Share how awesome the crackme was or where you struggle to finish it! Stay polite and do not spoil the solution/flag!
Please keep the comments section English-only.
Author:
TheSwedishLord
Language:
C/C++
Upload:
2026-02-27 23:07
Platform:
Unix/linux etc.
Difficulty:
3.5
Quality:
3.0
Arch:
x86-64
Downloads:
15
Size:
349.42 KB
Writeups:
1
Comments:
1
Description
An original multi-stage crackme with seven progressive gates, each requiring a different reverse-engineering technique to breach. Stages: 1. Stack buffer overflow 2. Chained multi-room buffer overflow 3. Three-layer cipher reversal (Rolling XOR, nibble shuffle, byte rotation) 4. Serial key validation with polynomial constraints 5. XOR-obfuscated dispatch table graph traversal 6. AES-encrypted flag with heavy anti-analysis (ptrace, timing, INT3, integrity checks) 7. Final convergence — all prior tokens combine into one key Anti-patching: Flags are derived from correct input through irreversible computation. Patching branches produces garbage, not valid flags. Anti-analysis: Stages 5-7 employ ptrace detection, rdtsc timing checks, self-integrity CRC32, manual stack canaries, decoy functions, and control-flow flattening. Design: Static binary, stripped, no stack protector, no PIE, no RELRO. Sequential gate progression required.