Published onMarch 14, 2024HTB - Cyber Apocalypse 2024 - Rev - Follow The Pathrevhtbcyber-apocalypse24self-decryptionpolymorphicUsing x64dbg to analyze a self-decrypting program and manually extracting the flag.
Published onMarch 14, 2024HTB - Cyber Apocalypse 2024 - Rev - Quickscanrevhtbcyber-apocalypse24angrUtilizing angr to analyze a binary's runtime stack and extract a value.
Published onDecember 7, 2023PCC '23 - Rev - [etyBtloB]revpcc-23bit-shiftingelfPerforming FU on a binary to fix it and run it to find the flag
Published onDecember 7, 2023PCC '23 - Rev - IntIOrevpcc-23windowskernelReversing a simple S-BOX based encryption to get the flag from a Windows Driver (and two more ways of doing the same).
Published onDecember 7, 2023PCC '23 - Rev - Literal Byte Boltrevpcc-23pythonpyarmorUsing GDB to find the flag in memory of PyArmor obfuscated python script