| Leet Echo Chamber |
Enter activation number:
133742069
result: 133742069 |
2026-04-19 00:30 |
| ZWARE |
def ror(val, bits, size=8):
return ((val & ((1 << size) - 1)) >> bits) | (val << (size - bits) & ((1 << size) - 1))
def rol(val, bits, size=8):
return ((val << bits) & ((1 << size) - 1)) | ((val & ((1 << size) - 1)) >> (size - bits))
target = [
0x80, 0xA8, 0xD8, 0xBC,
0xA4, 0x84, 0x4C, 0x14,
0x34, 0xEC, 0x00, 0x14,
0x38, 0xD4, 0xD4, 0x14,
0x58, 0xEC, 0x80, 0x8C,
0x9C # need to verify this byte
]
# Sequence: z, p, z, p, z, l, z, p, z, l
# Reverse: l_inv, z_inv, p_inv, z_inv, l_inv, z_inv, p_inv, z_inv, p_inv, z_inv
def solve(data):
res = list(data)
# 1. l (ROR 2) -> ROL 2
res = [rol(b, 2) for b in res]
# 2. z (XOR 0x5A)
res = [b ^ 0x5A for b in res]
# 3. p (ROR 6) -> ROL 6
res = [rol(b, 6) for b in res]
# 4. z (XOR 0x5A)
res = [b ^ 0x5A for b in res]
# 5. l (ROR 2) -> ROL 2
res = [rol(b, 2) for b in res]
# 6. z (XOR 0x5A)
res = [b ^ 0x5A for b in res]
# 7. p (ROR 6) -> ROL 6
res = [rol(b, 6) for b in res]
# 8. z (XOR 0x5A)
res = [b ^ 0x5A for b in res]
# 9. p (ROR 6) -> ROL 6
res = [rol(b, 6) for b in res]
# 10. z (XOR 0x5A)
res = [b ^ 0x5A for b in res]
return "".join(map(chr, res))
print(f"Result with 0x9C: {solve(target)}")
|
2026-04-18 22:47 |
| Simple login crackme |
User: MMM
Pass: 74408372
Access granted |
2026-04-18 00:19 |
| Find The Key |
Enter the magic number : 4
Enter Activation Key: GA-DJ
Z+{Act1va7i0n} |
2026-04-15 23:02 |
| Adversarial Mind |
UEFTU1dPUkR7ZmFsc2VfcGFzc3dvcmR9 |
2026-04-15 22:19 |
| Keygen Crackme |
MachineGuid: b4fda2c6-0931-4672-8da0-ba7cf6c9f309
Key: ihefdiddcgbehfiacfdxhfidfeehebb |
2026-04-13 16:40 |