[ binaryjiujitsu.com ]

BINARY

Jiu-Jitsu
Learn  ·  Exploit  ·  Level Up

Master the art of reverse engineering and binary exploitation.
Train through an immersive terminal. Progress through the belt system.

0x7ffd1200: 39 0c 8c 7d 72 47 34 2c d8 10 0f 2f 6f 77 0d 65 d6 70 e5 8e 03 31 d8 ae 8e 4f 6e ac 34 2f c2 31 b7 b0 87 16 eb 3f ct 28 06     0x7ffd1220: b9 62 23 74 94 28 59 08 c8 41 63 de b4 b9 6b b6 b8 ba 34 64 5b 88 23 57 53 ba b3 4d dc e2 8b a3 4f 5c 68 01 53 10 3b 72 ff 8a 49     0x7ffd1240: 77 8e 18 0d 43 12 70 e2 80 61 30 31 95 b5 38 42 e8 17 0c 62 31 64 05 3d a8 ae 33 46 dc 55 d8 01 46 0h 3b 98 65 4e bf 52 00 05

The Belt System

White Belt

Fundamentals of binary analysis and basic exploitation concepts

Blue Belt

Buffer overflows, format strings, and shellcode basics

Purple Belt

ROP chains, heap exploitation, and bypass techniques

Brown Belt

Advanced heap, kernel exploitation, and modern mitigations

Black Belt

Expert-level challenges and real-world vulnerability research

0x7ffd1270: f4 03 48 69 4d 7a 14 7b 28 1e 18 23 40 41 23 54 40 63 84 b4 f8 54 60 e7 34 4b 60 90 40 2c 40 04 75 19 63 26 38 69 08 10 78 20 73     0x7ffd1290: 77 8e 18 60 43 12 70 e2 80 61 30 91 05 65 38 42 68 17 0c 22 31 64 05 8d a8 ae 63 46 dc 55 e8 01 46 0b 3b 98 25 4e bf 52 00 55

Learn Through
the Terminal

Immersive Terminal Interface

Access all lessons, challenges, and rewards through an immersive terminal environment

Interactive Lessons

Learn programming, reverse engineering, and exploitation concepts hands-on

Solve Challenges

Test your skills with binary exploitation, coding, and CTF challenges

Collect Rewards

Earn items, advance through belts, and build your inventory

exploit.py
$ python3 exploit.py
[*] Connecting to target:9999...
[*] Sending payload (0x48 bytes)...
[*] Overwriting return address...
[+] Got shell!
[*] uid=0(root) gid=0(root)
$ cat flag.txt
[+] BJJ{r3t_0r13nt3d_pr0gramm1ng_ftw}