Share how awesome the crack me was or where you struggle to finish it! Stay polite and do not spoil the solution/flag!
3:20 AM 06/06/2020
Straightforward crackme, standard rules apply: no patching, find the correct input. Features very light ARM assembly obfuscation, and was originally released at UMDCTF 2019.
jeffli6789 on 5:14 PM 06/17/2020: Nice challenge in general! angr does not work so it requires some manual work. I dumped the equations with Ghidra and solved it with z3.
SKyRaphYDrEfuNTutai on 7:43 PM 06/19/2020: @jeffli6789 I was able to solve with angr, check out my posted solution.