TheLeopard65

REVERSE

Reverse

  • PUBLISHED ON
    Blog Published on:
    A detailed write-up of the BroncoCTF 2025 Reverse Engineering challenges, explaining step-by-step solutions for “Reversing for Ophidiophiles” and “Theflagishere!”. It covers Python decryption logic, bytecode decompilation, and function analysis to uncover hidden flags like `bronco{charge_away}` and `bronco{i_am_a_flag}`.

  • PUBLISHED ON
    Blog Published on:
    A comprehensive write-up of BITSCTF 2025 challenges across Reverse Engineering, Foreneics, and PWN. It provides detailed walkthroughs of tasks like Loginator, Baby Rev, and Praise Our RNG Gods—covering binary analysis, deobfuscation, memory forensics, and RNG prediction methods used to uncover hidden flags efficiently.

  • PUBLISHED ON
    Blog Published on:
    Nullcon GOA CTF 2025 writeup (February 1st, 2025): detailed solutions for REVERSE, WEB, and MISC challenges. Explains using Ghidra, radare2, and Python for reverse engineering tasks, analyzing scrambled data, extracting hidden content from PCAP files, and exploiting web pagination and SQL quirks to retrieve challenge flags.

  • PUBLISHED ON
    Blog Published on:
    Detailed write-up of TUCTF 2024 reverse engineering challenges, covering MYSTERY-BOX, SIMPLE-LOGIN, and CUSTOM-IMAGE-GENERATOR. Includes step-by-step binary analysis, decompiled code exploration, password and flag reconstruction, and solving a custom image format, illustrating the full process of tackling complex reverse engineering CTF tasks.