Very easy crackme. You can bypass every anti debug measure by nopping the first function call in the main function. Then just step through to comparison and you will see that the password is in clear text. |
==> |
Easiest crackme lol |
==> |
source code here
https://github.com/islaitala/The-Junkrat |
==> |
Glad you guys liked it ;) |
==> |
Very nice crackme. |
==> |
nvm I had scyllahide on :p |
==> |
I don't think it is solvable without patching in a reasonable amount of time.
You are asking to find the original password while providing the hash? If your password is very complex it is literally impossible.
However with patching this is very easy. |
==> |
easiest crackme of my life
x64dbg didn't get detected by IsDebuggerPresent |
==> |
EASY!
My python keygen:
[python]
seed = "tryHarderToMakeAGoodKeyGen"
seed_len = len(seed)
username = "dqwd12d12t123t"
username_len = len(username)
encrypted = ""
for i in range(username_len):
a = username[i]
a = ord(a) ^ seed_len
rem = a % username_len
encrypted += username[rem]
print(encrypted)
[/python]
1. use username string of your choice
2. input that string into the crackme too
3. run python program and copy the printed string into the program (password) |
==> |
[! SPOILER !]
You might need to unpack manually (for me upx didn't work so I used x32dbg and Scylla).
After unpacking the rest is really easy, just patch driver check and then patch key check or just use the key: I-AM-A-CR4CKER_(o | o) |
==> |
Very easy antidebug. You can remove the whole antidebug
by nopping 6 bytes at unpackme_patch.exe:$43CB.
Why is there bunch of useless instructions that do not make it harder to reverse? |
==> |
Very nice crackme. Enjoyed it alot. |
==> |