Number of crackmes:
Number of writeups:
Comments:
| Name | Author | Language | Arch | Difficulty | Quality | Platform | Date | Downloads | Writeups | Comments |
|---|
| Crackme | Date | Infos |
|---|
| Crackme | Comment | Date |
|---|---|---|
| CrazyCrackMe | https://rentry.co/yp642nfq | 2025-01-06 19:22 |
| CrazyCrackMe | another working password: eMkcarCyzarCNyar very good crackme, good job! | 2024-12-14 22:32 |
| zrox's crackme easy | no protection at all. string text = "sifreyok"; if (this.txtKey.Text == text) { MessageBox.Show("giris basarili"); return; } MessageBox.Show("giris basarisiz"); | 2024-11-22 00:58 |
| mihawkre | decode base64 and see these keys (if any of these keys entered, you get "Crack success!"): "A1B2C3D4E5F6", "G7H8I9J0K1L2", "M3N4O5P6Q7R8", "S9T0U1V2W3X4", "Y5Z6A7B8C9D0", "E1F2G3H4I5J6", "K7L8M9N0O1P2", "Q3R4S5T6U7V8", "W9X0Y1Z2A3B4", "C5D6E7F8G9H0" | 2024-11-22 00:57 |
| hard crackme by nonameosint | i guess this is the key: ejei4ghj94igh4ig8h845igh4uhg4oguh4lihgjirhghhhedrihger_easy_to_hard im not sure because the output are only question marks, but with this key i get a different amount of question marks lol | 2024-11-02 13:24 |
| Beginner | key: KFJ9D-XF87J-QW6YT-KD3P9-AVT2R | 2024-11-02 13:15 |
| StillAching's CrackMe | not .net at all. | 2024-10-30 13:11 |
| Matryoshka | unfortunately, i did it manually while debugging in dnspy. | 2024-09-14 12:48 |
| LEVEL-C | bool flag3 = text2 == "hello" && text == "hello"; | 2024-09-11 18:26 |
| Matryoshka | keygen in c#: https://rentry.co/rdtp3mdh example output: Username: jewdev Generated License Key: 8747069700946550E729 | 2024-09-11 16:29 |
| dotqw's second crackme | key: h7r8B4XcY6jOrpg | 2024-09-10 18:55 |
| .NET CrackMe | keygen in python: https://rentry.co/cqqhean2 here are 5 generated keys: 4409-0835-8013-8289 4409-8508-3181-5685 4409-8582-0253-8083 4409-8528-3289-0820 4409-8372-6805-1828 | 2024-09-09 21:36 |
| Crackme protect | @shachar הקובץ "מוצפן" אז הגיוני... | 2024-09-06 11:37 |
| dotqw's first c | @nigga skill issue | 2024-09-06 11:33 |
| License KeyGen By 999 | the comments in this website are so bad. keygen code: https://rentry.co/7zrvzpkm hopefully it will work fine now. | 2024-08-27 19:49 |
| License KeyGen By 999 | if (string.IsNullOrEmpty(username) || username.Length | 2024-08-27 19:45 |
| License KeyGen By 999 | dropped file into dnspy sees it's not obfuscated at all write keygen ez example result from keygen: CrackMe by 999 | Keygen by jewdev.xyz Enter username: jewdev Generated Serial Key: MFBS-816R-TL7G code: using System; using System.Security.Cryptography; using System.Text; public class Program { public static void Main(string[] args) { Console.WriteLine("CrackMe by 999 | Keygen by jewdev.xyz"); Console.Write("Enter username: "); string username = Console.ReadLine(); if (string.IsNullOrEmpty(username) || username.Length | 2024-08-27 19:43 |
| just another crackme | since the website's staff don't accept my solution, this is the code for a keygen. using System; using System.Collections.Generic; using System.IO; using System.Linq; using System.Security.Cryptography; using System.Text; using System.Threading.Tasks; namespace CrackmesKeygen { internal class Program { private static string PrivateKey = "ie1x922ff4b3pTUAG1hH"; static void Main(string[] args) { Console.WriteLine("Paste generated key:"); string generatedKey = Console.ReadLine(); string correctKey = DecryptString(generatedKey, PrivateKey); Console.WriteLine("Correct key:"); Console.WriteLine(correctKey); Console.ReadLine(); } private static string DecryptString(string encryptedString, string key) { string decryptedText; using (Aes aes = Aes.Create()) { Rfc2898DeriveBytes rfc2898DeriveBytes = new Rfc2898DeriveBytes(key, new byte[] { 73, 118, 97, 110, 32, 77, 101, 100, 118, 101, 100, 101, 118 }, 1000); aes.Key = rfc2898DeriveBytes.GetBytes(aes.KeySize / 8); aes.IV = new byte[16]; ICryptoTransform decryptor = aes.CreateDecryptor(aes.Key, aes.IV); byte[] buffer = Convert.FromBase64String(encryptedString); using (MemoryStream memoryStream = new MemoryStream(buffer)) { using (CryptoStream cryptoStream = new CryptoStream(memoryStream, decryptor, CryptoStreamMode.Read)) { using (StreamReader streamReader = new StreamReader(cryptoStream)) { decryptedText = streamReader.ReadToEnd(); } } } } return decryptedText; } } } | 2024-06-25 01:05 |
| Simple Crackme | password: olives8 | 2023-12-26 16:23 |
| Freemasonry | Password: "0100011001010010010001010100010101001101010000010101001101001111010011100101001001011001" | 2023-09-16 15:24 |
| C# Login-Crackme by #BeginnerCracker123 | username and password: string too long | 2023-09-01 15:27 |
| hasongen siraytzen crackme | use hashcat and find it yourself. no one is going to use their cpu/gpu for you just for cracking your friend's password that you got from a leaked database to prank him. | 2022-07-03 03:51 |
| crack watashi if kannst :) | @marijo the last word in the description is "uwu". what did you expect ?? | 2022-07-03 03:46 |
| Crack Me With Ui. | what protections were used? I just opened the file in dnspy and saw the whole code. | 2022-07-03 02:42 |