There are some graceful or fierce reverse challenges I met in past CTFs.
Name | Year | From | Summary | Format | Link | Rating |
---|---|---|---|---|---|---|
- | 2020 | pbCTF | * | * | ||
app2c | 2020 | ByteCTF final | iOS ppa reverse | mach arm | ||
metal_revenge | 2020 | WCTF final | Intel metal ISA reverse | PE | ||
restless | 2020 | hxp | C++ brute force md5 hash | ELF | ||
primary ingredient | 2020 | HITCON | haskell chall | ELF | ||
Baby Flutter? | 2020 | ByteCTF | flutter vm | ELF | ||
unlimited | 2020 | 0CTF final | fp: lambda Y-combinator | ELF | ||
w | 2020 | 0CTF | multi-layers wasm | ELF | ||
J | 2020 | 0CTF | nanomites + ollvm obfus + IDEA | PE | ||
flag-hunting | 2020 | DEFCON Qual | inst tracing + custom ds | TXT | ||
three | 2019 | 36C3 | custom vm + SIMD + onlyMain | ELF | ||
starWars | 2019 | ctfzone | transcription + acm | PE | ||
Parasite Validator | 2019 | hack.lu | WindowsInternal + crypto | PE | ||
plam | 2019 | balsn | math + interpreter | PY | ||
suicune | 2019 | HITCON | interpreter | ELF | ||
CpuAdventure | 2019 | Dragon Teaser | custom arch + Blind RE | TXT | ||
CpuAdventure2 | 2019 | Dragon Teaser | custom arch + Blind RE | TXT | ||
ROPvm | 2019 | N1CTF | custom vm + transcription | ELF | ||
M-Poly-Cipher | 2019 | TWCTF | onlyMain(loop expend) + crypto | ELF | ||
Holy Grail War | 2019 | TWCTF | graalVM + crypto | ELF | ||
TPM2137 | 2019 | WCTF | FPGA bit stream | |||
r3cpu | 2019 | WCTF | custom arch | CUSTOM | ||
True Zero | 2019 | ASIS | PNG crypto | ELF | ||
HARPA Hyper quantum | 2019 | Pwn2Win | quantum crypto | QASM | ||
GPURTL | 2019 | Google Final | HW simulator + crypto | MISC | ||
Flaggy Bird | 2019 | GoogleCTF | Algorithm + android native code | ELF(ARM) | ||
nvram | 2019 | QWB-final | vm + BB obfuscation | ELF | ||
lut/lut_revenge | 2019 | DEFCON China | math crypto (emu?) | ELF | ||
wasm_lab | 2019 | QWB | wasm pwn wasabi | ELF | ||
boringcrypto | 2019 | QWB | ollvm + (multi-crypto) | ELF(ARM) | ||
yy | 2019 | starctf | flag parser | LEX? | ||
Signal VM | 2019 | De1CTF | VM | ELF | ||
Plaid Party Planning III | 2019 | PlaidCTF | algorithm | ELF | ||
big maffs | 2019 | PlaidCTF | math=>Ackermann function | ELF | ||
sixology | 2019 | 0CTF | custom arch | ELF | ||
sanitize | 2019 | 0CTF | BB obfuscation | ELF | ||
permute | 2018 | 35C3 | BB obfuscation | ELF | ||
Chains of trust | 2018 | Dragon Teaser | remote interactive + anti-debug | ELF | ||
eop | 2018 | HITCON | transcription | ELF | ||
party | 2018 | HITCON | data structure | ELF | ||
obf | 2018 | QWB | VM | ELF | ||
From CTFtime and other websites
Reference l4wio
(TBC)