reversePromedium
Partial Encryption
HackTheBox
PE32+ executable (console) x86-64 Windows binary `partialencryption.exe` (13312 bytes). Static analysis reveals neither the flag nor meaningful strings — only Windows API imports. The task uses **runtime code decryption** via hardware AES-NI instructions.
$ ls tags/ techniques/
runtime_code_decryptionaes_ni_manual_analysisencrypted_code_blobsoffline_decryptiondynamic_analysis
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [reverse][Pro]Debugme— HackTheBox
- [crypto][Pro]AliEnS Challenge Scenario— HackTheBox
- [reverse][Pro]Challenge Scenario (rev_gameloader)— HackTheBox
- [pwn][Pro]0xDiablos— hackthebox
- [reverse][Pro]Bypass— HackTheBox