Reverse Engineering Challenges


pwn.college Archives.

Archived Reverse Engineering Challenges from Program Security Dojo Archived: Fall 2025


Reverse engineer this challenge to find the correct license key, but your input will be modified somehow before being compared to the correct key.

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Reverse engineer this challenge to find the correct license key, but your input will be modified somehow before being compared to the correct key.

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Reverse engineer this challenge to find the correct license key, but your input will be modified somehow before being compared to the correct key.

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Reverse engineer this challenge to find the correct license key, but your input will be modified somehow before being compared to the correct key.

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Reverse engineer this challenge to find the correct license key, but your input will be modified somehow before being compared to the correct key.

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Reverse engineer this challenge to find the correct license key, but your input will be modified somehow before being compared to the correct key.

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Reverse engineer this challenge to find the correct license key, but your input will be modified somehow before being compared to the correct key.

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Reverse engineer this challenge to find the correct license key, but your input will be modified somehow before being compared to the correct key.

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

We're about to dive into reverse engineering obfuscated code! To better prepare you for the journey ahead, this challenge is a very straightforward crackme, but using slightly different code, memory layout, and input format. We will progressively obfuscate this in future levels, but this level should be a freebie!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

We're about to dive into reverse engineering obfuscated code! To better prepare you for the journey ahead, this challenge is a very straightforward crackme, but using slightly different code, memory layout, and input format. We will progressively obfuscate this in future levels, but this level should be a freebie!

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Let's dive into reverse engineering obfuscated code! This challenge is using VM-based obfuscation: reverse engineer the custom emulator and architecture to understand how to get the flag! If you are clever, you won't need to reverse too much VM code.

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Let's dive into reverse engineering obfuscated code! This challenge is using VM-based obfuscation: reverse engineer the custom emulator and architecture to understand how to get the flag! If you are clever, you won't need to reverse too much VM code.

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Let's dive into reverse engineering obfuscated code! This challenge is using VM-based obfuscation: reverse engineer the custom emulator and architecture to understand how to get the flag! If you are clever, you won't need to reverse too much VM code.

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

Let's dive into reverse engineering obfuscated code! This challenge is using VM-based obfuscation: reverse engineer the custom emulator and architecture to understand how to get the flag! If you are clever, you won't need to reverse too much VM code.

Connect with SSH

Link your SSH key, then connect with: ssh hacker@pwn.college

30-Day Scoreboard:

This scoreboard reflects solves for challenges in this module after the module launched in this dojo.

Rank Hacker Badges Score