Number of crackmes:
Number of writeups:
Comments:
| Name | Author | Language | Arch | Difficulty | Quality | Platform | Date | Downloads | Writeups | Comments |
|---|
| Crackme | Date | Infos |
|---|
| Crackme | Comment | Date |
|---|---|---|
| unpackme | x64dbg attach subproc (cache.bin), breakpoints on ReadConsole calls Answer: SecretPass123 | 2026-04-19 18:18 |
| Unpack Reactor | L0L_YOU_R3ALLY_UNP4CK3D? TY ❤️ ExtremeDumper + dnspy | 2026-04-19 13:22 |
| XOR crackme | GoReSym + Ghidra + x64dbg Enter pass: nnybzd!%847x2p5{JQSJVF YOU'RE REALLY PRO!! Reversing GO samples is hell💀 | 2026-04-02 23:11 |
| Adversarial Mind | UEFTU1dPUkR7ZmFsc2VfcGFzc3dvcmR9 (PASSWORD{false_password}) Defeated with one promt in ChatGPT😜 | 2026-04-02 20:45 |
| The Quantum Box | QU4NTUM-131-deadbeef TY❤️Ghidra | 2026-03-24 19:35 |
| TooManyChecks | Answer: Flag(ByP@$$_a_B0$$) TY❤️x64dbg Not "too many checks," but "only two patches" from anti-analysis (jne/je -> jmp) Then we look for the "Wrong flag" string, find the je that points there. We set a breakpoint, and see the flag in rcx | 2026-03-23 18:46 |
| Easy Crackme | vpeKE3cT59 | 2026-03-10 19:31 |
| Building Rust With Bob | Admin x64dbg: 00007FF6C78614AD | B9 41646D69 | mov ecx,696D6441 | 696D6441 -> 41 64 6d 69 (little-endian) -> Admi xor eax, 6E -> n | 2026-03-07 21:38 |
| Building Rust With Bob | Admin x64dbg: 00007FF6C78614AD | B9 41646D69 | mov ecx,696D6441 | 696D6441 -> 41 64 6d 69 (little-endian) -> Admi xor eax, 6E -> n | 2026-03-07 21:38 |
| LoginCrackme | Rob0ts.tXt TY ❤️ Ghidra | 2026-03-07 21:08 |
| License KeyGen By 999 | Answer: phishy O628-TH3P-VGUQ TY ❤️ dnSpy | 2026-03-07 19:57 |
| razkom_v1.1 | ZSR-EWA-OLZ-VPK-UUO-KCM -> True SZR-GUA-JQZ-FFK-YQO-NZM -> True ODR-HTA-QJZ-EGK-WSO-CKM -> True ZSR-JRA-EVZ-EGK-KEO-IEM -> True ENR-HTA-LOZ-ZLK-EKO-CKM -> True QBR-ZBA-WDZ-ZLK-PZO-JDM -> True ZSR-SIA-MNZ-FFK-FJO-IEM -> True UXR-THA-MNZ-FFK-CMO-ZNM -> True PCR-GUA-OLZ-OWK-AOO-DJM -> True MFR-CYA-CXZ-FFK-WSO-IEM -> True | 2026-03-07 17:38 |
| Find the Flag | meilovecats | 2026-03-01 20:50 |
| simple license with xor | 123_isthekey-crkm sry4x64dbg | 2026-03-01 20:30 |
| aname crackme | im_your_password_140714 A lot of XORing (TY ❤️ Ghidra) | 2026-02-18 21:12 |
| pixy | TODO: Download a real JPEG → rename it to abc.jpeg (3 chars + .jpeg) Run under x64dbg → set breakpoint on memcmp (or vcruntime140!memcmp) When breakpoint hits, check arguments: RCX = pointer to computed 3-byte value RDX = pointer to file base name (e.g., "abc") R8 = length (should be 3) Follow RCX in Dump and read the first 3 bytes (often printable ASCII). Rename the file to <those 3 chars>.jpeg. Run again → should print dayummm | 2026-02-15 19:42 |
| KeygenMe | python script: import sys username = "vBPmZTInt5ZtI6i" password_hex = "23d2122133e262ddd9d0d29138c69a" password = bytes.fromhex(password_hex) sys.stdout.buffer.write(username.encode("ascii") + b"\n") sys.stdout.buffer.write(password + b"\n") python script.py | crackme.exe | 2026-02-15 12:41 |
| VeryHard 99% you can't do it | FLAG{U_CR4CK3D_TH3_ULT1M4TE_CH4LL3NG3} ~ 15 seconds to find the right string in Ghidra❤️ | 2026-02-08 19:17 |
| crack the points | Your count points is 12345 TY ❤️ x64dbg | 2026-02-08 18:45 |
| PlsCrackMe | Answer: 123@#!ABCabcd ty ❤️ Ghidra func Counter: ... if ((((dig_count == 3) && (spec_char_count == 3)) && (upper_char_count == 3)) && (lower_char == 4) ) { Bool = 1; ... | 2026-02-08 12:09 |
| ACrack | CrackMeOne (ty Ghidra❤️) | 2026-02-08 09:20 |
| Password(Very Easy) | SuperPass ❤️ TY Ghidra ❤️ | 2026-02-02 16:01 |
| Validator (easy) | Answer: ValidPassword TY Ghidra❤️ | 2026-02-01 19:09 |
| A CrackMe by ByteClassic (on yt) | secret123 | 2026-02-01 18:44 |
| Ez Crackme | ar@gerg554y345@htw54 | 2026-02-01 18:37 |