Round 1 of the Grand Reverse Engineering Challenge has 4 challenges, described below. Some are compiled for Linux/x86/64, some are compiled for Linux/ARM/32. The ARM binaries run well on a Raspberry Pi 4 (they have been tested on RPI4 running 32 bit Raspbian). There are three types of challenges: deobfuscation, tampering, and extraction.
Note that the challenges do not necessarily represent the best protections available from the obfuscation tools we have at our disposal - rather, they were designed to be possible to crack. Our end goal with this competition is to collect information for the community on how attacks are carried out in the real world. In other words, this is not a competition between providers of obfuscation tools, but a competition between attackers! We do not provide information on which tool was used to protect which challenge, and which protective transformations were employed - figuring this out is part of the challenge.
For each challenge we use the scale LIGHT, MEDIUM, HEAVY to give a rough indication of the amount of protection (i.e. obfuscation and tamperproofing) that has been added.