reverseProeasy

Змеиная магия (Snake Magic)

hackerlab

Task: Reverse engineer a PyInstaller-compiled Windows EXE. Solution: Extract with pyinstxtractor, decompile .pyc with uncompyle6, decode ASCII magic numbers to get password "python", compute MD5 hash for flag.

$ ls tags/ techniques/
PyInstaller EXE extraction with pyinstxtractorPython bytecode decompilation with uncompyle6ASCII code to string conversionMD5 hash calculation

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups