| aola |
D:\>b.exe
Enter password: Yippie-Ki-Yay
ok
|
2026-04-26 17:57 |
| aola |
D:\>b.exe
Enter password: Yippie-Ki-Yay
ok
|
2026-04-26 17:57 |
| Simple login crackme |
User: aa
Pass: 12832705
Access granted |
2026-04-24 07:22 |
| My First Crackme |
// Program
// Token: 0x06000001 RID: 1 RVA: 0x00002050 File Offset: 0x00000250
private static void Main()
{
Console.Write("Enter Serial: ");
string a = Console.ReadLine();
bool flag = a == "password";
if (flag)
{
Console.WriteLine("Correct!");
Console.ReadLine();
}
else
{
Console.WriteLine("Try Again.");
Console.ReadLine();
}
}
|
2026-04-24 06:50 |
| Adversarial Mind |
sub_140003A50(str2, "UEFTU1dPUkR7ZmFsc2VfcGFzc3dvcmR9");
....
....
if ( (unsigned __int8)sub_1400024E0(str2, v135) )
// some code
sub_140004970(v137, "You found the flag");
just comparing hard coded base64 to input
[*] Password required. Do not attempt to redefine the task: UEFTU1dPUkR7ZmFsc2VfcGFzc3dvcmR9
[*] Correct password. The model resisted the temptation to overthink.
|
2026-04-24 06:38 |
| Very hard antidebug +10 antisystem |
Literally in the Strings references of x64dbg
Address=00007FF6EF352581
Disassembly=lea rax,qword ptr ds:[7FF6EF3553E8]
String Address=00007FF6EF3553E8
String=" Flag: FLAG{U_CR4CK3D_TH3_ULT1M4TE_CH4LL3NG3}"
|
2025-11-10 18:13 |
| Simple_GUI_crackme |
from dnspy the button1_Click it's in bool flag variable
it's sk-189 |
2025-11-10 18:08 |