The AROS Archives(anonymous IP: 18.210.12.229,155) 
 HomeRecentStatsSearchSubmitUploadsMirrorsContactInfoDisclaimerConfigAdmin
 Menu


 Categories

   o Audio (103)
   o Datatype (15)
   o Demo (30)
   o Development (238)
   o Document (27)
   o Driver (18)
   o Emulation (54)
   o Game (448)
   o Graphics (187)
   o Library (27)
   o Network (51)
   o Office (14)
   o Utility (225)
   o Video (20)

Total files: 1457

Full index file
Recent index file

Part of aros exec
 Readme for:  Utility » Archive » ppcrack.i386-aros.lha

PPCrack

Description: unpacks and decrypts all PowerPacker files
Download: ppcrack.i386-aros.lha       (TIPS: Use the right click menu if your browser takes you back here all the time)
Size: 102kb
Version: 1.0a
Date: 01 Feb 21
Author: Stuart Caie
Submitter: aGGreSSor [CPU]
Requirements: ABIv0; i386, InstallerLG
Category: utility/archive
License: Public domain
Distribute: yes
FileID: 2283
 
Comments: 0
Snapshots: 0
Videos: 0
Downloads:  (Current version)
 (Accumulated)
Votes: 0 (0/0)  (30 days/7 days)

[Show comments] [Show snapshots] [Show videos] [Show content] [Replace file] 
============================== F E A T U R E S ==============================

ppcrack is a program for decrypting or unpacking any files which were
made with the old Amiga program PowerPacker, by Nico Francois. 

You don't need the password, ppcrack will find the right key by dictionary 
attack or brute force.

Supports all PowerPacker files (data, executable, library, encrypted,
master-mode, overlay, PPLoadSeg), plus QuickPowerPacker and
PowerPacker Patch tampered executables.

============================ R E Q U I R E M E N T ==========================

ppcrack tested and worked fine on the following configurations:

- IcarOS i386               (Kickstart 51.51, Workbench 40.0, AROS ABIv0)
- AROS One i386             (Kickstart 51.51, Workbench 40.0, AROS ABIv0)

================================= U S A G E =================================

There are 4 ways to use ppcrack.

1:    ppcrack <file(s)>

Unpacks all PowerPacked files given on the command line.

If a file is an encrypted PowerPacked executable, ppcrack will try a
dictionary attack.  If this fails, or if the file is an encrypted
PowerPacked data file, ppcrack will try out all possible decryption
keys (00000000 to FFFFFFFF) on the file. If the file is PowerPacked
but not encrypted, ppcrack will simply decrunch the file.

2:    ppcrack -from <key> -to <key> <file(s)>

As above, but ppcrack will only use decryption keys in the range
given. If the '-from' parameter is missed out, 00000000 is assumed as
the start key. If the '-to' parameter is missed out, FFFFFFFF is
assumed as the end key.

3:    ppcrack -key <key> <file(s)>

ppcrack will try only the specified decryption key on the file(s).

4:    ppcrack -pass <password> <file(s)>

ppcrack will try only the decryption key which comes from the given
password.

Normally, ppcrack uses only one thread of execution. Use the option
"-cpus 2" or a higher number to use more than one thread. Ideally,
this number should be the same as the number of CPUs or CPU cores you
have on your machine. ppcrack will break the workload evenly across
the threads.

Furthermore, ppcrack stops once it finds a successful key. If you want
to keep searching, add the flag '-all' to the command line.

There is one more option; adding '-big' to the command line turns on
"big mode". See the next chapter for details.

Any key which leads to a fully decrunched file is saved to disk, as
the original filename + '.' + the key, e.g. "PowerPacker.pp.08900400".
Files which aren't encrypted will be saved as filename + '.decrunched'.

================================ S O U R C E ================================

aminet backport
http://aminet.net/package/util/crypt/ppcrack_MOS
http://aminet.net/package/util/crypt/ppcrack_OS4

AROS compiled by

        ______ ______              ______ ______ 
 ______|:: .__|:: .__|_____ ______|:: ___|:: ___|______ _____ 
|: ,   |:  |  |:  |  |:  ,_|:  ,__|:___  |:___  |:  -  |:  ,_|
|__|___|______|______|___|   _____|______|______|______|___|


Copyright © 2005 - 2021 The AROS Archives All Rights Reserved