Posted October 10, 20204 yr Python CrackMe - FunnyProtector This is an python unpackme for testing my private python obfuscator You have to unpack it ! Good Luck File Information Submitter Josman Submitted 10/10/2020 Category UnPackMe View File
October 14, 20204 yr Is a specific version of Python needed ? It crashes here using Python34_x64 Edited October 14, 20204 yr by Kurapica
February 5, 20214 yr Solution Pretty straight-forward, good luck next time! Tutorial: Spoiler 1) The second line of "crackme.py" has a exec statement, simply replace the __file__ with "" and replace exec with print, this will give you the code behind the "XORified" script. 2) The next script uses base64 and another exec along with a function that gets the Unicode Code of each character and subtracts it be 10, as the string is being passed with a +10 increase of each Unicode Code 2 a) All you have to do, is replace exec with print and it'll give you the next step (I used decode() so it was more readable) 3) This one uses the DLL to see if the input is equivalent to the key, looking at the DLL, it does what step 2 does, by adding +10 to the Unicode Code, and the reverse is -10, now all we have to do is print the Cipher Function on line 16 which is checking if key (input var) is equal to the ciphered key. This will in turn give us the output "funnyprotectorthefunniestprotector" which works as the key Final Result Key: Spoiler funnyprotectorthefunniestprotector
August 30, 20213 yr tutorial: Spoiler 1) before returning "result" from protector.py add the line "print(result)" to get more readable code 2) again, before the "EEE3E3E3E3" function returns print the result of "binascii.unhexlify(bytes(Z2ZZZZ2Z2,'utf-8')).decode()" 3) lastly print the return from the "Cipher" function which will eventually decrypt the key and print to screen key: Spoiler funnyprotectorthefunniestprotector
Create an account or sign in to comment