| Very Easy CrackMe |
1ecc7dd7b9763028e119e5046268d922 - Open binary file in decompiler and locate
v4 = (void **)Buf2;
Open up Buf2 and get the password. |
2022-09-05 13:41 |
| Crackme Speedrun |
Nice challenge, indeed the strcmp is to distract the players from the real flag |
2022-07-10 21:22 |
| Java KeyFind CrackMe |
Imagine trying to debug :(
I am kinda lost in the sea of method invocation |
2021-12-01 01:26 |
| SanSuu |
I gotten a0a0a0a too while trying to break the bitwise and
(v1 & 1) != 0. Overall a fun reversing key gen challenge. |
2021-11-30 17:15 |
| Basic |
Can be deciphered using python script, statically analyzing the binary for the encoded key and reversing it using a for loop. |
2021-11-30 12:32 |
| MY FIRT CRACKME |
// Key Gen Idea
1) Randomly generate a string (Try to do it between 'A' and 'Z'
2) Create a key variable "key" to store the generated key
3) for each character c in the generated string: add c ^ 4 + len(generated string) to key.
4) Send in the generated string as User and key as Serial.
----
Some user and keys generated:
User: VPACHMPVVV
Serial: \^OQVS^\\\
User: BPUEYDTDME
Serial: P^[KgJZJSK
User: ISMHNJPSHN
Serial: WaSVTX^aVT |
2021-11-30 03:29 |