This was fun.
Basically you start by navigating to the start page. This has some text like shown below.
You drop that code back into the url and it navigates to the next. This keeps going until eventually it just has end
.
import win32gui, win32con, time | |
import tkinter as tk | |
import pywintypes | |
windowList = [] | |
def winEnumHandler( hwnd, ctx ): | |
if win32gui.IsWindowVisible( hwnd ): | |
windowList.append((hwnd, win32gui.GetWindowText( hwnd ))) |
#!/usr/bin/python3.9 | |
cfd = dict()# cfd for cache_func_dict | |
def cache(func): | |
def wrapper(*args, **kwargs): | |
val = None | |
if func in cfd: | |
inner_dict = cfd[func] | |
if args in inner_dict: | |
val = inner_dict[args] | |
else: |
from PIL import Image | |
import sys | |
import hashlib | |
from getpass import getpass | |
import random | |
swap = ((1, 2, 3, 0), (3, 2, 1, 0), (1, 3, 0, 2), (0, 3, 1, 2), (1, 2, 0, 3), (2, 0, 3, 1), (2, 1, 0, 3), (3, 1, 2, 0), (0, 1, 3, 2), (2, 3, 1, 0), (0, 3, 2, 1), (3, 1, 0, 2), (3, 0, 2, 1), (3, 2, 0, 1), (2, 1, 3, 0), (0, 2, 3, 1), (3, 0, 1, 2), (2, 3, 0, 1), (0, 2, 1, 3), (1, 3, 2, 0), (2, 0, 1, 3), (0, 1, 2, 3), (1, 0, 2, 3), (1, 0, 3, 2)) | |
def encrypt(file, pword): | |
img = Image.open(file) |
This was fun.
Basically you start by navigating to the start page. This has some text like shown below.
You drop that code back into the url and it navigates to the next. This keeps going until eventually it just has end
.
To start off with, the password to Welcome_To_The_Game.rar
is hashcat
, simply enough.
We pop open that folder to get to the next level with, what looks to be, Brainf*ck
.
I dropped that into a compiler, but it didn't work. Notably the brackets are reversed, which prompted "why don't I reverse every symbol?" (This can be solved easier with this reverse f*ck tool)
Here it is reversed: