-
Here is an small
#crackme ready to be reversed: http://bit.ly/2nOdmCl The rules are simple: Guess the serial/key without altering/patching the original file. Virustotal found 22 detections, but the file is clean. Password of zip = crackme@hasherezadePrikaži ovu nit -
Just finished a writeup for White Rabbit
#CrackMe. Never did that before so it would be my first. Thanks again to@hasherezade and@tekwizz123 for a great time!https://medium.com/@alexskalozub/solving-the-white-rabbit-crackme-d6b627c02ad4 … -
How to write a CrackMe for a CTF competition. Source code in C++, technical explanation, anti-debugging and anti reverse-engineering tricks. https://github.com/PELock/CrackMeZ3S-CTF-CrackMe-Tutorial/ …
#crackme#ctf#github#source#cpppic.twitter.com/tHKCiq5VTB
-
Time for another
#Komodo#Cryptopuzzle. This puzzle has 3 levels and 3 x 3.33 and 1x 77.7 KMD loaded! Level 1 has two solutions and will help you figure the rest of the#puzzle. It is not as hard as it seems which is also the first hint. Good luck!#KMD#DEX#BTC
#crackme#hackmepic.twitter.com/JpyNdioBky
Prikaži ovu nit -
Can you solve another
#Komodo cryptopuzzle?#KMD#crackme#hackmehttps://twitter.com/crypto_blkbeard/status/1091426731284676609 … -
Leveraging Wasabi to solve a
#WebAssembly#crackme: http://ctfhacker.com/reverse/2018/09/16/flareon-2018-wasabi.html … -
MaxXor open-sourced his very nice
#CrackMe : https://github.com/MaxXor/keygenme-v7 … (the one that I described in the past here: https://hshrzd.wordpress.com/2014/10/29/solving-keygenme-v7-by-maxx0r/ …) -
I've just released the x86 disassembler of
#Genaytyk#VM here dissassembler code: https://github.com/Fare9/Genaytyk-VM/blob/master/vm_disassembler_x86.py … here x86 masm32 code: https://github.com/Fare9/Genaytyk-VM/blob/master/vm_instructions.asm … here x86 executable: https://github.com/Fare9/Genaytyk-VM/blob/master/vm_instructions.exe …#Disassemblers#VM#Reversing#python#crackme.de pic.twitter.com/WpVRvEXHD1
-
Malwarebytes
#CrackMe 2: contest summary : https://blog.malwarebytes.com/malwarebytes-news/2018/05/malwarebytes-crackme-2-contest-summary/ …Prikaži ovu nit -
Malwarebytes
#CrackMe 2 challenge released—a malware analysis exercise for this weekend by@hasherezade Have fun → https://blog.malwarebytes.com/security-world/2018/04/malwarebytes-crackme-2-another-challenge/ …pic.twitter.com/hMstrkQE2Q
-
My solution to Imagination crackme by kratorius https://secrary.com/CrackMe/ImaginationCrackme/ …
#Windows#CrackMe#ReverseEngineering -
I have been dying to get this picture since freshman year. I finally got it !
#winnerszn#crackme#roastmasbitch pic.twitter.com/15nQ63aoa2
-
http://0x90909090.blogspot.fr/2017/07/qemu-arm-vm-for-crackmemalware-analysis.html … My setup for an
#ARM based VM dedicated to#crackme and#malware analysis. -
Solving the Shabak’s Airplane challenge – Task 3 : https://hshrzd.wordpress.com/2017/06/25/shabak-airplane-challenge-task-3/ … //
#CrackMe -
#Android#crackme write-up: UnCrackable App 3 with jadx,#IDAPro and gdb cc@Sh3llC0d3r http://sh3llc0d3r.com/owasp-uncrackable-android-level3/ …pic.twitter.com/c2tCKJ7dIg
-
A rao_bash write-up by the fine folks at
@RPISEC: http://blog.rpis.ec/2017/05/northsec-2017-raobash.html …#nsec17#crackme -
Write-up
#Android@OWASP#crackme#UnCrackable Level3. Using@fridadotre to bypass anti-DBI checks. https://enovella.github.io/android/reverse/2017/05/20/android-owasp-crackmes-level-3.html … /@muellerberndt -
An Android
#crackme arose from hell. It doesn't make prisoners http://goo.gl/MirHzO pic.twitter.com/xhpXi8oHAs
-
Blogged: “Reverse Engineering a book cover - writeup”
#crackme#infosec -https://vulnsec.com/2017/reverse-engineering-a-book-cover/ …
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.