt mastery.
The Belt System
White Belt
Fundamentals of binary analysis and basic exploitation concepts
Blue Belt
Buffer overflows, format strings, and shellcode basics
Purple Belt
ROP chains, heap exploitation, and bypass techniques
Brown Belt
Advanced heap, kernel exploitation, and modern mitigations
Black Belt
Expert-level challenges and real-world vulnerability research
Learn by Doing
-
Decompile & Disassemble
Analyze binaries with integrated tools
-
Develop Exploits
Write Python exploits in the browser
-
Capture Flags
Exploit remote services to retrieve flags
-
Track Progress
Earn stripes and advance through belts
$ ./exploit.py
[*] Connecting to target...
[*] Sending payload...
[+] Flag: BJJ{y0u_g0t_1t!}