Here are some examples and solution of CTF Reverse Engineering and Pwning challenges where I have participated and solved using many tools such as Z3, Angr, IDA Pro and others software and tools.
A POC for an automated single password crack-me themed binary. Uses dynamic binary instrumentation, taint analysis and symbolic execution to solve for the password. Supports both input methods, command-line arguments and STDIN. Examples have been give to try out the tool.
In today's world, there are a lot of software vulnerabilities. We study Control Flow Integrity that prevents a widely-known attack called Return-Oriented Programming. CFI restricts the control flow of an application to valid execution traces. We used Intel Pin Tool, C Programming Language and Linux OS (Ubuntu) to help demonstrate CFI.