reversehard
VMM - Virtual Machine Monster
hackerlab
Task: UPX-packed PE64 with corrupted magic header implements a custom 24-opcode stack VM that validates input through ROT13 + ADD/XOR/SUB chain. Solution: emulate NRV2B decompressor with Unicorn Engine to unpack, reverse VM opcodes, extract transform constants, invert the chain to recover the flag.
$ ls tags/ techniques/
pe64xorobfuscationrot13mingwbytecodecaesar_cipherupxwindows_peanti_debugcustom_vmstack_machineanti_unpacknrv2bprng_noise
vm_bytecode_analysisupx_header_patchingunicorn_emulation_unpackingnrv2b_decompressor_emulationvm_opcode_recoverytransform_chain_inversionrot13_reversaladd_xor_sub_chain_bruteforce
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub to get started.
$ssh [email protected]