reversemedium
My First Game
hackerlab
Task: a Godot 4 Windows game executable with an embedded PCK archive, misleading assets, and a fake PNG hiding another PE file. Solution: extracted the PCK with corrected offsets, recovered the hidden PE by XOR and zero-byte repair, then reversed the suffix transform to rebuild the full flag.
$ ls tags/ techniques/
godot_pck_extractionxor_payload_recoverype_header_restorationinverse_byte_transform
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub to get started.
$ssh [email protected]