| Hide n Seek |
@msym Sure. My discord is elvis6356. Or you can find me on crackmes.one discord |
2026-01-07 02:59 |
| Derive64 v1.0 |
Read the FAQ to get the zip password |
2026-01-03 03:01 |
| Derive64 v1.0 |
Patching is not allowed by default |
2026-01-02 02:37 |
| Hide n Seek |
Yes correct password will decrypt and lauch flag.exe |
2026-01-01 03:33 |
| VM Crackme Challenge: 1. Moderate VM |
@BigLongs: Yes please don't dump the source code on comment section. However you can dump it in gist or something then post the link |
2025-12-11 02:38 |
| KeyGenMeV3 |
@fakesiva: Nope I don't think it's a valid solution |
2025-11-27 13:52 |
| Advanced Persistent Threat |
@corex: It's intend |
2025-11-26 03:12 |
| Assembler Crackme |
Nice little crackme :) |
2025-10-26 13:28 |
| ez crackme |
segment fault. Look like bad crackme |
2025-10-20 03:30 |
| _starting off |
If you read the faq, password for zip file is crackmes.one |
2025-10-20 02:20 |
| Non-cryptographically secure hash (my first crackme!) |
Yep I think bruteforce is fine |
2025-08-21 02:50 |
| good girl |
I believe patching is not the goal |
2025-08-13 12:22 |
| Very easy |
Look like bad crackme. Feel free to rate its quality |
2025-08-05 04:19 |
| cr4ckm3 |
@GiusNasxieng: Agree with you. Free free to rate this crackme |
2025-08-03 13:19 |
| CRACK KEY CRASH |
maybe the goal is fix the program |
2025-07-11 09:18 |
| InDuLgEo_CrackME_V2 |
AoRE is still alive????? |
2025-07-01 03:19 |
| Simple anti-tamper 1.0 by Darkgate |
Changed. But I also reject your solution because you dump everything in solution description field. Try to upload a text solution instead |
2025-06-20 02:40 |
| Simple CrackMe |
@ruju: password is "crackmes.one" |
2025-06-13 15:18 |
| CrackMe |
After being take down, I dm the author and he confirm this crackme is not malicious. So he reupload it again |
2025-06-12 02:29 |
| RustVMgeddon |
I accepted patch solution. Because I saw that solution author put alot if effort on it and he said that it's nearly impossible to find the password |
2025-06-11 02:58 |
| MyFirst |
@WM Hi, I’m the one who reviews the solution, not the author. I apologize for the inconvenience. Some people have pointed out that certain solutions were of low quality (just code with no explanation), so I’ve tightened the quality control a bit. I hope you understand. |
2025-05-28 16:01 |
| Ghost |
Look more like pwn challenge then rev challenge xD |
2025-05-27 08:27 |
| Super easy password crack for kids |
yeah I believe patching is not the goal |
2025-05-21 03:24 |
| Simple crackme |
Please note that patching is now the goal. Find the password instead |
2025-05-19 13:34 |
| Bug9519's First Crackme |
Next time please build your crackme static. Not every computer have gcc lib to run this |
2025-05-19 13:18 |
| Simple CrackMe |
Thank you for upload crackme build in Release mode. I have just deleted old crackme. |
2025-05-16 04:07 |
| Validator (easy) |
Next time please build it static. Not every computer have gcc library |
2025-05-14 03:31 |
| simple |
crackmes.one |
2025-05-02 12:42 |
| C++ Obfuscator |
@Dokaepi: zip password is "crackmes.one" |
2025-04-20 02:02 |
| Hide n Seek |
Hi. It's False Positive for sure |
2025-04-19 14:32 |
| WeeperVM -- Level 1 |
Got it. Thank whitequark |
2025-04-18 12:24 |
| WeeperVM -- Level 1 |
Nice WU. But did you miss include binary ninja arch plugin? Maybe you can upload another solution with binary ninja arch plugin. I would be glad to approve it and delete old solution |
2025-04-18 10:37 |
| veryeasy |
@0Q1BE: Good question. Hint: python subprocess |
2025-04-15 08:29 |
| easyjerk |
@beard: Try password "crackmes.one" |
2025-04-13 13:01 |
| Array crackmes |
@Warning: Not really. 9/72 is pretty low detection rate. To analyze the binary, VirusTotal runs it in a sandbox and monitors every traffic connection. This includes traffic from the operating system itself, such as connections to the Microsoft time server to update the clock. |
2023-11-24 03:01 |
| rock_noll_vo |
base on constant: 0xCBF29CE484222325 |
2022-07-07 05:20 |
| The Matrix |
user: admin
password: password
key 1: xx@oxxwwxx
key 2: x@x07x00xx
key 3: 2022 (3 times) |
2022-06-07 03:48 |
| Eat Sleep Trace Repeat |
@X3eRo0: Then the answear to the flag is yes. I enjoy it a lot. Gonna make a write up soon :D |
2022-01-29 06:33 |
| Eat Sleep Trace Repeat |
zh3r0{d1d_y0u_enjoyed_r3v3rs1ng_w1th0ut_b1n4ry_?}
Is that correct? |
2022-01-28 08:41 |
| Protected |
@nassimorg09:Good to see you have bypassed some anti debug tricks. You're still in the begin at solving this but good move. You might want to dig to how does crackme actually work. Hope someone can share there solution so other people can learn from it. |
2021-12-16 07:24 |
| Protected |
@PastorJimColerick: Just ignore him. It's not worthy. BTW seem that you also solve this crackme. Congrats :) |
2021-09-25 09:14 |
| Protected |
@xmaple555: I remember I just change a bit in last letter check. You can calculate it easy with script :) |
2021-09-17 13:31 |
| Protected |
Congratulation puelo :) |
2021-08-23 01:50 |
| rock_noll_vo |
So "rock_noll_vo" means rockyou.txt and Fowler–Noll–Vo hash. Nice hint xD. Hope I can make solution soon. |
2021-08-19 06:51 |
| rock_noll_vo |
if hash_64_fnv1a(key) == 0x6658A617BCCE24D5) then correct. Is that true?
|
2021-08-18 05:46 |
| crackme9 by mucki |
Hmm you forgot deleting the function at 0x4014A8. Using this function I was able to generate my own valid serial :)
Elvis/6nNx9Q============ |
2019-05-28 10:03 |
| crackme9 by mucki |
Hmm I have found out the idea. Nice crackme BTW :) |
2019-05-28 09:25 |