Reverse engineering compiled desktop or mobile code can be a lot of fun, too. (And once you get how it works at that level, you get how the right input data can abuse it and twist it to your own ends.)

/@matigo

jeremycherfas.10centuries.com.