nightxyz on 2025-11-09 16:17:
[Click to reveal]Password : sPåqSDâçàLMEwåLHåPtL_éÇéåü!
ansarx on 2025-11-11 16:43:
Hi bobx,
interesting and nice crackme.
if you find it interesting, check out my writeup on GitHub and give me feedback, thanks 🙌
https://github.com/s4yr3x/bobx-crackme-src
Ayush_reverser on 2025-11-13 06:08:
[Click to reveal]Flag: FLAG{U_CR4CK3D_TH3_ULT1M4TE_CH4LL3NG3}, it was not that difficult as the name suggests it to be. It took me 10-15 min
bulbul on 2025-11-16 18:16:
[Click to reveal]
===============================================
SECURE CRACKME CHALLENGE - ULTRA HARD
BY BOBX
===============================================
[*] Security checks passed.
[*] System integrity verified.
[*] Enter password (or type 'about'): asd
===============================================
[SUCCESS] Access Granted!
Flag: FLAG{U_CR4CK3D_TH3_ULT1M4TE_CH4LL3NG3}
Congratulations, elite hacker!
===============================================
Press ENTER to exit...
FentCat on 2025-11-23 12:21:
U could improve this alot..
1 patch and i got in u nead to make it a lil better sir.
stefa9 on 2025-12-22 17:44:
i did it by patching at first but then you can go to the generate pass function and check out how it works, it xors multiple times so the XOR is useless, you just have to care about the local buffer which forms the password:
pass_src_0 = (byte *)0x8783445371865073;
pass_src_1 = (byte *)0x484c8677454d4c85;
pass_src_2 = (byte *)0x8280825f4c745086;
pass_src_3 = (byte *)0x218186;
and these together form the password 😼
Solution by scaredandalone on 2025-11-28 10:53: maybe incorporate some static obfuscation next time so you actually have to figure out the password logic :)