Skip to content
logo
Red team
PE x86 0 protection
  • Green team
  • Blue team
  • Purple team
  • Ty Myrddin
Initializing search
      • IN: Where the falcons and foxes roam
      • THROUGH: Where the raccoons burrow and rummage
        • The art of staying where you are not wanted
        • Where the raccoon overflows the bin—on purpose
        • Foraging for secrets in binaries
          • Binary formats
          • Cracking nuts
          • Malware analysis
          • Reverse engineering training grounds
            • THM Rooms
            • Root me challenges
              • ELF x86 0 protection
              • ELF x86 basic
              • PE x86 0 protection
                • Resources
              • ELF C++ 0 protection
              • Godot 0 protection
              • PE x86 0 protection
              • ELF MIPS basic crackme
              • ELF x64 golang basic
              • ELF x86 fake instructions
              • ELF x86 ptrace
              • Godot bytecode
              • WASM introduction
              • ELF ARM basic crackme
              • Godot mono
              • PYC bytecode
              • ELF x86 no software breakpoints
              • ELF ARM crackme 1337
              • ELF x86 crackpass
              • ELF x86 exploitme
              • ELF x86 random crackme
              • GB basic Game Boy crackme
              • APK anti-debug
            • Malware traffic analysis exercises
            • theZoo - A Live Malware Repository
            • crackmes.one
          • Malware traffic analysis exercises
          • theZoo - A Live Malware Repository
          • crackmes.one
        • The payload is in the picnic photo
        • Tipping the stack—and the garbage can
        • Nature’s cheats: The raccoon’s guide to slipping through the cracks
      • OUT: Where squirrels swipe the crown jewels
    • Resources

    PE x86 0 protection¶

    RootMe challenge: PE x86 - 0 protection: This challenge comes from greHack CTF 2012.

    Retrieve the password to validate this challenge.


    PE x86 0 protection

    Resources¶

    • Microsoft Portable Executable and Common Object File Format Specification

    • Reverse Engineering pour Débutants - Dennis Yurichev

    • Introduction au format Portable Executable PE

    • Reverse Engineering for Beginners - Dennis Yurichev


    Last update: 2025-05-12 14:16
    Back to top
    Previous ELF x86 basic
    Next ELF C++ 0 protection
    © Copyright 2025, TyMyrddin.
    Created using Sphinx 7.2.6. and Sphinx-Immaterial

    Made with love in the Unseen University, 2025, with a forest garden fostered by /ut7