reversehard
KrackM3
knightctf
Task: Find the correct flag for a stripped 524MB ELF crackme with S-box substitution and PRNG-based verification. Solution: Use Unicorn CPU emulator to emulate the verification function, hook at the check7 OR instruction to capture r13 values, brute-force each flag character position to find bytes that make the check7 accumulator zero.
$ ls tags/ techniques/
cpu_emulationhook_based_analysischaracter_bruteforceaccumulator_analysis
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]