reverseProeasy
spbctf_2_x86
spbctf
Task: Reverse engineer the encoding algorithm and decode the given sequence of 16 integers to recover the original 8-character string.
$ ls tags/ techniques/
static_disassemblyrodata_table_extractionprime_factor_encoding_reversalgcd_based_decryption
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [reverse][Pro]spbctf_4_x86_64— spbctf
- [reverse][Pro]Basic— spbctf
- [reverse][Pro]Randser— spbctf
- [reverse][Pro]spbctf_3_x86_64— spbctf
- [reverse][Pro]task1.out (re2)— rev-kids20.forkbomb.ru