Ninjego1 0 Posted June 3, 2020 Share Posted June 3, 2020 View File CrackMeBoi I made a custom obfuscator and I haven't made any progress cracking it so please crack the file with my custom .NET obfuscator. Do not use OllyDbg or any software of that kind, you can use Mega Dumper and other tools similar. Submitter Ninjego1 Submitted 06/03/2020 Category CrackMe Link to post
YuqseLx 35 Posted June 3, 2020 Share Posted June 3, 2020 Spoiler 弛他地池也 It's not good i think. Big file size, not encrypted strings or not emulated calls. Only bp true function and get valid serial. Link to post
Washi 110 Posted July 2, 2020 Share Posted July 2, 2020 Approach: Spoiler Run app Attach windbg lm to get module address, !savemodule address dump.bin Open dump.bin in .NET disassembler/decompiler of choice, find main form button click handler, search call to TextBox::get_Text, observe serial in plaintext. Link to post
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now