reversehard
eXecutables
taipanbyte
Task: Reverse engineer a UPX-packed stripped Go 1.24 binary with Russian function names. Solution: Unpack with UPX, parse gopclntab to recover function names, identify fake flag trap in argument check, find hardcoded base64 string that decodes to near-valid flag with single character substitution.
$ ls tags/ techniques/
base64_decodeupx_unpackinggopclntab_parsingxor_cipher_analysisstatic_analysis_gofake_flag_detectionfunction_name_recovery
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]