Explore >> Select a destination


You are here

knight.sc
| | blog.nuculabs.de
14.2 parsecs away

Travel
| | It's been some time since I've done some Reverse Engineering and today I've completed a simple challenge on . The filename of the challenge is crackme_wtf and here are some hints to get you started: Determine type of FILEs. Don't be afraid to patch and use a debugger. Try to eliminate the randomness. Maybe some functions that have to do with time, random numbers or the current process's id. If the last hint doesn't yield any results... Is the required password really needed to get to the flag? Thanks for reading and good luck!
| | mark-story.com
17.2 parsecs away

Travel
| | You may have seen the Analog.coop site recently and found some of the easter eggs, like the grid hot keys. I loved the concept, and made a mental note to spend some time reverse engineering/rebuilding it for my own uses. Well it just so happens that the guys at Analog have released the #grid on Github, which is great because it made it easier for me to adapt the code and do some small improvements.
| | aykevl.nl
17.8 parsecs away

Travel
| |
| | nullprogram.com
120.9 parsecs away

Travel
|