Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/naivenom/reversing-list
Reversing list
https://github.com/naivenom/reversing-list
challenges cracking crackme ctf ida ida-pro radare2 reverse-engineering reversing
Last synced: 24 days ago
JSON representation
Reversing list
- Host: GitHub
- URL: https://github.com/naivenom/reversing-list
- Owner: naivenom
- License: gpl-3.0
- Created: 2018-09-11T21:08:41.000Z (over 6 years ago)
- Default Branch: master
- Last Pushed: 2024-01-09T07:29:34.000Z (11 months ago)
- Last Synced: 2024-08-04T23:10:56.538Z (4 months ago)
- Topics: challenges, cracking, crackme, ctf, ida, ida-pro, radare2, reverse-engineering, reversing
- Language: Python
- Homepage:
- Size: 3.49 MB
- Stars: 145
- Watchers: 8
- Forks: 21
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-security-collection - **65**星
README
It is a list of reversing challenges compiled from different CTF, whose content is the binary and solution using r2pipe, IDAPython or just reverse binary in high-level language like Python or C, and some writeups!. It is a list in continuous update so enjoy and learn!.
# Baby
| Challenge | Output and info|
| ----- | ------ |
| 9447 CTF 2015: The real flag finder | Usage: ./flagFinderRedux [arg1]
![#ffff1a](https://placehold.it/15/ffff1a/000000?text=+) Elf|
| Defcamp CTF Qualifications 2015: entry-language-100 | Enter the password: [stdin]
![#ffff1a](https://placehold.it/15/ffff1a/000000?text=+) Elf|
| Hack The Box: Find The Easy Pass | Enter Password: [stdin]
![#1aa3ff](https://placehold.it/15/1aa3ff/000000?text=+) Exe|
| Hack The Box: Impossible Password | * [stdin]
![#ffff1a](https://placehold.it/15/ffff1a/000000?text=+) Elf|
| CCN-Cert Atenea CTF: WannaCry | ![#FF0000](https://placehold.it/15/ff0000/000000?text=+) Malware ![#1aa3ff](https://placehold.it/15/1aa3ff/000000?text=+) Exe|
| CCN-Cert Atenea CTF: Saint Seiya | Enter Key: [stdin]
![#1aa3ff](https://placehold.it/15/1aa3ff/000000?text=+) Exe |
| CCN-Cert Atenea CTF: Spear Phising... Can you catch me? | ![#FF0000](https://placehold.it/15/ff0000/000000?text=+) Malware ![#1aa3ff](https://placehold.it/15/1aa3ff/000000?text=+) Exe|
| CCN-Cert Atenea CTF: Counter | ![#D2691E](https://placehold.it/15/d2691e/000000?text=+) Packed ![#1aa3ff](https://placehold.it/15/1aa3ff/000000?text=+) Exe|
| CCN-Cert Atenea CTF: Crackme! if you can... | Usage: crypt0.exe [arg1] [arg2]
![#c5f015](https://placehold.it/15/c5f015/000000?text=+) Crackme ![#1aa3ff](https://placehold.it/15/1aa3ff/000000?text=+) Exe|
| H4CK1T CTF 2016: Crypt00perator | Enter th3 k3y: [stdin]
![#c5f015](https://placehold.it/15/c5f015/000000?text=+) Crackme ![#1aa3ff](https://placehold.it/15/1aa3ff/000000?text=+) Exe|
| CSAW 2016: Gametime | ![#1aa3ff](https://placehold.it/15/1aa3ff/000000?text=+) Exe|
| Hack.lu CTF 2018: Baby Reverse | Welcome to this Chall! Enter the Key to win: [stdin]
![#c5f015](https://placehold.it/15/c5f015/000000?text=+) Crackme ![#ffff1a](https://placehold.it/15/ffff1a/000000?text=+) Elf|
| INSTRUO CTF 2018: Tez Bano Tez | INSTRUO-2018 IIEST-S *** Calculating key...
![#c5f015](https://placehold.it/15/c5f015/000000?text=+) Crackme ![#ffff1a](https://placehold.it/15/ffff1a/000000?text=+) Elf|
| HoneyCON CTF 2018: Basic Conditional Decision | Usage: rev3 [arg1],
![#c5f015](https://placehold.it/15/c5f015/000000?text=+) Crackme ![#ffff1a](https://placehold.it/15/ffff1a/000000?text=+) Elf|
| X-MAS CTF 2019: Santa's crackme | [stdin], Binary: main
![#c5f015](https://placehold.it/15/c5f015/000000?text=+) Crackme ![#ffff1a](https://placehold.it/15/ffff1a/000000?text=+) Elf|
| X-MAS CTF 2019: Santa's crackme | [stdin], Binary: main
![#c5f015](https://placehold.it/15/c5f015/000000?text=+) Crackme ![#ffff1a](https://placehold.it/15/ffff1a/000000?text=+) Elf|
| Basic Algorithm Decrypt function | Usage: entropy [arg1], Binary: entropy
![#c5f015](https://placehold.it/15/c5f015/000000?text=+) Crackme ![#ffff1a](https://placehold.it/15/ffff1a/000000?text=+) Elf|
| Iris CTF 2024, Baby rev Johnson | Usage: main [stdin], Binary: main
![#c5f015](https://placehold.it/15/c5f015/000000?text=+) Crackme ![#ffff1a](https://placehold.it/15/ffff1a/000000?text=+) Elf|
| Iris CTF 2024, Whats a rune | Usage: main.go , Source Code: main.go
![#1aa3ff](https://placehold.it/15/1aa3ff/000000?text=+) Golang|# Easy
| Challenge | Output and info|
| ----- | ------ |
| r2con2018: psv | Welcome to PSV (Perfectly Secure Vault)! Enter your secret key to unlock: [stdin]
![#c5f015](https://placehold.it/15/c5f015/000000?text=+) Crackme ![#ffff1a](https://placehold.it/15/ffff1a/000000?text=+) Elf|
| r2con2018: scrabble | Usage: scrabble [arg1],
![#c5f015](https://placehold.it/15/c5f015/000000?text=+) Crackme ![#ffff1a](https://placehold.it/15/ffff1a/000000?text=+) Elf|
| r2con2018: forceme | ****** As a Lockpicking master, Open the Lock! ******* Usage: forceme [arg]
![#c5f015](https://placehold.it/15/c5f015/000000?text=+) Crackme ![#ffff1a](https://placehold.it/15/ffff1a/000000?text=+) Elf|
| Navarra Lan Party CTF 2018: Key is the key | Ultimate ultra-mega hacker key checker Version: 01.1337 (Only 1 key has been saved) Usage: keyisthekey [arg1] [arg2] by KaoRz (@alextaito99)
![#c5f015](https://placehold.it/15/c5f015/000000?text=+) Crackme ![#D2691E](https://placehold.it/15/d2691e/000000?text=+) Packed ![#ffff1a](https://placehold.it/15/ffff1a/000000?text=+) Elf ![#9900ff](https://placehold.it/15/9900ff/000000?text=+) Anti-Debugging|
| Flare-On 2018: Ultimate Minesweeper | .NET Game by Nick Harbour (@nickharbour)
![#1aa3ff](https://placehold.it/15/1aa3ff/000000?text=+) Exe|
| HoneyCON CTF 2018: Brute Me | Usage: rev4 [arg1],
![#c5f015](https://placehold.it/15/c5f015/000000?text=+) Crackme ![#ffff1a](https://placehold.it/15/ffff1a/000000?text=+) Elf|
| HoneyCON CTF 2018: Ultra Secure Bank Login | Es necesario introducir los 8 PINes para realizar login en FWHIBBIT Bank PIN 1: [stdin],
![#c5f015](https://placehold.it/15/c5f015/000000?text=+) Crackme ![#ffff1a](https://placehold.it/15/ffff1a/000000?text=+) Elf|# Medium
| Challenge | Output and info|
| ----- | ------ |
| r2con2018: disqualified | Show me what you got: [stdin] by Megabeets (@megabeets_)
![#c5f015](https://placehold.it/15/c5f015/000000?text=+) Crackme ![#ffff1a](https://placehold.it/15/ffff1a/000000?text=+) Elf|
| Navarra Lan Party CTF 2018: In time | Introduce tu flag y comprueba si es la correcta [stdin] Espere unos instantes... by Gibdeon (@gibdeon)
![#c5f015](https://placehold.it/15/c5f015/000000?text=+) Crackme ![#ffff1a](https://placehold.it/15/ffff1a/000000?text=+) Elf|
| PatataCTF 2018: Angry Potato | ./angry-patatas [arg] by Patatas (@HackingPatatas)
![#c5f015](https://placehold.it/15/c5f015/000000?text=+) Crackme ![#ffff1a](https://placehold.it/15/ffff1a/000000?text=+) Elf|
| InCTF 2018: Decoy | Input: [stdin]
![#c5f015](https://placehold.it/15/c5f015/000000?text=+) Crackme ![#1aa3ff](https://placehold.it/15/1aa3ff/000000?text=+) Exe ![#9900ff](https://placehold.it/15/9900ff/000000?text=+) Anti-Debugging|
| X-MAS CTF 2019: Last Christmas | Binary: LAST_XMAS
![#c5f015](https://placehold.it/15/c5f015/000000?text=+) Crackme ![#ffff1a](https://placehold.it/15/ffff1a/000000?text=+) Elf ![#D2691E](https://placehold.it/15/d2691e/000000?text=+) Packed ![#9900ff](https://placehold.it/15/9900ff/000000?text=+) Anti-Debugging|
| CTF FWHIBBIT 2020: EB SECRET | Web Access DON'T RUN AS ROOT
![#c5f015](https://placehold.it/15/c5f015/000000?text=+) Crackme ![#ffff1a](https://placehold.it/15/ffff1a/000000?text=+) Elf ![#8000ff](https://placehold.it/15/8000ff/000000?text=+) Obfuscate ![#9900ff](https://placehold.it/15/9900ff/000000?text=+) Anti-Debugging|
| State Machine 2018: Ret0 |CLS Team 2018 Enter Password: [stdin] by @Bym24v
![#c5f015](https://placehold.it/15/c5f015/000000?text=+) Crackme ![#1aa3ff](https://placehold.it/15/1aa3ff/000000?text=+) Exe|# Hard
| Challenge | Output and info|
| ----- | ------ |# Insane
| Challenge | Output and info|
| ----- | ------ |