Rating:

## dangerzone

first we run strings to see the functions
```
$ strings dangerzone.pyc
```
./dangerzone.pyt
**reverse**
base64t
**b32decode(**
./dangerzone.pyR
./dangerzone.pyt
reversePigLatin
**rot13(**
decode(
./dangerzone.pyR
Something Something Danger Zones(
**=YR2XYRGQJ6KWZENQZXGTQFGZ3XCXZUM33UOEIBJ(**

... seems like a reversed base32

```
echo '=YR2XYRGQJ6KWZENQZXGTQFGZ3XCXZUM33UOEIBJ' | rev | base32 -d | rot13 -d
```
put it in the right order
```
$ echo -e "str='UCTF{r3d_l1n3_0v3rl04d}T';print(str[-1::]+str[0:-1:])" | python
TUCTF{r3d_l1n3_0v3rl04d}
```

**TUCTF{r3d_l1n3_0v3rl04d}**

Original writeup (https://github.com/h4ck7u5/CTF-writeups/blob/master/TUCTF/2018/dangerzone.md).