Ninjego1 Posted June 3, 2020 Posted June 3, 2020 View File CrackMeBoi I made a custom obfuscator and I haven't made any progress cracking it so please crack the file with my custom .NET obfuscator. Do not use OllyDbg or any software of that kind, you can use Mega Dumper and other tools similar. Submitter Ninjego1 Submitted 06/03/2020 Category CrackMe
YuqseLx Posted June 3, 2020 Posted June 3, 2020 Spoiler 弛他地池也 It's not good i think. Big file size, not encrypted strings or not emulated calls. Only bp true function and get valid serial.
Washi Posted July 2, 2020 Posted July 2, 2020 Approach: Spoiler Run app Attach windbg lm to get module address, !savemodule address dump.bin Open dump.bin in .NET disassembler/decompiler of choice, find main form button click handler, search call to TextBox::get_Text, observe serial in plaintext.
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now