I love that they wrote a tool to automate cracking. I'd be curious to know more about it, like specifically what kinds of protection it could break. IIRC a lot of copy protection on the Apple ][ was pretty straightforward, they'd just change the marker bytes for where sectors began to something nonstandard. I imagine that's pretty easy to automatically reverse. But a disc with something weird like spiral tracking or software with a deeply obfuscated "look up a word in the manual" system must be harder to crack.
It's here https://github.com/a2-4am/passport Also he has a "best of" list if you don't want to dig through all of the logs he keeps to find the interesting stuff. https://twitter.com/a2_4am/status/993129396520341504