Jump to content
Tuts 4 You

All Activity

This stream auto-updates     

  1. Past hour
  2. scorpion77

    Flare On 6

    Thank you all who helped!! Now onto the 7th one.
  3. There is already a few anti cheat plugins for Unity in case you didn't know... Code Stage - Anti Cheat Toolkit is one I have seen in lots of unity games, its not free but does detect injections
  4. Today
  5. Hi im trying to code anticheat in c# for unity games But i cant detcted dll injection actually i try loaded dll and moudel but itsnt work becuse its mono inejection Any buddy can help me?
  6. er132

    Best Protection for .net Exe

    Hi now vmprotect is support .net and thats fine for .net you can use vmprotect 3.4 its good at protection
  7. er132

    Best .Net Obfuscator - Suggest Please

    Hi Now vmprotect support .net and i feel thats great for protection in .net Any buddy can share crack for vmp 3.4 ?t
  8. Yesterday
  9. Extreme Coders

    Flare On 6

    @bandit
  10. bandit

    Flare On 6

    Any hints for #12?
  11. illuZion

    Confuserex Modded by Cµrsëd$hëëp v2

    Password : Steps : 1. manually removed anti tamper 2. manually decompressed the file 3. manually removed anti tamper again 4. used confuserEx unpacker to decrypt strings 5. used de4dot to finish UnpackMe cleaned.exe
  12. illuZion

    ConfuserEx Mod

    Password: Steps : 1. manually removed anti tamper 2. manually decompressed the file 3. used confuserEx unpacker 4. use de4dot to finish the work 5. created a vs to find the password CrackMe0 cleaned.exe
  13. kao

    Flare On 6

    @_fuso_: there is no problem with flare-com subdomain. It was never working, and challenge can be solved without that.
  14. _fuso_

    Flare On 6

    Hello, again I have a question in Mugatu task. Can someone confirm that the URL in EXE related with POST is necessary? I am asking becasue i don't know if it is not working or is down and I am going in wrong direction. I see request to it but no response...So am doing something wrong or there is a problem with flare-on.com subdomain. Thank you for hints.
  15. Extreme Coders

    Flare On 6

    @muppet If you're doing it right it should decrypt to well formed and valid data with a recognizable header.
  16. muppet

    Flare On 6

    @scorpion77 I can also confirm the byte sequence above. I have a 2mb file. @Extreme Coders
  17. Extreme Coders

    Flare On 6

    @scorpion77 Yes it does. @muppet
  18. devsat-dz

    [Unpack Me] Obsidium 1.5.2 build 11

    confige strongOD ????
  19. muppet

    Flare On 6

    I'm here for the discussion on bmphide. I feel I understand what is going on. I've extracted the data through my own python code. I tried to approach the encryption by python as well but halfways through implementation I got wrong results. ILCode patching 😕 So I think I found where the patches are being made from but my experience with dotnet tools is lacking. What tool can I use to patch (and immediately decompile to see the change) to see whats going on ? I can't even get dnspy to show me the bytes behind each ILCode and even less patch them. I tried changing in hex editor but dnspy then does not reload my changes and I have to delete the binary and reload it which becomes pretty tedious. Atm I can solve this challenge by using the bmphide.exe as medium for trying out the oracle (subprocess.Popen from python). But it is too slow to call it about a maximum of 2e6*0xff times. So far using this technique I've solved the first 16 bytes of the original message. But now I want to implement and understand whats going on better. So I want to patch bmphide.exe and decompile changes. Any tips ?
  20. scorpion77

    Flare On 6

    @ExtremeCoders And @kao - Could you please confirm if the encrypted content that I extracted from the image has the following bytes in the beginning " 68 C3 AE 5D 3C 16 CF 16". It only makes sense to move onto the second stage of decryption if the content I extracted from the pixels are correct!
  21. Last week
  22. moly

    Flare On 6

    Yeah, sorry, I later realized that nothing has to be parallelized. I am just to tired and anxious. Thank you!
  23. Extreme Coders

    Flare On 6

    @moly Nope. Didn't need to parallelize. Not sure what you mean by that but as others have said, the best way to test for correctness of your method work is to work on your own sample image.
  24. TobitoFatito

    KeygenMe/DeVirtualizeMe

    If the project wasn't opensourced, i'd probably never be able to make a devirt, so thank you for helping me make my first 'complete' devirt Great practice and i hope you keep on updating it CrackMe_Devirted_Cracked.rar
  25. moly

    Flare On 6

    @Extreme Coders I guess you parallelized the execution, right? Did I extract too much data from the original bmp 🤔
  26. moly

    Flare On 6

    @Extreme Coders Thank you!
  27. Extreme Coders

    Flare On 6

    @moly
  28. moly

    Flare On 6

    @misanthropik1 @Extreme Coders Can you share a hint on what needs to be patched in order to be able to debug in dnSpy, please? I figured out statically what functions are interchanged using the checksum, but I'm missing the other modification that uses MetadataToken, alreay 3 days at the same spot. :(
  29. scorpion77

    Flare On 6

    @Geordeaux Study the function getNextMove carefully. From that you will understand what IP addresses are valid for the challenge to generate the key. You dont need DNS for this. I too started off that way thinking I have to setup DNS and actually play the board, but after understading getNextMove and using the pcap I could solve this.Cheers
  1. Load more activity
×
×
  • Create New...