| rsame_v3 |
Thanks! Happy you liked the crackme. Great to see it solved 🙂 |
2026-03-12 20:44 |
| rsame_v3 |
Nice work! 👍
Your analysis is correct — the crackme verifies MD5(name) using RSA-128 without padding.
I’m glad someone took the time to reverse it and write a keygen. Thanks for the detailed write-up and explanation!
Best regards
Jiří |
2026-03-12 19:40 |
| rsame_v2 |
Yes, confirmed. The serial 4048192110296323912 is correct. |
2026-02-26 10:14 |
| rsame_v2 |
Nice write-up. Yes, the intended path was factoring the 64-bit modulus. |
2026-02-25 13:40 |
| rsame_v2 |
This crackme does not use hashing. It is pure RSA validation. |
2026-02-24 11:51 |
| rsame_v2 |
Thanks for solving it.
I appreciate any feedback on the challenge or design. |
2026-02-23 20:06 |
| rsame_v2 |
Thanks for solving it 🙂
Hope you enjoyed it. Any feedback is welcome. |
2026-02-23 19:53 |
| Crackme1 by Ulevel |
You wil find all the libraries in the mingw archive here: https://github.com/brechtsanders/winlibs_mingw/releases/download/13.2.0posix-18.1.3-11.0.1-msvcrt-r7/winlibs-x86_64-posix-seh-gcc-13.2.0-llvm-18.1.3-mingw-w64msvcrt-11.0.1-r7.zip |
2024-04-20 19:58 |