BrianDaugetteat April 02,2016 This was a pretty cool technique, even though the video quality and presentation were something to be desired. It would have been better if the creator of the video explained how people can defend against this sort of exploitation technique, or how often something like this works against widely used programs. Like for instance can it be used to open password protected documents or rar files?
fpazdzinat April 17,2016 An interesting program. He talks about how the target program is a noob program but I would like to see how this program works against something more advanced. I’m guessing this would only work on programs that have all of its data and authentication performed on the local system instead of verifying credentials from a server.
stadkalat April 22,2016 A new tool to learn. This tool might be of use at some or the other time.
danielm8at April 22,2016 Wow. This is great! I remember when friends in high school cracked versions of computer games, thus not needing to enter a key-code to gain access to the game. I wonder if this is how they did it. So this only works for programs? Encrypted files cannot be broken like this right?
adamat April 25,2016 I had no idea this was so simple. Like the other commenters, I always amazed when my friends would find useful cracks for software. I think most times they would just find viruses. I am sure that with so many applications moving to the cloud these expensive apps are becoming much more affordable and near impossible to crack.