| First i found the password and then when i got the password "thisisverysecret" I tried to see what happened in the program logic when the key was correct to try to patch it and I succeeded :) |
6:18 PM 04/23/2025 |
==> |
| The password is "10" you can see in the "cmp [rsp+58h+var_38], 0Ah" is comparing our input with 0Ah (10 in hex) |
9:54 PM 02/26/2025 |
==> |
| Dont worth to make a keygen
because its really ez
https://pastebin.com/bN0PtZEL |
10:05 PM 01/16/2025 |
==> |
| Really easy to crack using x64 dbg:
"meilovecats" |
5:08 PM 01/16/2025 |
==> |
| Its not hard if you use ida pro and decompile it to c++:
the password is: "YourPass" |
4:58 PM 01/16/2025 |
==> |
| In the main function:
sub_401639 is called with v4 as target, v5 as input ("331") and a3 = 22.
This means it generates a key derived from "331" by applying an offset of 22.
For "331":
'3' โ (3 + 22) % 10 = 5
'3' โ (3 + 22) % 10 = 5
'1' โ (1 + 22) % 10 = 3
Result/Correct Key: "553" |
3:27 PM 01/09/2025 |
==> |
| My keygen: https://pastebin.com/G2w3psbT |
3:09 PM 01/09/2025 |
==> |
| Here my solotion (it took me more work than expected)
https://pastebin.com/LmgNGD3S |
10:40 PM 01/08/2025 |
==> |
| here my keygen for this crackme: https://pastebin.com/YRPLfEKq
|
10:34 PM 01/07/2025 |
==> |
| Password its in this adress on x64 dbg
00007FF7B99112E1| 49:0F47D6| cmova rdx,r14 | rdx:"crackmeYG" |
9:27 PM 01/07/2025 |
==> |
| Password: secret123 to patch
the program change "JNE" to "JE" |
6:36 PM 01/05/2025 |
==> |
| The password is: 1304ckletlqgjnbo
put a breakpoint here on x64dbg:
0000000000409C01 | 48:8B08 | mov rcx,qword ptr ds:[rax] | rcx:"1304ckletlqgjnbo", [rax]:"1304ckletlqgjnbo" |
6:25 PM 01/05/2025 |
==> |
| The program basically does this:
Username: 4 characters of any type.
Password: Sum of the ASCII values โโof the 4 characters of the username, multiplied by 4.
Here my c++ keygen
https://pastebin.com/Mh7fiJAr |
5:46 PM 01/05/2025 |
==> |
| The comparison at 00007FF7EAA012768138 32313430cmp dword ptr ds:[rax],30343132 checks if the first four characters match the hexadecimal value 30343132, which translates to the characters "2140" in ASCII.
The comparison at 00007FF7EAA0127E8078 04 31cmp byte ptr ds:[rax+4],31 checks if the fifth character is '1'.
Therefore, the correct password is "21401 |
3:00 PM 01/05/2025 |
==> |
| 00401347- cmp eax,dword ptr ss:[ebp-4]
Nice crackme the password is: 19082004
|
11:33 PM 01/04/2025 |
==> |
| The password is "yourpass"
I Used x64 dbg |
4:19 PM 01/04/2025 |
==> |
| First Key- 5ZY4HSUIYKHTPFPN7Q30 |
3:43 PM 01/04/2025 |
==> |
| Nice crackme password: thatflagissus3 |
2:45 PM 01/03/2025 |
==> |