g33kty on 2025-11-03 12:17:
https://github.com/geekty2/NullerF-s-Easiest/blob/master/README.md
lexx on 2025-11-03 17:53:
[Click to reveal]pass: 8569
MOV EAX, DWORD PTR SS:[RBP-4]
CMP EAX, 0x2179
nightxyz on 2025-11-04 00:33:
We used to avoid sharing crackme solutions with difficulty levels 1 or 2, even if we knew the solutions, to avoid discouraging newcomers. It's been a while since a crackme was released, but if someone still hasn't found the solution, then it's acceptable.
fumanchu182 on 2025-11-17 02:19:
[Click to reveal]8675309 ;)
adenosinetp10 on 2025-11-21 17:29:
took me around 8 mins, but found the solution. People should stop sharing answers here in the comments to be honest.
Thank you for your attention to this matter.
saintrowotuff on 2025-11-29 11:32:
go to fail string and then change the nearest jne - je, patch and then put in anything
JackDhanyels on 2025-12-01 18:58:
[Click to reveal]8569
rehub on 2025-12-06 17:27:
good! thanks for challenge!
Z3bra on 2025-12-17 12:14:
solved, thanks for challenge
nicolaspoersch on 2025-12-20 12:54:
I'm learning RE now and this challenge can be completed just with static analysis in the decompiler
here's the most important thing:
if (local_c == 0x2179
0x2179 is 8569 in decimal, if you are using ghidra it tells you the answer if you right click, great educational challenge!
Solution by SenorGPT on 2025-12-19 06:01: Windows x86-64 crackme. Traced string references (e.g., `"Enter PIN:"`) in x64dbg back into `main`, identified the numeric PIN check, and patched/bypassed the failure path to reach the success branch and recover the correct input - 8569.