Dashboard Challenges Scoreboard Community Login Register
All 🌐 Web 💥 Pwn 🔐 Crypto 🔍 Forensics ⚙️ Reversing 🎯 Misc 📱 Mobile
Reversing
100 XP

AMOS

★★☆☆☆ Easy

Inspired by real-world obfuscation techniques used in the AMOS Stealer malware, this challenge hides a flag using a...

Reverse Engineering Linux Binary Analysis
Reversing
100 XP

Cyclix

★★☆☆☆ Easy

Inspired by real-world malware obfuscation techniques, this challenge implements a cyclic encryption routine to hide...

Reverse Engineering Linux Binary Analysis
Reversing
100 XP

LockBit

★★☆☆☆ Easy

Inspired by obfuscation techniques used in the LockBit ransomware family, this challenge implements a multi-layer...

Reverse Engineering Linux Binary Analysis
Reversing
125 XP

Phantom

★★★☆☆ Moderate

Inspired by encryption techniques used in the Phantom malware family, this challenge implements a cipher algorithm to...

Reverse Engineering Linux Binary Analysis
Reversing
125 XP

Vidar

★★★☆☆ Moderate

Inspired by encryption techniques used in the Vidar malware family, this challenge implements a cipher algorithm to...

Reverse Engineering Linux Binary Analysis
Reversing
250 XP

Vice Auth

★★★★☆ Hard

Inspired by authentication mechanisms in modern malware, this challenge implements a cipher-based proof-of-work system....

Reverse Engineering Linux Binary Analysis