reverseProhard
Снежный змий (Snow Snake)
hackerlab
Task: Reverse a PyInstaller-packed Windows executable containing Python 3.13 bytecode. Solution: Extract with pyinstxtractor, disassemble with pycdc/pycdas, crack MD5 hashes to recover XOR keys, and reverse the encryption algorithm.
$ ls tags/ techniques/
md5_crackingxor_cipherpyinstallerpython_bytecodepyinstxtractorpython313pycdcpycdasnew_python_version
MD5 hash cracking via rainbow tablesPyInstaller executable extraction with pyinstxtractorPython 3.13 bytecode disassembly with pycdc/pycdasXOR cipher reversal with dual keys
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [reverse][Pro]Змеиная магия (Snake Magic)— hackerlab
- [reverse][Pro]Проклятый питон (Cursed Python)— duckerz
- [reverse][Pro]Змеиный укус (Snake Bite)— hackerlab
- [reverse][Pro]Matryoshka— duckerz
- [reverse][Pro]Файлы PYC (PYC Files)— hackerlab