| CrackMe_V5_Marquire |
thx for the source, very smart using labels I didn't think of that when coding my own stuff. I suggest striding away from mass obfuscation as It's not fun to reverse imo; overall nice crackme. |
2021-12-09 15:45 |
| My first xorstr crackme |
key : 557746729
solution will follow! |
2021-11-01 22:11 |
| CrackMe_V5_Marquire |
too much junk code for me to handle, respect to anyone who can crack this! |
2021-11-01 21:28 |
| CrackMe_V4_Marquire |
I don't think anything is being uploaded... |
2021-10-14 22:47 |
| CrackMe_V4_Marquire |
@Marquire can't wait for a v5, I too uploaded a solution for v4 however It too seems to be taking some time. |
2021-10-08 17:31 |
| CrackMe_V4_Marquire |
@DispatchCode From what I've seen, it's to do with the encryption and hashing that allows for different keys to work |
2021-10-01 13:11 |
| CrackMe_V4_Marquire |
Thank you, just sent a solution btw for others. Hope to see a v5 soon! |
2021-09-30 18:03 |
| CrackMe_V4_Marquire |
Key: P_BIT_HARDER?
Turns out I just missed the first letter |
2021-09-30 17:19 |
| CrackMe_V4_Marquire |
Good upgrade since the last I managed to get XCJUPIBSCDQ, sadly this is wrong, I don't have time to reverse this right now so if someone could write a solution that would be great! |
2021-09-30 16:38 |
| CrackMe_V3_Marquire |
key: STILL_EASY? |
2021-09-26 13:53 |
| Security Terminal 🔐 |
key: 172hd83jd9dq |
2021-09-22 15:59 |