Rating:

Detailed writeup [here](https://github.com/DaBaddest/CTF-Writeups/tree/master/darkCON%20CTF%202021/Too%20Much)

Solution without using z3 or angr

Dump the disassembly of the binary using objdump and save it into a file

```bash
objdump -M intel -a rev > dump.asm
```

Running the python script gives the flag

```python
with open("dump2.asm") as fp:
dat = fp.readlines()

# Getting the values
inst = []
for i in range(len(dat)):
if ("sete al" in dat[i]) and ("cmp eax," in dat[i-1]):
inst.append(dat[i-1])

vals = []
for i in inst:
vals.append(int(i.split("eax,0x")[1], 16))

# Bruteforcing char-by-char
flag = ''
for v in vals:
for i in range(32, 127):
if ((16 * i) + (i >> 4)) & 0xff == v:
flag += chr(i)
break

assert 200 == len(flag) # Since there are 200 functions

print(flag)
```

Original writeup (https://github.com/DaBaddest/CTF-Writeups/tree/master/darkCON%20CTF%202021/Too%20Much).