Reversing Challenges
6 challenges found
AMOS
Inspired by real-world obfuscation techniques used in the AMOS Stealer malware, this challenge hides a flag using a...
Cyclix
Inspired by real-world malware obfuscation techniques, this challenge implements a cyclic encryption routine to hide...
LockBit
Inspired by obfuscation techniques used in the LockBit ransomware family, this challenge implements a multi-layer...
Phantom
Inspired by encryption techniques used in the Phantom malware family, this challenge implements a cipher algorithm to...
Vidar
Inspired by encryption techniques used in the Vidar malware family, this challenge implements a cipher algorithm to...
Vice Auth
Inspired by authentication mechanisms in modern malware, this challenge implements a cipher-based proof-of-work system....