# TLDR
All of my solution for San Diego CTF competition in reverse engineering category
## Emoji
The challenge provide for us a python file run a simple xor encryption
```=
def main():
print("what do you think the key is?")
encrypted = '🙚🙒🙌🙭😌🙧🙬🙻🙠🙓😣🙯🙖🙺🙠🙖😡🙃🙭🙿🙩🙟😯🙮🙬🙸🙻🙦😨🙩🙽🙉🙻🙑😯🙥🙻🙳🙐🙓😿🙯🙽🙉🙣🙐😡🙹🙖🙤🙪🙞😿🙰🙨🙤🙐🙕😯🙨🙽🙳🙽🙊😷'
key = input()
plaintext = ''.join([chr(ord(c) ^ ord(key[i % len(key)])) for i, c in enumerate(encrypted)])
print("your decrypted text:", plaintext)
main()
```
We can find the key using the flag format which is "SDCTF{" i make a simple code to retrieve the key
```=
encrypted = '🙚🙒🙌🙭😌🙧🙬🙻🙠🙓😣🙯🙖🙺🙠🙖😡🙃🙭🙿🙩🙟😯🙮🙬🙸🙻🙦😨🙩🙽🙉🙻🙑😯🙥🙻🙳🙐🙓😿🙯🙽🙉🙣🙐😡🙹🙖🙤🙪🙞😿🙰🙨🙤🙐🙕😯🙨🙽🙳🙽🙊😷'
# key = input()
temp = "SDCTF{"
for i, c in enumerate(encrypted):
print(chr(ord(c) ^ ord(temp[i % len(temp)])), end="")
```
Grab the first 6 character and that will be the key you are looking for
```=
key = "😉😖😏😹🙊😜"
```
When we have the key decryption become simple
```=
Flag: SDCTF{emojis_look_different_but_theyre_just_like_regular_letters}
```
## Food without salt
This challenge provide for us a `.exe` file a game was written by Godot engine first i try to retrieve source code using [gdre](https://github.com/bruvzg/gdsdecomp) unfortunately there is an encryption key to prevent us from retrieve the source code first i using this tool [godot-key-extract](https://github.com/char-ptr/godot-key-extract?tab=readme-ov-file) to make a dll file and make dll injection in order to get the encryption key but for some reason the key is wrong then i found out another tool which has GUI which is [gdke](https://github.com/char-ptr/gdke) after running the file i was able to retrive source code

Set the encryption key and you will get source code
After that you should open the extracted file using godot engine to see everything in it and the flag will in there

```=
Flag: SDCTF{Welc0m3_Back_Brack3ys}
```