ctf-reverse

Installation
Summary

Reverse engineering techniques and tool reference for CTF binary analysis challenges.

  • Covers 15+ binary types: x86-64, ARM, RISC-V, Python bytecode, WASM, .NET, APK (including Flutter/Dart AOT via Blutter), HarmonyOS HAP/ABC, custom VMs, and packed executables
  • Includes dynamic analysis shortcuts (strings, ltrace, strace, memory dumping) and static patterns for XOR ciphers, anti-debugging, self-modifying code, signal-based exploration, and multi-stage loaders
  • Provides tool-specific commands for GDB, Ghidra, radare2, IDA, Binary Ninja, and dogbolt.org, plus language-specific workflows for Rust, Godot, Roblox, Electron, and Ruby/Perl polyglots
  • Documents advanced patterns: lattice-based integer validation (LLL/CVP), decision tree constraint propagation, GLSL shader VMs, GF(2^8) Gaussian elimination, Z3 circuit solving, and timing side-channels
SKILL.md

CTF Reverse Engineering

Quick reference for RE challenges. For detailed techniques, see supporting files.

Prerequisites

Python packages (all platforms):

pip install frida-tools angr qiling uncompyle6 capstone lief z3-solver
# For Python 3.9+ bytecode: build pycdc from source
git clone https://github.com/zrax/pycdc && cd pycdc && cmake . && make

Linux (apt):

apt install gdb radare2 binutils strace ltrace apktool upx

macOS (Homebrew):

Related skills

More from ljagiello/ctf-skills

Installs
3.7K
GitHub Stars
2.0K
First Seen
Feb 1, 2026