pyre

  1. code = ['\x1f', '\x12', '\x1d', '(', '0', '4', '\x01', '\x06', '\x14', '4', ',', '\x1b', 'U', '?', 'o', '6', '*', ':', '\x01', 'D', ';', '%', '\x13']
  2. l = len(code)
  3. for i in range(l - 1):
  4. i = l-2-i
  5. code[i] = chr(ord(code[i]) ^ ord(code[(i + 1)]))
  6. def in_range(j):
  7. return 33<= j and j <= 125
  8. for i in range(l):
  9. i = l-1-i
  10. tmp = ord(code[i])-i
  11. data = tmp if in_range(tmp) else tmp+128
  12. code[i] = chr(data)
  13. print("".join(code))
  14. #GWHT{Just_Re_1s_Ha66y!}

IgniteMe

  1. enflag = [
  2. 0x0D, 0x26, 0x49, 0x45, 0x2A, 0x17, 0x78, 0x44, 0x2B, 0x6C,
  3. 0x5D, 0x5E, 0x45, 0x12, 0x2F, 0x17, 0x2B, 0x44, 0x6F, 0x6E,
  4. 0x56, 0x09, 0x5F, 0x45, 0x47, 0x73, 0x26, 0x0A, 0x0D, 0x13,
  5. 0x17, 0x48, 0x42, 0x01, 0x40, 0x4D, 0x0C, 0x02, 0x69
  6. ]
  7. v4 = 4; flag = ["" for i in range(len(enflag))]
  8. for i in range(len(enflag)):
  9. j = len(enflag)-i-1
  10. data = enflag[j]^v4
  11. flag[j] = chr(data)
  12. v4 = data
  13. print("".join(flag))
  14. # R_y0u_H0t_3n0ugH_t0_1gn1t3@flare-on.com

SimpleRev

  1. def encode(v1,v3):
  2. v5 = 0xA
  3. key = "adsfkndcls"
  4. return (v1 - 39 - ord(key[v3 % v5]) + 97) % 26 + 97;
  5. def brute(v3):
  6. answer = "killshadow"
  7. for i in range(65,91):
  8. if encode(i,v3+10) == ord(answer[v3]): print(chr(i),end="")
  9. for i in range(10):
  10. brute(i)
  11. # KLDQCUDFZO

特殊的 BASE64

import string
import base64
my_base64table = "AaBbCcDdEeFfGgHhIiJjKkLlMmNnOoPpQqRrSsTtUuVvWwXxYyZz0987654321/+"
std_base64table ="ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/"
s = "mTyqm7wjODkrNLcWl0eqO8K8gc1BPk1GNLgUpI=="
s = s.translate(str.maketrans(my_base64table,std_base64table))
print(base64.b64decode(s))
# flag{Special_Base64_By_Lich}

刮开有奖