| brainf*ck interpreter |
Did you compile it with Mingw? would explain the error, next time please try to compile it with static linking |
2025-12-28 11:55 |
| Memory Me |
i forgot to add a check so patching is not pretty much required |
2025-12-27 08:36 |
| Crack/Keygen Me |
great keygen me! uploading a write up soon :D |
2025-12-25 13:19 |
| Nexus! (Lite) |
i was having fun until i noticed 1400054f8 having the key right there ;(
===== ACCESS GRANTED! =====
Correct Key: no spoilers
[+] Challenge Statistics:
Time: 00:01
[+] Congratulations! You've cracked Nexus! (lite)
[*] Encrypted form: DgUYFRN6DQETFAUSegsFGXplY2Vo |
2025-12-24 14:50 |
| Crackme EASY |
static analysis* im too tired from ts |
2025-12-23 11:31 |
| Crackme EASY |
As the binary says, static compilation really doesnt help prayge |
2025-12-23 11:31 |
| VeryHard 99% you can't do it |
i did it by patching at first but then you can go to the generate pass function and check out how it works, it xors multiple times so the XOR is useless, you just have to care about the local buffer which forms the password:
pass_src_0 = (byte *)0x8783445371865073;
pass_src_1 = (byte *)0x484c8677454d4c85;
pass_src_2 = (byte *)0x8280825f4c745086;
pass_src_3 = (byte *)0x218186;
and these together form the password 😼 |
2025-12-22 17:44 |