George Theodoridis
admin, peer mentor
This follow-up workshop shifts from static inspection to dynamic reverse engineering, where we run binaries under a debugger to see what they actually do. You'll practice breakpoints, stepping, tracing calls, and inspecting registers/memory to confirm control flow and key checks, using GDB with pwndbg (preferred). So please install it before the workshop in your linux machine if possible.