NvitiliGo on 2026-03-09 17:07:
CTF{S3cR3T_AsSc1_Fl4g}{@_@}
SirWardrake on 2026-03-11 01:55:
[Click to reveal]CTF{S3cR3T_AsSc1_Fl4g}{@_@}
basically quite simple
ming on 2026-03-15 09:19:
[Click to reveal]s = "IYJ~U4cQ1Q[<mL[(U;`'Ynk/M-i"
result = ''.join(chr(ord(c) - (6 - i)) for i, c in enumerate(s))
print(result)
Xendorium on 2026-03-15 20:34:
[Click to reveal]CTF{S3cR3T_AsSc1_Fl4g}{@_@}
misterk4Dx on 2026-03-23 07:47:
[Click to reveal]CTF{S3cR3T_AsSc1_Fhmg}{@_@}
static analysis , simple no need hints
hatenal on 2026-04-05 09:18:
[Click to reveal]CTF{S3cR3T_AsSc1_Fl4g}{@_@}
found using this python script:
def decode(a:str, b:int):
return chr(ord(a)-b)
s = "IYJ~U4cQ1Q[<mL[(U;`'Ynk/M-i"
new_s = ""
for i in range(len(s)):
new_s += decode(s[i], 6-i)
print(new_s)
Armatrox on 2026-04-13 19:46:
[Click to reveal]I just changed the line 2319 to: 2319: e9 6e 01 00 00 jmp 248c <main+0x19b>
line 248c is: 248c: 48 8d 05 8d 0b 00 00 lea 0xb8d(%rip),%rax # 3020 <_IO_stdin_used+0x20>
which loads address 3020 which is where the You cracke dme string is
idk if im supposed to do this im new to this stuff but it worked