Rating: 5.0

# Transformation

Category: Reverse Engineering

AUTHOR: MADSTACKS

## Description
```
I wonder what this really is... enc ''.join([chr((ord(flag[i]) << 8) + ord(flag[i + 1])) for i in range(0, len(flag), 2)])
```

## Solution

You could simply use [cyberchef]() on the `magic` setting, and get the flag `picoCTF{16_bits_inst34d_of_8_e141a0f7}`
.

Or use this:
```py
decode = '灩捯䍔䙻ㄶ形楴獟楮獴㌴摟潦弸彥ㄴㅡて㝽'
print(decode.encode('utf-16-be'))
```

Original writeup (https://github.com/xnomas/PicoCTF-2021-Writeups/blob/main/Transformation/README.md).