reversehard
Symbol of Hope
uoftctf2026
Task: UPX-packed binary with 4201 chained functions that apply byte-by-byte transformations (XOR, rotate, multiply, etc.) and compare against expected output with memcmp. Solution: Used Unicorn Engine to emulate the entire transformation chain, brute-forcing each of the 42 byte positions independently (256 attempts each) to find inputs producing the expected output bytes.
$ ls tags/ techniques/
unicorn_emulationupx_unpackingbyte_bruteforcefunction_chain_analysis
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]