jnth on 2024-08-26 09:48:
Your program doesn't execute on Windows. Could you at least tell us what to crack? What is the objective here?
jnth on 2024-08-26 09:52:
oh, sorry, forgot to check the file size. ignore my previous comment
newcracker on 2024-08-28 09:04:
Who can teach me how to crack it
Nicole.exe on 2024-09-01 17:26:
Cracked, i dmed you on discord
zekihvh on 2024-09-02 22:28:
A lot of ciphering (single way ciphering with english as base, you can guess how well that goes), a decent bit of anti-debugging, yet no integrity checks
nignog on 2024-09-07 08:51:
babi antidebug, u can run the cipher code to get out the strings
cadis on 2024-09-07 20:09:
Hello new here how can drag the .exe when its asks a password ? any clue please ?
survivalizeed on 2024-09-07 22:44:
[Click to reveal]Nice crackme. Next time i would suggest to make a more complicated obfuscation, as the password routine actually only checks the code in a very few lines of assembly.
That way your 1000+ lines of asm turned out to be like 20+ lines of asm to analyze. My suggestion would be to do some more pseudo shifts with the password to cause more confusion.
For some odd reason I wasn't able to use memory breakpoints... Could be anti-debugging but not too sure. Setting a first chance exception filter did the job for me :)
SPOILER: TheMagicEmpireMayBegin
Ch4daev on 2024-09-09 14:20:
Good crackme. The password checking code looks very cumbersome because of a lot of embedded code from the std library, in particular the std::string implementation. Finding the password is very easy if you apply bp to the string decryption function, which is identical for both normal console messages and the password. Anti-debugging is not very difficult, I was very interested in the snippet that looks for int3 instructions in RWX memory regions, this seems very strange as usually the debugger does not change the protection to set a breakpoint, and even if it does it puts the memory protection back after a successful set breakpoint.
maxznachit on 2024-09-21 05:53:
please help me to crack the password
_int2eh on 2025-10-07 20:31:
[Click to reveal]Pass: TheMagicEmpireMayBegin
A great cracking... It took me a few hours, but I really enjoyed it.