This year’s Flare-On includes a Python challenge. Similar to the previous year, it can be exploited quite extensively, but it is slightly more intricate than a straightforward memory dump, as was t...
Building on my previous post titled “Common Mistakes”, I wanted to share a practical example of how a stereotype obfuscator can be problematic. I received this particular obfuscator as a crackme an...
Introduction Python code objects are hidden, but they are a crucial part of how Python runs your code. These objects contain all the information needed to execute your code and are often used to cr...
Many Python obfuscators make the same mistakes, they use exec or eval to execute the code. They use compressors like zlib and lzma to then just pass the original code to the exec call. Example: im...
Introduction This course exists due to the lack of courses in reversing with python. There are almost no decent courses that focus on reversing. They all cover CPython internals, which comes in ha...
A new version of content is available.