reverseProhard
Антигравитация (Antigravity)
duckerz
Task: Reverse engineer a stripped PIE binary embedding Gravity VM with shuffled opcode dispatch table. Solution: Dump bytecode from memory via GDB, recover opcode remap table, emulate sub-functions and brute-force per-character validation.
$ ls tags/ techniques/
brute_forcepieopcode_shufflingstripped_binarygravity_vmcustom_bytecoderegister_vmcomputed_gotoanti_reversebytecode_emulation
gravity_bytecode_reverse_engineeringruntime_memory_dumpingshuffled_opcode_table_recoverybytecode_emulation_bruteforcestruct_layout_reconstructiondispatch_table_analysis
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [pwn][Pro]BOF: Привет, Сквидвард! (Hello, Squidward!)— hackerlab
- [reverse][Pro]bedtime— dicectf_2026
- [reverse][Pro]Challenge7— tamuctf
- [pwn][Pro]fptr Reborn— spbctf
- [pwn][Pro]BOF: Обратная сторона Луны (Moon)— hackerlab