Trainings Samples

Samples

Clear
SHA256 Author Difficulty Tags Goal Solutions Likes Comments Created
5f56d5748940e4039053f85978074bde16d64bd5ba97f6f0026ba8172cb29e93 larsborn medium Find and analyze the string decryption/deobfuscation function. Determine the cryptographic algorithm being used and the memory layout of the encrypted data and key material. Try to emulate it with your tooling of choice, Binary Refinery is a good recommendation. 1 0 07 Jan 2026