| CrackMeBaby2 |
flag:igr0t-theking and igr0t
Input the pass:
flag:igr0t-theking
You are good , but...
Say my name...
igr0t
You Win.. (;
|
2026-05-21 16:40 |
| PlsCrackMe |
Uppercase letters: A, C, F (3 characters)
Lowercase letters: b, d, e, g (4 characters)
Numbers: 1, 2, 3 (3 characters)
Special characters: !, @, # (3 characters) |
2026-05-21 15:59 |
| password esasy |
password: 1234 |
2026-05-20 12:12 |
| CrackMe#1 |
# CrackMe Solution: crackmes.exe
**Password:** `crackmes`
## Logic
1. `IsDebuggerPresent()` → if `0`, `exit(0)` (killswitch)
2. If debugger detected: `XOR key = 109` (wrong)
3. Encrypted string: `">/<608."` (hex: `3E 2F 3C 3E 36 30 38 2E`)
4. Decrypt with `key = 93` (no debugger):
```
0x3E ^ 0x5D = 'c'
0x2F ^ 0x5D = 'r'
... = "crackmes"
```
## Patches Applied
| File Offset | Bytes | Effect |
|-------------|-------|--------|
| `+0x13D5` | `90 x28` | NOP PEB checks |
| `+0x145D` | `BB 01 00 00 00 90` | Force debugger present |
| `+0x147C` | `90 x6` | NOP exit jump |
| `+0x149A` | `90 x4` | NOP wrong-key set |
| `+0x14F6` | `90 x4` | NOP wrong-key set |
Patched binary runs without debugger, uses key `93`, accepts **`crackmes`** → Success. |
2026-05-17 10:38 |
| NeuroVault |
NV-4E563031-VAULT |
2026-05-16 21:57 |