| aname crackme |
im_your_password_140714
A lot of XORing (TY ❤️ Ghidra) |
2026-02-18 21:12 |
| pixy |
TODO:
Download a real JPEG → rename it to abc.jpeg (3 chars + .jpeg)
Run under x64dbg → set breakpoint on memcmp (or vcruntime140!memcmp)
When breakpoint hits, check arguments:
RCX = pointer to computed 3-byte value
RDX = pointer to file base name (e.g., "abc")
R8 = length (should be 3)
Follow RCX in Dump and read the first 3 bytes (often printable ASCII).
Rename the file to <those 3 chars>.jpeg.
Run again → should print dayummm |
2026-02-15 19:42 |
| KeygenMe |
python script:
import sys
username = "vBPmZTInt5ZtI6i"
password_hex = "23d2122133e262ddd9d0d29138c69a"
password = bytes.fromhex(password_hex)
sys.stdout.buffer.write(username.encode("ascii") + b"\n")
sys.stdout.buffer.write(password + b"\n")
python script.py | crackme.exe |
2026-02-15 12:41 |
| VeryHard 99% you can't do it |
FLAG{U_CR4CK3D_TH3_ULT1M4TE_CH4LL3NG3}
~ 15 seconds to find the right string in Ghidra❤️ |
2026-02-08 19:17 |
| crack the points |
Your count points is 12345
TY ❤️ x64dbg |
2026-02-08 18:45 |
| PlsCrackMe |
Answer: 123@#!ABCabcd
ty ❤️ Ghidra
func Counter:
...
if ((((dig_count == 3) && (spec_char_count == 3)) && (upper_char_count == 3)) && (lower_char == 4)
) {
Bool = 1;
... |
2026-02-08 12:09 |
| ACrack |
CrackMeOne (ty Ghidra❤️) |
2026-02-08 09:20 |
| Password(Very Easy) |
SuperPass ❤️ TY Ghidra ❤️ |
2026-02-02 16:01 |
| Validator (easy) |
Answer: ValidPassword TY Ghidra❤️ |
2026-02-01 19:09 |
| A CrackMe by ByteClassic (on yt) |
secret123 |
2026-02-01 18:44 |
| Ez Crackme |
ar@gerg554y345@htw54 |
2026-02-01 18:37 |