[Reverse] Wide
WIDE is a challenge presenting one binary, and one database file db.ex.
.
Running the binary, it shows the encrypted value, that needs a password for decryption:
.
Reading the binary with NSA’s Ghidra, in the menu function, we notice the password is compared to: sup3rs3cr3tw1d3

Using it to get the decrypted value:

HTB{str1ngs_4r3nt_4lw4ys_4sc11}