Number of crackmes:
Number of solutions:
Comments:
Name | Author | Language | Arch | Difficulty | Quality | Platform | Date | Solution | Comments |
---|
Crackme | Infos |
---|
Comment | Link |
---|---|
1111001 ? | ==> |
Sua senha esta correta.Thanks | ==> |
GetWindowTextW(hWnd, String, 256); wcscpy(WindowName, L"CJfromgrovestreet"); v12 = wcscmp(String, WindowName); if ( v12 ) v12 = v12 | ==> |
+ ------------------- + | Find the Password 1 | | by Xeeven | + ------------------- + Password: 8675309 + *** *** *** *** *** + | Congratulations! | + *** *** *** *** *** + | ==> |
pass=sub5195 thx! | ==> |
Welcome! Please enter an username: korsader Please enter your password: 806601 Somehow you got it right! | ==> |
Password: pajacol Password correct! | ==> |
solved.thx! | ==> |
if ( !strcmp(argv[1], "KS-LICENSE-KEY-2021-REV-1") ) puts("Congratulations ! You have successfully registered your premium service."); | ==> |
messagebox? | ==> |
Enter key(9 chars length):I am back Success | ==> |
CTF{9110-2324-0502-2034-3454} thx! | ==> |
Registered | ==> |
YES !!! SAFE OPEN ! | ==> |
crackme.exe 53F6BA06D5D70xAAFED28B You have found the password. thx | ==> |
It was very easy. Thanks. | ==> |
обрезал код сука | ==> |
# python.org ml=input('input email address: ') if len(ml)4 print('%X'%b,end='') c=(ord(m)^x[i])&0x0F if c9: c+=0x47-9 else: c+=0x47 print(chr(c)) i+=1 input('press any key to exit') | ==> |
Thank, you it was fun. | ==> |
Serial=(5+10)*32+138580754 thx! | ==> |
password 'bouzu'? | ==> |
@shift /0 @echo off cls color 0b :Password set input= set /p input= ENTER THE FUCKING PASSWORD : if %input%==santaisnotreal goto YES if not %input%==santaisnotreal goto NO :YES color 0a echo YOU DID IT !!! pause exit :NO color 0c :s echo GO AWAY HACKER goto :s @echo off | ==> |
Enter an 8 digit code: 5256 You have successfully logged in! thx bro! | ==> |
puts("Whats my name?"); do fgets(&v4, 6, __stdinp); while ( strcmp(&v4, "mrmtg") ); puts("You got it!"); thx! | ==> |
how can I decrypt my password??? | ==> |
Please enter the valid password: BXXGYYYBGIBXX Good job on decrypting the password! thx,bro! | ==> |
name:Jonny - pass: Banana name:Humberto - pass: IlikeRice name:Astolfo - pass: RiceIsTrash name:JakePaul - pass: FlorestOfSuicide name:MaryJan - pass: SpiderMan thx bro! | ==> |
if (Text == "") { MessageBox.Show('You put nothing in good job...'); } if (Text == 'Astolfobestclient') { MessageBox.Show('You're correct it is and good job!'); } Thx! Nice crackme! | ==> |
system error | ==> |
if mypass==2389625 Nice!;) else Wrong password! ;) | ==> |
Good! thx! | ==> |
Key please: Jn0192mMkqpskO91jsjJajiUPSJn Congratz!! u in. thx! level 0 | ==> |
keygen https://yadi.sk/d/ukBj4rxvP41BRA | ==> |
Name: korsader Serial: 1001010010010000100011011000110010011110100110111001101010001101 Valid serial number! | ==> |
Password: RzKXs or RzLX3 etc... | ==> |
not work! | ==> |
open crackme ollydbg -F9 - ctrl+G - input: VirtualProtect - enter - break point VirtualProtect - Enter password for decryption- 123456 - enter - ctrl+F9 (ret) - F7 00EF14A7 . 837D C0 10 CMP DWORD PTR SS:[EBP-40],10 00EF14AB . 8D4D AC LEA ECX,[EBP-54] 00EF14AE . 8D45 C4 LEA EAX,[EBP-3C] 00EF14B1 . 0F434D AC CMOVAE ECX,DWORD PTR SS:[EBP-54] 00EF14B5 . 837D D8 10 CMP DWORD PTR SS:[EBP-28],10 00EF14B9 . 51 PUSH ECX 00EF14BA . 0F4345 C4 CMOVAE EAX,DWORD PTR SS:[EBP-3C] 00EF14BE . 50 PUSH EAX 00EF14BF . FF75 90 PUSH DWORD PTR SS:[EBP-70] 00EF14C2 . FF75 8C PUSH DWORD PTR SS:[EBP-74] 00EF14C5 . FF75 98 PUSH DWORD PTR SS:[EBP-68] 00EF14C8 . FF75 94 PUSH DWORD PTR SS:[EBP-6C] * 00EF14CB . FF15 2878EF00 CALL NEAR DWORD PTR DS:[PasswordKeeper.0EF7828];!!!!!!!!!!!!!!! 00EF14D1 . 83C4 18 ADD ESP,18 00EF14D4 . 8D45 9C LEA EAX,[EBP-64] - step(F7) to address: 00EF14CB - F7 00B11170 55 PUSH EBP ; ASCII "l.z" 00B11171 8BEC MOV EBP,ESP 00B11173 83EC 1C SUB ESP,1C 00B11176 8B45 08 MOV EAX,DWORD PTR SS:[EBP+8] 00B11179 8945 E8 MOV DWORD PTR SS:[EBP-18],EAX 00B1117C 8B4D 0C MOV ECX,DWORD PTR SS:[EBP+0C] 00B1117F 894D E4 MOV DWORD PTR SS:[EBP-1C],ECX 00B11182 8B55 10 MOV EDX,DWORD PTR SS:[EBP+10] 00B11185 8955 F4 MOV DWORD PTR SS:[EBP-0C],EDX - ctrl+F - input: xor edx,13 - search 00B11468 8B4D F8 MOV ECX,DWORD PTR SS:[EBP-8] 00B1146B 034D F0 ADD ECX,DWORD PTR SS:[EBP-10] 00B1146E 0FBE11 MOVSX EDX,BYTE PTR DS:[ECX] 00B11471 83F2 13 XOR EDX,00000013 00B11474 8B45 14 MOV EAX,DWORD PTR SS:[EBP+14] 00B11477 0345 F0 ADD EAX,DWORD PTR SS:[EBP-10] 00B1147A 0FBE08 MOVSX ECX,BYTE PTR DS:[EAX] 00B1147D 3BD1 CMP EDX,ECX | ==> |
83F2 13 XOR EDX,00000013 8B45 14 MOV EAX,DWORD PTR SS:[EBP+14] 0345 F0 ADD EAX,DWORD PTR SS:[EBP-10] 0FBE08 MOVSX ECX,BYTE PTR DS:[EAX] 3BD1 CMP EDX,ECX 74 25 JE SHORT 00*2145E | ==> |
flag = shb{Vir7u41_pr0.3c7_xD} thx! | ==> |
Password: hellocracker ::: Congratulations! ::: KEY: SEVSRSwgVEhJUyBJUyBZT1VSIEtFWSA6IFEyOXVaM0poZEhWc1lYUnBiMjV6SVE thx | ==> |
Please enter the serial key:cr4ckingL3ssons Well done! Thank :) | ==> |
I broke your crackme. Creating a keyfile file.txt, in it write the name of the registration. Thank you, it was interesting. | ==> |
Success!! | ==> |
be fun | ==> |