reversehard

VMM - Virtual Machine Monster

hackerlab

Task: UPX-packed PE64 with corrupted magic header implements a custom 24-opcode stack VM that validates input through ROT13 + ADD/XOR/SUB chain. Solution: emulate NRV2B decompressor with Unicorn Engine to unpack, reverse VM opcodes, extract transform constants, invert the chain to recover the flag.

$ ls tags/ techniques/
vm_bytecode_analysisupx_header_patchingunicorn_emulation_unpackingnrv2b_decompressor_emulationvm_opcode_recoverytransform_chain_inversionrot13_reversaladd_xor_sub_chain_bruteforce

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub to get started.

$ssh [email protected]