Skip to content

Latest commit

 

History

History
79 lines (52 loc) · 2.82 KB

README.md

File metadata and controls

79 lines (52 loc) · 2.82 KB

Extreme CrackMe by moxiu

Overview

Welcome to Extreme CrackMe, a fun and challenging puzzle game where the goal is to crack the generated password using your reverse engineering skills. The game works by generating a random password and applying an obscure algorithm to validate it. Can you figure out how to break it?

Features

  • Random password generation with a length of 5 to 35 characters.
  • Obfuscation algorithm that changes the password validation process, making it tricky to guess.
  • Open-source, community-driven project—feel free to contribute!

License

This project is licensed under the Apache License 2.0. See the LICENSE file for more details.

Installation

To compile and run the Extreme CrackMe program, you’ll need Visual Studio 2022 or any other C++ compiler that supports C++17 or higher.

Prerequisites

  1. Visual Studio 2022 or g++ (or any compatible C++ compiler).
  2. A basic understanding of C++ programming and console applications.

Steps to Compile and Run:

  1. Clone the repository:

    git clone https://github.com/moxiu6/extreme_crackme.git
  2. Navigate to the project directory:

    cd extreme-crackme
  3. Visual Studio 2022:

    • Open the project using CrackMe.sln.
    • Build the solution by selecting Build → Build Solution.
    • Press Ctrl + F5 to run the project without debugging.
  4. g++ (or other C++ compiler):

    • Navigate to the project directory in your terminal.
    • Compile the project:
      g++ -o crackme main.cpp password_generator.cpp obscure.cpp
    • Run the program:
      ./crackme

you can also download the already compiled binary:

Download 1.0-13-01-2025 directly

How It Works

  1. Password Generation: A random password is generated with a length between 5 and 35 characters, consisting of printable ASCII characters.

  2. Password Obfuscation: The password is then obfuscated using an obscure algorithm, which is split into two parts and checked against the user’s input to validate if the user has cracked the password.

  3. Validation: The user must input the correct password. The program compares the obfuscated values of the input and the generated password. If both parts match, the user has successfully cracked the password!

Contributing

Feel free to contribute! If you have ideas for improvement or have found bugs, please open an issue or create a pull request.

Disclaimer

This project is intended for educational purposes and is designed to challenge your skills in reverse engineering. Please use it responsibly.


under Apache License 2.0 License