reversehard
0racle
kalmarctf
Task: Lazarus/FreePascal GUI executable with embedded shellcode validating flag via FNV-1a hashes. Solution: Extract TPF0 form resources, locate XOR-encrypted shellcode, reverse FNV-1a hash function, brute-force 7 flag segments independently.
$ ls tags/ techniques/
windowspe32shellcodefnv1axor_encryptionlazarusfreepascalguicustom_hashform_resourcekeypress_validation
lazarus_form_extractionshellcode_analysisfnv1a_hash_crackingsegment_brute_forcertti_analysistpf0_parsing
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub to get started.
$ssh [email protected]