RedVi on 2023-09-01 14:23:
[Click to reveal]CTF{Gh1Dr4-4nD-5Tr4C3-15-H31L}
Ch4daev on 2023-09-06 17:58:
[Click to reveal]CTF{Ghf1Dr4-4nD-5Tr4C3-f15-H3f1L} =)
jjsimpson on 2023-09-11 19:25:
[Click to reveal]done
CTF{Gh1Dr4-4nD-5Tr4C3-15-H31L}
l0sWk2h4rd on 2023-09-12 04:03:
[Click to reveal]CTF{Gh1Dr4-4nD-5Tr4C3-15-H31L}
RyzenHub on 2023-09-15 03:03:
Pretty fun crackme tbh i found the encrypt function in main then I copied it but changed -= to += and it shifted the password back.
bang1338 on 2023-09-26 13:38:
i don't have linux machine, but i know the answer
chernobylmouse on 2023-11-24 04:35:
This was an excellent crack me. The testing to see if executable was in a debugging environment was a nice twist.
benni on 2023-12-08 22:55:
well created with a simple debugger protection. was fun.
semenov.andrey on 2024-01-02 00:05:
It is my first crackme, funny)
pico on 2024-01-14 12:12:
[Click to reveal]CTF{Gh1Dr4-4nD-5Tr4C3-15-H31L}
This has been my first proper crackme, although I must admit I used this to help me: https://www.dcode.fr/ascii-shift-cipher
n00-name on 2024-03-22 17:47:
[Click to reveal]CTF{Gh1Dr4-4nD-5Tr4C3-15-H31L}
alxxx on 2024-06-15 01:47:
#include
#include
int main() {
char *lc_28 = "9J)'Bs";
for (int lc_14 = 0; lc_14