reverseProhard
KrackM3
knightctf
Task: Find the correct flag for a stripped 524MB ELF crackme with S-box substitution and PRNG-based verification. Solution: Use Unicorn CPU emulator to emulate the verification function, hook at the check7 OR instruction to capture r13 values, brute-force each flag character position to find bytes that make the check7 accumulator zero.
$ ls tags/ techniques/
cpu_emulationhook_based_analysischaracter_bruteforceaccumulator_analysis
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [reverse][free]cf madness— pingctf2026
- [reverse][Pro]CrackMe - TaipanByte CTF— taipanbyte
- [reverse][Pro]Deceptive Checker— miptctf
- [reverse][Pro]s4.out— spbctf
- [reverse][Pro]crackme1— spbctf