Skip to content
logo
Red wilds
ELF x86 fake instructions
  • Privacy greenhouse
  • Defence blues
  • Purple crossroads
  • Indigo observatory
  • Contact
Initializing search
    • Unseen University Power & Light Co.
    • The Scarlet Semaphore
    • Myrddin’s menagerie
    • In: Where the falcons and foxes roam
    • Through: Where the raccoons burrow and rummage
      • The art of staying where you are not wanted
      • Overflowing the bin on purpose
      • Reverse engineering
        • Binary formats
        • Cracking nuts
        • Runbooks
        • Root me challenges
          • ELF x86 0 protection
          • ELF x86 basic
          • PE x86 0 protection
          • ELF C++ 0 protection
          • Godot 0 protection
          • PE x86 0 protection
          • ELF MIPS basic crackme
          • ELF x64 golang basic
          • ELF x86 fake instructions
            • Resources
          • ELF x86 ptrace
          • Godot bytecode
          • WASM introduction
          • ELF ARM basic crackme
          • Godot mono
          • PYC bytecode
          • ELF x86 no software breakpoints
          • ELF ARM crackme 1337
          • ELF x86 crackpass
          • ELF x86 exploitme
          • ELF x86 random crackme
          • GB basic Game Boy crackme
          • APK anti-debug
        • crackmes.one
      • Steganography
      • Crypto-attacks
      • Slipping through the cracks
    • Out: Where squirrels swipe the crown jewels
    • Resources

    ELF x86 fake instructions¶

    Root-me challenge: Some fakes instructions. Compiled with gcc 4.3.2 on Xubuntu 8.04. Proc : 32bits x86.


    ltrace ./crackme password
    

    Resources¶

    • The GNU binary utils

    • Executable and Linkable Format ELF

    • Reverse engineering Linux ELF binaries on the x86 platform

    2026-03-25 22:33
    © Copyright 2025, TyMyrddin.
    Created using Sphinx 7.2.6. and Sphinx-Immaterial

    Made with love in the Unseen University, 2025, with a forest garden fostered by /ut7