2 years agoExploiting a Vulnerable Linked List Implementation - "Links 1" Pwn Challenge [ImaginaryCTF]CryptoCat