REDo2 ended up being worth 152 points in the Reverse Engineering category in TAMU CTF 2022! Step 1: I much rather read Pseudo-C I can read assembly and have in the past when my disassemblers have lost track of what is happening or if I am in gdb, but I’ve been spoiled by Binary Ninja and Ghidra so why not just assemble the code 👀 If you run gcc -g -m32 -c redo2.