| catgirl.crack |
bool flag = password.Equals("Mint", StringComparison.OrdinalIgnoreCase);
pass - Mint |
2026-04-10 14:46 |
| My First CrackMe |
bool flag = text == "password";
pass - password |
2026-04-10 14:44 |
| Unbreakable Python? My Custom Obfuscation Engine |
source code:
import sys
import math
import time
import os
def smooth_rgb_normal_text():
text = "noname"
spacing = 0.5
speed = 0.1
wave_width = 2.0
sys.stdout.write("\033[?25l")
try:
for t in range(0, 1000):
output = []
for i, char in enumerate(text):
freq = wave_width * i
r = int((math.sin(freq + t * speed) + 1) / 2 * 255)
g = int((math.sin(freq + 2.0 + t * speed) + 1) / 2 * 255)
b = int((math.sin(freq + 4.0 + t * speed) + 1) / 2 * 255)
output.append(f"\033[38;2;{r};{g};{b}m{char}\033[0m")
output.append(" " * int(spacing))
sys.stdout.write("\r" + "".join(output))
sys.stdout.flush()
time.sleep(0.05)
except KeyboardInterrupt:
sys.stdout.write("\033[?25h")
sys.stdout.write("\n")
if __name__ == "__main__":
if os.name == "nt":
os.system("cls")
else:
os.system("clear")
smooth_rgb_normal_text() |
2026-04-10 14:39 |
| xrockmr by synamics |
password: hell |
2026-04-03 16:44 |
| genesis by plasmator |
password: ΓΏ?
cuz sum = 256 |
2026-02-22 09:10 |
| CrazyCrackMe |
pass: eMkcarCyzarCeC.J
pass generator:
import random
import string
BASE = "eMkcarCyzarC"
CHARS = string.ascii_letters + string.digits + "plikan!t.me/junk_code"
TARGET_HASH = 23130
def compute_hash(password: str) -> int:
num = 0
for c in password:
num = (num << 3) ^ (ord(c) * 17)
return num & 0xFFFF
def is_valid(password: str) -> bool:
if not (8 <= len(password) <= 16):
return False
if compute_hash(password) != TARGET_HASH:
return False
rev = password[::-1]
if "CrazyCrackMe" not in rev:
return False
return True
print("pass generator by plikan\n")
found = []
attempts = 0
max_attempts = 500_000_000
while len(found) < 20 and attempts < max_attempts:
attempts += 1
extra_len = random.randint(0, 4)
extra = ''.join(random.choice(CHARS) for _ in range(extra_len))
pwd = BASE + extra
if is_valid(pwd):
if pwd not in found:
found.append(pwd)
print(f"{len(found):2d}. {pwd} ({len(pwd)})")
input() |
2026-02-21 17:17 |
| Simple password with checksum |
db 'xxxx4xx10',0
pass: xxxx4xx10 |
2026-02-21 16:55 |
| Mexican |
flag{Danof4edx_flag} |
2026-02-21 16:43 |
| medium http licence crackme |
@xxoslayo password for decrypt is "t.me/junk_code" |
2026-02-16 19:00 |
| Hard |
unpacked upx and found pass in memory via cheat engine, pass: e4444 |
2025-12-30 04:34 |
| Python CrackMe |
pass: YouSuccCracked |
2025-12-29 06:13 |
| LEVEL-C |
login: hello
password: hello |
2025-12-29 05:48 |
| 3OutOf6 |
pass: 68 |
2025-12-29 05:44 |
| Password(Very Easy) |
pass: SuperPass |
2025-12-29 05:31 |
| Simple_GUI_crackme |
pass: sk-189 |
2025-11-23 02:34 |
| easy crackme 2.0 |
pass: godez123 |
2025-08-08 00:18 |