Skip to content

Instantly share code, notes, and snippets.

View Iqmaa's full-sized avatar
🎯
Focusing

Crypt(iq) Iqmaa

🎯
Focusing
View GitHub Profile
@Iqmaa
Iqmaa / Day 126.md
Last active September 4, 2025 22:57
more assembly

more Assembly

@Iqmaa
Iqmaa / Day 125.md
Created September 4, 2025 22:05
Restt

Restt

@Iqmaa
Iqmaa / Day 124.md
Created September 2, 2025 21:08
arithmetic operations in x86-64

arithmetic operations in x86-64

@Iqmaa
Iqmaa / Day 123.md
Created September 1, 2025 19:38
learning about x86-64

x86-64 Assembly

image

CISC - complex instruction set computing

@Iqmaa
Iqmaa / Day 122.md
Last active September 1, 2025 19:33
more on Packer CTF

more on Packer CTF

Trying to solve packer by actually reverse engineering.

@Iqmaa
Iqmaa / Day 121.md
Created August 30, 2025 07:56
ARM memory and stack

ARM memory and stack

@Iqmaa
Iqmaa / Day 120.md
Created August 29, 2025 07:50
More about ARM

More about ARM

@Iqmaa
Iqmaa / Day 119.md
Created August 28, 2025 10:10
Packer CTF Flag

Solving packer CTF

Packer is a medium level reverse engineering CTF from pico.

Should've realised from the name the file was packed.

Initially opened the file in IDA which revealed nothing since it was packed, saw from the hint that the file size had been reduced. Ran the strings command and found out it had been packed using UPX so I unpacked it and ran strings again, and boom! got the flag.

It was in hex format too and I decrypt it using cyberchef

@Iqmaa
Iqmaa / Day 118.md
Created August 27, 2025 20:34
packer CTF

Packer CTF

Started a new CTF on pico, haven't been able to solve it yet though

@Iqmaa
Iqmaa / Day 117.md
Created August 26, 2025 18:58
conditionals in thumb

conditionals in thumb