umpani on 2022-12-01 11:58:
Thank you.
Solved it with Ghidra and Python.
strawberry_cake on 2023-04-10 12:42:
[Click to reveal]flag{_y0u_f0und_key_}
RedVi on 2023-06-24 01:13:
[Click to reveal]on 1:12 AM 06/24/2023: nice challenge
flag: flag{_y0u_f0und_key_}
python script:
first = [0x51,0x53,0x4E,0x11,0x50,0x3D,0x51,0x11,0x41,0x50,0x11,0x52,0x3D,0x49,0x11,0x57,0x3D,0x0F,0x11,0x11,0x15]
second = [0x37,0x3F,0x2F,0x76,0x2B,0x62,0x28,0x21,0x34,0x0F,0x77,0x62,0x48,0x27,0x75,0x8,0x56,0x6A,0x68,0x4E,0x68]
for i in range(0,len(first)):
print(chr(first[i] ^ second[i]),end="")
dilmmman on 2023-09-06 22:19:
A very good one. I enjoyed it so much, thank you.
amnam on 2023-09-21 13:58:
Very nice and beautiful :))
Sinthoras39 on 2024-04-02 20:47:
I really enjoyed it. That was the first real crackme I solved, I also used it to familiarize with gdb and how to check memory adresses at runtime. When i wrote the keygen and the flag popped up, I was really excited.