| Easy Crackme |
vpeKE3cT59 |
2026-03-10 19:31 |
| Building Rust With Bob |
Admin
x64dbg:
00007FF6C78614AD | B9 41646D69 | mov ecx,696D6441 |
696D6441 -> 41 64 6d 69 (little-endian) -> Admi
xor eax, 6E -> n
|
2026-03-07 21:38 |
| Building Rust With Bob |
Admin
x64dbg:
00007FF6C78614AD | B9 41646D69 | mov ecx,696D6441 |
696D6441 -> 41 64 6d 69 (little-endian) -> Admi
xor eax, 6E -> n
|
2026-03-07 21:38 |
| LoginCrackme |
Rob0ts.tXt
TY ❤️ Ghidra |
2026-03-07 21:08 |
| License KeyGen By 999 |
Answer:
phishy
O628-TH3P-VGUQ
TY ❤️ dnSpy |
2026-03-07 19:57 |
| razkom_v1.1 |
ZSR-EWA-OLZ-VPK-UUO-KCM -> True
SZR-GUA-JQZ-FFK-YQO-NZM -> True
ODR-HTA-QJZ-EGK-WSO-CKM -> True
ZSR-JRA-EVZ-EGK-KEO-IEM -> True
ENR-HTA-LOZ-ZLK-EKO-CKM -> True
QBR-ZBA-WDZ-ZLK-PZO-JDM -> True
ZSR-SIA-MNZ-FFK-FJO-IEM -> True
UXR-THA-MNZ-FFK-CMO-ZNM -> True
PCR-GUA-OLZ-OWK-AOO-DJM -> True
MFR-CYA-CXZ-FFK-WSO-IEM -> True |
2026-03-07 17:38 |
| Find the Flag |
meilovecats |
2026-03-01 20:50 |
| simple license with xor |
123_isthekey-crkm
sry4x64dbg |
2026-03-01 20:30 |
| aname crackme |
im_your_password_140714
A lot of XORing (TY ❤️ Ghidra) |
2026-02-18 21:12 |
| pixy |
TODO:
Download a real JPEG → rename it to abc.jpeg (3 chars + .jpeg)
Run under x64dbg → set breakpoint on memcmp (or vcruntime140!memcmp)
When breakpoint hits, check arguments:
RCX = pointer to computed 3-byte value
RDX = pointer to file base name (e.g., "abc")
R8 = length (should be 3)
Follow RCX in Dump and read the first 3 bytes (often printable ASCII).
Rename the file to <those 3 chars>.jpeg.
Run again → should print dayummm |
2026-02-15 19:42 |
| KeygenMe |
python script:
import sys
username = "vBPmZTInt5ZtI6i"
password_hex = "23d2122133e262ddd9d0d29138c69a"
password = bytes.fromhex(password_hex)
sys.stdout.buffer.write(username.encode("ascii") + b"\n")
sys.stdout.buffer.write(password + b"\n")
python script.py | crackme.exe |
2026-02-15 12:41 |
| VeryHard 99% you can't do it |
FLAG{U_CR4CK3D_TH3_ULT1M4TE_CH4LL3NG3}
~ 15 seconds to find the right string in Ghidra❤️ |
2026-02-08 19:17 |
| crack the points |
Your count points is 12345
TY ❤️ x64dbg |
2026-02-08 18:45 |
| PlsCrackMe |
Answer: 123@#!ABCabcd
ty ❤️ Ghidra
func Counter:
...
if ((((dig_count == 3) && (spec_char_count == 3)) && (upper_char_count == 3)) && (lower_char == 4)
) {
Bool = 1;
... |
2026-02-08 12:09 |
| ACrack |
CrackMeOne (ty Ghidra❤️) |
2026-02-08 09:20 |
| Password(Very Easy) |
SuperPass ❤️ TY Ghidra ❤️ |
2026-02-02 16:01 |
| Validator (easy) |
Answer: ValidPassword TY Ghidra❤️ |
2026-02-01 19:09 |
| A CrackMe by ByteClassic (on yt) |
secret123 |
2026-02-01 18:44 |
| Ez Crackme |
ar@gerg554y345@htw54 |
2026-02-01 18:37 |