reversehard
Random
hackerlab
Task: a broken PE32+ encrypter and a large encrypted file hide the real flag behind packing, decoy strings, and a timestamp-seeded transform. Solution: patch the PE header, unpack/analyze the routine, extract the hidden decimal ciphertext, emulate the code with Unicorn, and invert it byte by byte.
$ ls tags/ techniques/
unicorn_emulationprng_seed_recoveryheader_patchingupx_stub_analysisbytewise_transform_inversion
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub to get started.
$ssh [email protected]