Welcome to Reverse Engineering Passion Team

Register now to gain access to all of our features. Once registered and logged in, you will be able to contribute to this site by submitting your own content or replying to existing content. You'll be able to customize your profile, receive reputation points as a reward for submitting content, while also communicating with other members via your own private inbox, plus much more! This message will be removed once you have signed in.

Search the Community: Showing results for tags 'pre-generated keys'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • WELCOME
  • TEAM REPT
    • R3PT Releases

Blogs

  • JJ Blog
  • Levis' Blog
  • JJHOME

Calendars

  • Community Calendar

Found 1 result

  1. Application: Bigasoft Total Video Converter App. language: English Home Page: http://www.bigasoft.com/ Packer: none Operating system: WinAll Release type: Keys/Keygen (ruby) Released at: 16/03/2017 Cracked by: d0ping / REPT Use any key provided here below: 2DBE-B5AF-72BF-3D4B-972B-064F-E15A-06F3 1EA2-37FE-2C38-70C0-167F-3DAB-1CAA-31D4 217A-850A-0DD1-70E3-FB37-951C-C062-677A FFB6-1A99-E28E-5F2E-2190-D26B-B82D-9A58 DCBB-9783-9EB4-A6E4-3257-8A78-9C60-C206 C361-1D5E-D15F-F001-515F-40EE-F66F-E1D9 01F9-4A91-9811-6F3B-3A82-9D18-24A3-FCDC 35AC-2901-0047-6743-EAC1-D71A-B854-D24C E2D0-0E24-45FF-FE7E-20AB-73FF-9EE3-F12C F1F9-6AB1-7D8F-AFF0-CD85-7D47-3C59-0AA7 977A-FEE7-4E2B-F2F2-05E3-6D94-20DB-1188 B859-EE3C-F1AF-F397-21EB-0DB9-BE27-B79E 6128-38D3-4E2B-5C8D-F5BA-2B80-6541-6C4A 1414-E00D-395D-C367-AA6C-7FD4-6E25-8C15 29C0-CF75-BA6E-5130-D80B-B592-67A5-29EE 755C-11C6-EAE8-9744-3712-0462-2074-6952 2ACC-C976-FD45-28D5-F48D-07AE-5254-BC65 6B81-E38B-3882-489B-225E-F950-6DCC-D5BD A56F-5CB2-48FD-6EF1-7E41-1358-120F-77BF 8028-23B8-C96B-565C-15C0-09B3-47C4-BFFA Keygen for it: require 'digest' def bigasoft_total_video_converteur_keygen dummy_1 = [ 0x31, 0x42, 0x01, 0x67, 0x03, 0x73, 0x05, 0x66, 0x07, 0x54, 0x09, 0x74, 0x0B, 0x6C, 0x0D, 0x56, 0x0F, 0x64, 0x11, 0x6F, 0x13, 0x43, 0x15, 0x6E, 0x17, 0x65, 0x19, 0x74, 0x1B, 0x72, 0x1D, 0x34, 0x1F, 0x69, 0x02, 0x61, 0x04, 0x6F, 0x06, 0x74, 0x08, 0x6F, 0x0A, 0x61, 0x0C, 0x20, 0x0E, 0x69, 0x10, 0x65, 0x12, 0x20, 0x14, 0x6F, 0x16, 0x76, 0x18, 0x72, 0x1A, 0x65, 0x1C, 0x20, 0x1E, 0x30, 0x30 ] k_1 = dummy_1.map(&:chr).join dummy_2 = [ 0x42, 0x69, 0x67, 0x61, 0x73, 0x6F, 0x66, 0x74, 0x54, 0x6F, 0x74, 0x61, 0x6C, 0x20, 0x56, 0x69, 0x64, 0x65, 0x6F, 0x20, 0x43, 0x6F, 0x6E, 0x76, 0x65, 0x72, 0x74, 0x65, 0x72, 0x20, 0x34 ] k_2 = dummy_2.map(&:chr).join alphabet = ('0'..'9').to_a + ('A'..'F').to_a rnd_part = '' summ = 0 8.times do x_x = alphabet[rand(alphabet.size)] summ += x_x.ord rnd_part << x_x end rnd_part.insert(4, '-').insert(9, '-') md5_digest = Digest::MD5.hexdigest k_1 + rnd_part + k_2 md5_digest = md5_digest.chars.values_at(* md5_digest.chars.each_index.select{|i| i.even?}).join.upcase rnd_part_2 = '' 8.times do rnd_part_2 << alphabet[rand(alphabet.size)] end rnd_part_2[0] = alphabet[(summ + 0x13) % alphabet.size] rnd_part_2.insert(0, '-').insert(5, '-') rnd_part + md5_digest.scan(/..../).join('-') + rnd_part_2 end P.S.: developer of this software used the same registration scheme as in case of this target: http://team-rept.com/board2/index.php?/topic/4418-allavsoft-video-downloader-converter-v31356200/ Just simply compare the source code: the dummy constants (dummy_1 and dummy_2), generated before md5 hashing, are the only difference between these two targets. So I suppose that even shareware developers are a bad_bad rippers, indeed.