wctf{, then asks for a single byte xor key and decrypts a huge chunk of memoryBE63565656530556565603EF4B565656DFB30100DB038DDB2B8DDBE65A565656D5BA72A5F23C4B043C5731BE58565656D59246DB33AE08090B95DD527295DD0A7252DD1A725EDD02725AEE52565656070403DFB359625656565656565656565656565656173839223E332476303A373176263724226C760F6609126221315C5656ann0y1ng?!}wctf{Y0_D4wgbytes.fromhex("1E262502401E2579456B") xored with a constant key, but idk the length of the key printf("Decryptor pass: ");
scanf("%31s", key);
start_time = nanotime();
key_length = strlen(key);
v5 = v16;
for ( i = 0LL; i != 10; ++i )
{
v7 = i % key_length;
*v5++ ^= key[v7];
}
if ( nanotime() - start_time <= 10000 )
printf("Another flag part: %s\n", v16);
else
domeme();
v16 is the 10 bytes I sent before_th4t_w4s_