7 items with this tag.

WHY2025 [REV] Zenmaster

Analysis of a Base64-encoded ELF execution service, bypassing restrictions, and reverse-engineering AMD microcode to recover the flag (unintended solution).

DUCTF [PWN] fakeobj.py

Exploiting Python object internals to hijack the __repr__ function pointer, redirecting execution to system("/bin/sh") for a shell, with adjustments for version-specific memory layouts.

UofTCTF [rev] Py_FlagChecker

Extracting and defeating a self-referential Python flag checker that uses version-specific marshal bytecode and anti-tampering keys by building a custom Python 3.10.12 interpreter with added debug prints to reveal the decrypted flag.

UIUCTF [REV] summarize

A stripped binary hides a flag behind complex modular arithmetic, requiring the discovery of six precise nine-digit integers to unlock it.

L3AK CTF [REV] angry

Analyzed a 64-bit stripped ELF, used Ghidra to dissect its dual-stage password checks (first_check, second_check), and unravelled the complex byte-wise logic checks to pass the “Congratulations!” gate.

UMASS CTF [rev] free-delivery

Reverse-engineering the Krusty Krab’s “free-delivery” APK: decompiled an Android app (patched by Plankton) with jadx, identified suspicious network traffic and shell command behavior.