| genesis by plasmator |
password: ΓΏ?
cuz sum = 256 |
2026-02-22 09:10 |
| CrazyCrackMe |
pass: eMkcarCyzarCeC.J
pass generator:
import random
import string
BASE = "eMkcarCyzarC"
CHARS = string.ascii_letters + string.digits + "plikan!t.me/junk_code"
TARGET_HASH = 23130
def compute_hash(password: str) -> int:
num = 0
for c in password:
num = (num << 3) ^ (ord(c) * 17)
return num & 0xFFFF
def is_valid(password: str) -> bool:
if not (8 <= len(password) <= 16):
return False
if compute_hash(password) != TARGET_HASH:
return False
rev = password[::-1]
if "CrazyCrackMe" not in rev:
return False
return True
print("pass generator by plikan\n")
found = []
attempts = 0
max_attempts = 500_000_000
while len(found) < 20 and attempts < max_attempts:
attempts += 1
extra_len = random.randint(0, 4)
extra = ''.join(random.choice(CHARS) for _ in range(extra_len))
pwd = BASE + extra
if is_valid(pwd):
if pwd not in found:
found.append(pwd)
print(f"{len(found):2d}. {pwd} ({len(pwd)})")
input() |
2026-02-21 17:17 |
| Simple password with checksum |
db 'xxxx4xx10',0
pass: xxxx4xx10 |
2026-02-21 16:55 |
| Mexican |
flag{Danof4edx_flag} |
2026-02-21 16:43 |
| medium http licence crackme |
@xxoslayo password for decrypt is "t.me/junk_code" |
2026-02-16 19:00 |
| Hard |
unpacked upx and found pass in memory via cheat engine, pass: e4444 |
2025-12-30 04:34 |
| Python CrackMe |
pass: YouSuccCracked |
2025-12-29 06:13 |
| LEVEL-C |
login: hello
password: hello |
2025-12-29 05:48 |
| 3OutOf6 |
pass: 68 |
2025-12-29 05:44 |
| Password(Very Easy) |
pass: SuperPass |
2025-12-29 05:31 |
| Simple_GUI_crackme |
pass: sk-189 |
2025-11-23 02:34 |
| easy crackme 2.0 |
pass: godez123 |
2025-08-08 00:18 |