reversemedium
Мипсаинатор (Mipsainator)
hackerlab
Task: MIPS32 big-endian binary with multi-stage flag encryption. Solution: Reverse the encryption chain (XOR 0x12 → Caesar -10 → string reversal) using Capstone disassembly to identify the algorithm.
$ ls tags/ techniques/
MIPS32 disassembly with CapstoneMulti-stage encryption reversal (XOR + Caesar + reverse)ELF symbol analysis for function identificationBig-endian architecture handling
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]