Sweet and simple, good job :)
https://github.com/johnnnathan/Crack/tree/main/VaultCrack_by_psyr3n |
==> |
I enjoyed this challenge, simple yet detailed. Good job :)
https://github.com/johnnnathan/Crack/tree/main/Interesting_Crackme_by_BananaGrease |
==> |
This is an incredible crackme, definitely the best I have tried. Will probably finish it tomorrow, and write a write-up on it.
|
==> |
This was, as you said, really easy. Wrote a simple write-up for it and even decompiled it.
https://github.com/johnnnathan/Crack/tree/main/VeryEasyCrackme_by_int2eh |
==> |
Came back to this after a few weeks. It really is a great challenge, covering most concepts that a beginner/Intermediate should know.
Here is the solution: github.com/johnnnathan/Crack/tree/main/My_First_Crackme_by_None404 |
==> |
Username: abc
Password: 27217863414241789287
Might try to write a keygen for this. I understand most of the code, still searching for the Password generation though. Good job, quite enjoyable |
==> |
Is the program supposed to have a valid password? I was also able to bypass the debugger checks and get to the success message, but it doesn't seem to handle the key after it is given to the program. Regardless, I enjoyed deconstructing the checks, good job :) |
==> |
Can someone post a solution or help me? I have tried breaking when the memory point of the refusal message is accesses but the debugger just goes through it and I've tried both IDA and x64dbg for attaching to the new process that is created but I also got no results from that. This is the first time i've worked with threads and processes and there are no guides nor helpful info online. I know both where the main method is and where the password evaluator is, I just cannot seem to find a way to debug it |
==> |