Flareon11 Meme Maker 3000
We’re presented with a huge js wall of text, we pass it through https://deobfuscate.io/ and get the following output: a0a = function () { return u; }; return a0a(); } function a0f() { ...
We’re presented with a huge js wall of text, we pass it through https://deobfuscate.io/ and get the following output: a0a = function () { return u; }; return a0a(); } function a0f() { ...
WHAT THE HELL? Okay, this was SUPER overwhelming to look at. I’ve never worked with yara before and now I have to deal with this mess? After staring at this eyesore for a bit 3 patterns stood out...
We have the following executable Time to reverse! Pretty quick the goal becomes apparent. reach this conditional path. I’ve never reversed golang executables before, so looking at this IDA o...
We have the following function that generates the flag def GenerateFlagText(x, y): key = x + y*20 encoded = "\xa5\xb7\xbe\xb1\xbd\xbf\xb7\x8d\xa6\xbd\x8d\xe3\xe3\x92\xb4\xbe\xb3\xa0\xb7\...
You can find the code for this project here Zeruel Devlog 1 Hi there! lately I have been working on a personal project I had the idea for some years ago. I thought it would be a good exercise sin...
This is a report I wrote for the developer of LockeBot, I hope you learn something from it :) Background Multiple vulnerable functions and queries are found in the source code of LockeBot 2.0.2 w...