Learn reverse engineering, binary exploitation, and JavaScript security through hands-on tutorials designed for CTF challenges and real-world security research.
Before starting any tutorials, you need to set up your local development environment. Follow these steps to get everything ready for hands-on learning.
Clone the tutorial repository to your local machine to get all the example files and Docker configuration.
git clone https://github.com/decagondev/deca-sec-tut.git
cd deca-sec-tut
Use Docker Compose to start the pre-configured security analysis environment with all tools installed.
docker-compose up -d
docker-compose exec sec-env bash
Once you've completed the setup, you're ready to dive into the tutorials. Each tutorial includes hands-on exercises with the tools available in your Docker environment.
Explore TutorialsMaster command-line tools like objdump, readelf, strings, and Radare2 to analyze binaries. Learn essential skills for crackme challenges using GDB + pwndbg.
Learn advanced exploitation techniques using command-line tools including buffer overflows, format string vulnerabilities, and Return-Oriented Programming (ROP).
Master web security vulnerabilities using command-line tools including XSS, DOM clobbering, JSONP, and prototype pollution for modern web applications.
Practice with real examples and pre-configured Docker environment to reinforce your understanding.
Learn with command-line tools like objdump, GDB, curl, and Python for automation and scripting.
Skills directly applicable to Capture The Flag challenges and real-world security research.
Our comprehensive tutorial series is designed to take you from beginner to advanced in cybersecurity skills. Each tutorial focuses on practical, hands-on learning with real-world applications using command-line tools.