You sure you want it? source code is written on my own custom virtual assembly language but I'd say its fairly easy to understand.
DM me on discord akseli9877 I will send you the src |
==> |
thanks guys :) |
==> |
congratz bro |
==> |
even beginner could solve this eyes closed |
==> |
extremely easy crackme. cracked in 1 minute |
==> |
good crackme but the fact it was UPX packed made the unpacking trivial. if your focus is on keygen maybe dont pack it at all |
==> |
Nice crackme. So guys basically when you decompile it as 64 bit, the first mov tells you the address of the flag in memory, and the xor instruction is a hint that you got to xor the flag to get the real flag. |
==> |
Quite easy. Took ~2 hours. No need to even unpack it. |
==> |
Very easy, even beginner could solve this eyes closed. |
==> |
Doesn't open on windows |
==> |
Very easy crackme. You can bypass every anti debug measure by nopping the first function call in the main function. Then just step through to comparison and you will see that the password is in clear text. |
==> |
Easiest crackme lol |
==> |
source code here
https://github.com/islaitala/The-Junkrat |
==> |
Glad you guys liked it ;) |
==> |
Very nice crackme. |
==> |
nvm I had scyllahide on :p |
==> |
I don't think it is solvable without patching in a reasonable amount of time.
You are asking to find the original password while providing the hash? If your password is very complex it is literally impossible.
However with patching this is very easy. |
==> |
easiest crackme of my life
x64dbg didn't get detected by IsDebuggerPresent |
==> |
EASY!
My python keygen:
[python]
seed = "tryHarderToMakeAGoodKeyGen"
seed_len = len(seed)
username = "dqwd12d12t123t"
username_len = len(username)
encrypted = ""
for i in range(username_len):
a = username[i]
a = ord(a) ^ seed_len
rem = a % username_len
encrypted += username[rem]
print(encrypted)
[/python]
1. use username string of your choice
2. input that string into the crackme too
3. run python program and copy the printed string into the program (password) |
==> |
[! SPOILER !]
You might need to unpack manually (for me upx didn't work so I used x32dbg and Scylla).
After unpacking the rest is really easy, just patch driver check and then patch key check or just use the key: I-AM-A-CR4CKER_(o | o) |
==> |
Very easy antidebug. You can remove the whole antidebug
by nopping 6 bytes at unpackme_patch.exe:$43CB.
Why is there bunch of useless instructions that do not make it harder to reverse? |
==> |
Very nice crackme. Enjoyed it alot. |
==> |