Hard
MaxSec
Grandpa Max has intercepted a suspicious executable from Vilgax’s secret transmission. It looks like a basic program — just a password box — but he knows there’s more to it. “I’ve seen this kind of thing before,” he mutters. “Coils of logic, hidden beneath the surface… like a snake waiting to strike.” Vilgax never makes it easy. Somewhere in this binary, the secret lies dormant. All it takes is the right password to wake it.
maxsec.exe
- The binary file for Windowsmaxsec.out
- The binary file for Linux
The binary is packed with PyInstaller. We can extract it to get the compiled python code in .pyc
format. Then we can reverse engineer / decompile the compiled code to find the flag.
Use pyinstxtractor to extract the contents of the maxsec.exe
file and then use PyLingual or uncompyle6 to decompile the .pyc
files to get the original python code.
cyn0x{gr4ndpa_m4x_d3bugged_th3_d4ng3r}