nightxyz on 4:17 PM 11/09/2025: Password : sPåqSDâçàLMEwåLHåPtL_éÇéåü!
ansarx on 4:43 PM 11/11/2025: Hi bobx,
interesting and nice crackme.
if you find it interesting, check out my writeup on GitHub and give me feedback, thanks 🙌
https://github.com/s4yr3x/bobx-crackme-src
Ayush_reverser on 6:08 AM 11/13/2025: Flag: FLAG{U_CR4CK3D_TH3_ULT1M4TE_CH4LL3NG3}, it was not that difficult as the name suggests it to be. It took me 10-15 min
bulbul on 6:16 PM 11/16/2025:
===============================================
SECURE CRACKME CHALLENGE - ULTRA HARD
BY BOBX
===============================================
[*] Security checks passed.
[*] System integrity verified.
[*] Enter password (or type 'about'): asd
===============================================
[SUCCESS] Access Granted!
Flag: FLAG{U_CR4CK3D_TH3_ULT1M4TE_CH4LL3NG3}
Congratulations, elite hacker!
===============================================
Press ENTER to exit...
FentCat on 12:21 PM 11/23/2025: U could improve this alot..
1 patch and i got in u nead to make it a lil better sir.
stefa9 on 5:44 PM 12/22/2025: i did it by patching at first but then you can go to the generate pass function and check out how it works, it xors multiple times so the XOR is useless, you just have to care about the local buffer which forms the password:
pass_src_0 = (byte *)0x8783445371865073;
pass_src_1 = (byte *)0x484c8677454d4c85;
pass_src_2 = (byte *)0x8280825f4c745086;
pass_src_3 = (byte *)0x218186;
and these together form the password 😼
You must be logged in to submit a writeup
Solution by scaredandalone on 10:53 AM 11/28/2025: maybe incorporate some static obfuscation next time so you actually have to figure out the password logic :)