Rating:
Detailed writeup [here](https://github.com/DaBaddest/CTF-Writeups/tree/master/darkCON%20CTF%202021/Too%20Much)
Solution without using z3 or angr
Dump the disassembly of the binary using objdump and save it into a file
```bash
objdump -M intel -a rev > dump.asm
```
Running the python script gives the flag
```python
with open("dump2.asm") as fp:
dat = fp.readlines()
# Getting the values
inst = []
for i in range(len(dat)):
if ("sete al" in dat[i]) and ("cmp eax," in dat[i-1]):
inst.append(dat[i-1])
vals = []
for i in inst:
vals.append(int(i.split("eax,0x")[1], 16))
# Bruteforcing char-by-char
flag = ''
for v in vals:
for i in range(32, 127):
if ((16 * i) + (i >> 4)) & 0xff == v:
flag += chr(i)
break
assert 200 == len(flag) # Since there are 200 functions
print(flag)
```