Intercepting & monitoring Windows API calls to find a flag in a hidden buffer
Intercepting & monitoring Windows API calls to find a flag in a hidden buffer
Reversing decompiled C++ code to extract a flag by tracing string manipulation logic
Bypassing an infinite debugger-killing loop by NOP'ing an unconditional jump
Bypassing simple anti-debugging techniques in a Windows executable through dynamic analysis