Number of crackmes:
Number of solutions:
Comments:
Name | Author | Language | Arch | Difficulty | Quality | Platform | Date | Solution | Comments |
---|
Crackme | Infos |
---|
Comment | Link |
---|---|
another working password: eMkcarCyzarCNyar very good crackme, good job! | ==> |
no protection at all. string text = "sifreyok"; if (this.txtKey.Text == text) { MessageBox.Show("giris basarili"); return; } MessageBox.Show("giris basarisiz"); | ==> |
decode base64 and see these keys (if any of these keys entered, you get "Crack success!"): "A1B2C3D4E5F6", "G7H8I9J0K1L2", "M3N4O5P6Q7R8", "S9T0U1V2W3X4", "Y5Z6A7B8C9D0", "E1F2G3H4I5J6", "K7L8M9N0O1P2", "Q3R4S5T6U7V8", "W9X0Y1Z2A3B4", "C5D6E7F8G9H0" | ==> |
i guess this is the key: ejei4ghj94igh4ig8h845igh4uhg4oguh4lihgjirhghhhedrihger_easy_to_hard im not sure because the output are only question marks, but with this key i get a different amount of question marks lol | ==> |
key: KFJ9D-XF87J-QW6YT-KD3P9-AVT2R | ==> |
not .net at all. | ==> |
unfortunately, i did it manually while debugging in dnspy. | ==> |
bool flag3 = text2 == "hello" && text == "hello"; | ==> |
keygen in c#: https://rentry.co/rdtp3mdh example output: Username: jewdev Generated License Key: 8747069700946550E729 | ==> |
key: h7r8B4XcY6jOrpg | ==> |
keygen in python: https://rentry.co/cqqhean2 here are 5 generated keys: 4409-0835-8013-8289 4409-8508-3181-5685 4409-8582-0253-8083 4409-8528-3289-0820 4409-8372-6805-1828 | ==> |
@shachar הקובץ "מוצפן" אז הגיוני... | ==> |
@nigga skill issue | ==> |
the comments in this website are so bad. keygen code: https://rentry.co/7zrvzpkm hopefully it will work fine now. | ==> |
if (string.IsNullOrEmpty(username) || username.Length | ==> |
dropped file into dnspy sees it's not obfuscated at all write keygen ez example result from keygen: CrackMe by 999 | Keygen by jewdev.xyz Enter username: jewdev Generated Serial Key: MFBS-816R-TL7G code: using System; using System.Security.Cryptography; using System.Text; public class Program { public static void Main(string[] args) { Console.WriteLine("CrackMe by 999 | Keygen by jewdev.xyz"); Console.Write("Enter username: "); string username = Console.ReadLine(); if (string.IsNullOrEmpty(username) || username.Length | ==> |
since the website's staff don't accept my solution, this is the code for a keygen. using System; using System.Collections.Generic; using System.IO; using System.Linq; using System.Security.Cryptography; using System.Text; using System.Threading.Tasks; namespace CrackmesKeygen { internal class Program { private static string PrivateKey = "ie1x922ff4b3pTUAG1hH"; static void Main(string[] args) { Console.WriteLine("Paste generated key:"); string generatedKey = Console.ReadLine(); string correctKey = DecryptString(generatedKey, PrivateKey); Console.WriteLine("Correct key:"); Console.WriteLine(correctKey); Console.ReadLine(); } private static string DecryptString(string encryptedString, string key) { string decryptedText; using (Aes aes = Aes.Create()) { Rfc2898DeriveBytes rfc2898DeriveBytes = new Rfc2898DeriveBytes(key, new byte[] { 73, 118, 97, 110, 32, 77, 101, 100, 118, 101, 100, 101, 118 }, 1000); aes.Key = rfc2898DeriveBytes.GetBytes(aes.KeySize / 8); aes.IV = new byte[16]; ICryptoTransform decryptor = aes.CreateDecryptor(aes.Key, aes.IV); byte[] buffer = Convert.FromBase64String(encryptedString); using (MemoryStream memoryStream = new MemoryStream(buffer)) { using (CryptoStream cryptoStream = new CryptoStream(memoryStream, decryptor, CryptoStreamMode.Read)) { using (StreamReader streamReader = new StreamReader(cryptoStream)) { decryptedText = streamReader.ReadToEnd(); } } } } return decryptedText; } } } | ==> |
password: olives8 | ==> |
Password: "0100011001010010010001010100010101001101010000010101001101001111010011100101001001011001" | ==> |
username and password: string too long | ==> |
use hashcat and find it yourself. no one is going to use their cpu/gpu for you just for cracking your friend's password that you got from a leaked database to prank him. | ==> |
@marijo the last word in the description is "uwu". what did you expect ?? | ==> |
what protections were used? I just opened the file in dnspy and saw the whole code. | ==> |