reversehard
Aros-25
kalmarctf
Task: stripped 32-bit ARM ELF behind a raw TCP service, exposing a small custom VM and a hidden file oracle. Solution: recover the VM opcodes and syscalls, read flag.txt into mapped memory, then use the buggy exit printer as a byte-by-byte leak primitive.
$ ls tags/ techniques/
vm_reconstructionsyscall_recoveryoracle_exfiltrationbytewise_leak
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub to get started.
$ssh [email protected]