PushpenderIndia / crypter

Crypter in Python 3 with advanced functionality, Bypass VM, Encrypt Source with AES & Base64 Encoding | Evil Code is executed by bruteforcing the decryption key, and then executing the decrypted evil code
326 stars 74 forks source link

i used 10000 as password, but it could not crack it for more than 30 secs i keeps counting #9

Open ghoxt007 opened 2 years ago

ghoxt007 commented 2 years ago

i used 10000 as password, but it could not crack it for more than 30 secs i keeps counting, and it is still counting, i also change password to 00000 it still did not work, the program runs the bruteforce to infinity without running the encrypted code.

PushpenderIndia commented 2 years ago

Strange, try small password such as 598 etc

On Wed, 22 Dec, 2021, 2:52 pm Harry, @.***> wrote:

i used 10000 as password, but it could not crack it for more than 30 secs i keeps counting, and it is still counting, i also change password to 00000 it still did not work, the program runs the bruteforce to infinity without running the encrypted code.

— Reply to this email directly, view it on GitHub https://github.com/PushpenderIndia/crypter/issues/9, or unsubscribe https://github.com/notifications/unsubscribe-auth/ANORYIUIF6WR6CA74V65DF3USGKFTANCNFSM5KSC5WMA . Triage notifications on the go with GitHub Mobile for iOS https://apps.apple.com/app/apple-store/id1477376905?ct=notification-email&mt=8&pt=524675 or Android https://play.google.com/store/apps/details?id=com.github.android&referrer=utm_campaign%3Dnotification-email%26utm_medium%3Demail%26utm_source%3Dgithub.

You are receiving this because you are subscribed to this thread.Message ID: @.***>