This is a write-up of the reverse engineering challenge from the 2019 BambooFox CTF competition. It provides a detailed explanation of the challenge and its solution. The write-up includes a step-by-step guide on how to reverse engineer the challenge, as well as insights into the techniques and tools used to solve it. This resource is suitable for anyone interested in reverse engineering and wants to learn from a real-world example.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
yextend extends Yara's functionality by automatically handling archived and compressed content inflation, enabling pattern matching on files buried within multiple layers of archives.
An open-source dynamic analysis framework that intercepts and monitors API calls in Android applications using the Android Substrate framework.
A collaborative malware analysis framework with various features for automated analysis tasks.
A program to manage yara ruleset in a database with support for different databases and configuration options.
Joe Sandbox Community provides automated cloud-based malware analysis across multiple OS platforms.
An open source .NET deobfuscator and unpacker that restores packed and obfuscated assemblies by reversing various obfuscation techniques.
An open source machine code decompiler that converts binary executables into readable C source code across multiple architectures and file formats.
A static analysis tool for PE files that identifies potential malicious indicators through compiler detection, packing analysis, signature matching, and suspicious string identification.