| piskaj |
i have bypassed all anti debug in 10 minuets, does this problem have a solution with brute force so ill try (because for a 10 characters long , it seems that it will take a very very long time) |
2026-01-27 13:58 |
| Determinism |
@CorpCons it is not that the random returns the same every time ,it is the matter of fact that when you initialize a PRNG with the same seed ,the same seed will produce the same series of "Random numbers" , every time the program is ran.Thats why you need to seed with something that changes every second ,wich is time ,or other source of randomness.
The challenge is good ,i thought that there was a hard part ,when i saw that a function which i called ConsumeRand(constant) , just loops ,and generates randoms ,which changes the random numbers , so if you expected it to be x , it will be after lets say , y places |
2026-01-25 19:20 |
| Time Rift 2026 |
n5381=5381
v7=0
for char in "hussam":
v7 = 33 * n5381;
n5381 =( 33 * n5381 + ord(char))&0xffffffff
print((n5381^0x2026)*132) |
2026-01-18 16:06 |
| StaticAuth |
goodjob123
Verification successful.
Secure data accessed:
----------------------
Location: Grid 47-C
Access code: 8891-3324
Status: Active
Timestamp: Verified |
2025-12-23 20:20 |
| Patch protect |
Nice one ,I think i found a creative but simple solution ,I changed the suspend count of the thread , so , it wont launch when you create it , until suspend count =0; |
2025-11-25 16:29 |
| easy but a little tricky |
I know this is not the intended solution ,I have patched the binary to jump into corona function ,and then store the return in the rbp-0x4, with noping the input storage , now the cmp compares the return with itself . |
2025-11-22 20:16 |