To correct the comment below (or above, don't know how it will post). It is basically the same program as last time but ran through very simple control flow obfuscation. Definitely nothing complicated, but in technicality, the program is still obfuscated by trying to make the executable be understood less. |
==> |
This was actually pretty cool. I found this in FUN_00401940. "VcsE~oHYo7&f.CCJ)dU1pwRJ&FXu{pq~TL4XbFKTqW7I)UZL9r".
The challenge itself wasn't hard, but I love the IDEA of having GUIs. Since I'm able to put it into more realistic scenarios.
For example, I love messing around with assembly that I recently started learning days ago. I changed the Jump Not Zero instruction to a Jump If Zero, so that I wouldn't need to type the right thing in. All is pretty cool to learn! Please keep making more. |
==> |