RedVi on 2:23 PM 09/01/2023: CTF{Gh1Dr4-4nD-5Tr4C3-15-H31L}
Ch4daev on 5:58 PM 09/06/2023: CTF{Ghf1Dr4-4nD-5Tr4C3-f15-H3f1L} =)
jjsimpson on 7:25 PM 09/11/2023: done
CTF{Gh1Dr4-4nD-5Tr4C3-15-H31L}
l0sWk2h4rd on 4:03 AM 09/12/2023: CTF{Gh1Dr4-4nD-5Tr4C3-15-H31L}
RyzenHub on 3:03 AM 09/15/2023: Pretty fun crackme tbh i found the encrypt function in main then I copied it but changed -= to += and it shifted the password back.
bang1338 on 1:38 PM 09/26/2023: i don't have linux machine, but i know the answer
chernobylmouse on 4:35 AM 11/24/2023: This was an excellent crack me. The testing to see if executable was in a debugging environment was a nice twist.
benni on 10:55 PM 12/08/2023: well created with a simple debugger protection. was fun.
semenov.andrey on 12:05 AM 01/02/2024: It is my first crackme, funny)
pico on 12:12 PM 01/14/2024: CTF{Gh1Dr4-4nD-5Tr4C3-15-H31L}
This has been my first proper crackme, although I must admit I used this to help me: https://www.dcode.fr/ascii-shift-cipher
n00-name on 5:47 PM 03/22/2024: CTF{Gh1Dr4-4nD-5Tr4C3-15-H31L}
alxxx on 1:47 AM 06/15/2024: #include
#include
int main() {
char *lc_28 = "9J)'Bs";
for (int lc_14 = 0; lc_14