Upload:
11:14 PM 08/11/2024
Description
a little treat if you can crack successfully :)
mr.penis on 4:28 PM 08/21/2024: jnz jz = crack
https://i.imgur.com/0EGv9X3.png
fb1 on 3:49 AM 08/22/2024: Good crackme, used a mix of brute force and x86dbg
xorkey on 11:56 AM 08/27/2024: Is there a possible key for this?
x64hesa on 12:31 PM 09/06/2024: Nice crackme!
https://cdn.discordapp.com/attachments/1281592480290177076/1281592490084008077/image.png?ex=66dc4784&is=66daf604&hm=6721f2c19bcb5f4c52e993f61f6d3f34a462737daff51b4615e1f1b37e6853f3&
Kafiw on 8:01 PM 09/09/2024: Nice crackme :)
https://imgur.com/a/FEokBVz
Punch on 3:51 PM 10/05/2024: Cracked :P https://ibb.co/BrHj5mR
iwn on 9:53 AM 10/10/2024: https://i.imgur.com/xLYizkj.png
cracked
kvfs on 7:24 PM 10/15/2024: I could manage to get it succesfully without patching the pe. I might be uploading a keygen soon. Good job on this crackme!
0xDDDDD on 1:26 PM 10/20/2024: jmp == nop done ! || 3 starts
_int2eh on 10:37 PM 10/21/2024: Very easy
junfer001 on 6:06 PM 10/26/2024: As a verry noob person, i changed 2 jne to je to reverse the boolean :)
skyflizz on 8:13 PM 10/28/2024: Thanks, thats easy for beginner. I solve it in 3 minutes, how i have do ? When its say incorrect blablabla i put a jmp 0xadress to the congrats adress. Thats easy! Proof : https://ibb.co/tq0cGKS
Thanks to the developper, with him we can get our skill reverse engerning to +++++
egorogl on 2:10 PM 11/24/2024: drowssap
123
egorogl on 2:40 PM 11/24/2024: Hello author. Is there drowssap somewhere in your program? I have no idea where it came from, and it fit perfectly with the login with the fictitious key 123. I saw it once in one of the registers, I could not reproduce it again in the debugger.
sproute on 2:22 PM 12/21/2024: I really simple reversed 2 jnz
You must me logged to submit a solution