reversehard

Symbol of Hope

uoftctf2026

Task: UPX-packed binary with 4201 chained functions that apply byte-by-byte transformations (XOR, rotate, multiply, etc.) and compare against expected output with memcmp. Solution: Used Unicorn Engine to emulate the entire transformation chain, brute-forcing each of the 42 byte positions independently (256 attempts each) to find inputs producing the expected output bytes.

$ ls tags/ techniques/
unicorn_emulationupx_unpackingbyte_bruteforcefunction_chain_analysis

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]