WebAssembly Reverse Engineering Challenge

This website contains hacking challenges involving reverse engineering of WebAssembly programs.

Levels are increasingly more difficult. Each one exposes a single function callable by Javascript: hash(). It returns the sha256 sum of a flag. The goal is to retrieve the flag's original value. All flags follow the flag{...} format. You can easily check if your guess is correct as you have access to the answer's hash.

Get started with the first level