reverseProeasy
Змеиная магия (Snake Magic)
hackerlab
Task: Reverse engineer a PyInstaller-compiled Windows EXE. Solution: Extract with pyinstxtractor, decompile .pyc with uncompyle6, decode ASCII magic numbers to get password "python", compute MD5 hash for flag.
$ ls tags/ techniques/
PyInstaller EXE extraction with pyinstxtractorPython bytecode decompilation with uncompyle6ASCII code to string conversionMD5 hash calculation
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [reverse][Pro]Снежный змий (Snow Snake)— hackerlab
- [reverse][Pro]Змеиный укус (Snake Bite)— hackerlab
- [reverse][Pro]Файлы PYC (PYC Files)— hackerlab
- [reverse][Pro]Проклятый питон (Cursed Python)— duckerz
- [misc][Pro]Игра (Game)— hackerlab