Binary Jiujitsu

Master the art of reverse engineering and binary exploitation

Progress through the belt system as you learn to analyze, disassemble, and exploit binaries. From white belt fundamentals to black belt mastery.

The Belt System

White Belt

Fundamentals of binary analysis and basic exploitation concepts

Blue Belt

Buffer overflows, format strings, and shellcode basics

Purple Belt

ROP chains, heap exploitation, and bypass techniques

Brown Belt

Advanced heap, kernel exploitation, and modern mitigations

Black Belt

Expert-level challenges and real-world vulnerability research

Learn by Doing

  • Decompile & Disassemble

    Analyze binaries with integrated tools

  • Develop Exploits

    Write Python exploits in the browser

  • Capture Flags

    Exploit remote services to retrieve flags

  • Track Progress

    Earn stripes and advance through belts

$ ./exploit.py [*] Connecting to target... [*] Sending payload... [+] Flag: BJJ{y0u_g0t_1t!}