| Easy |
I used procyon decompiler, amazed how it works flawlessly. |
2024-04-26 17:50 |
| VMAdventures 1 |
Played it on x64dbg only and enjoyed every moment. The quality of the decompilation was bad, so I dumped it. This crackme was worth solving. It certainly taught me a lot. |
2024-04-25 21:01 |
| crackme2 |
Every time I hit restart on the original binary in x64dbg, the effective address of the top of the stack changes. What am I missing? |
2024-04-24 16:30 |
| crackme2 |
Seems impossible without patching, because the algorithm includes some checks based on the effective address of a value on the stack. This means it changes every time. I hope I am wrong because it will teach me a lot. |
2024-04-23 17:25 |
| Obfuscation of C (11 kb crackme) |
Time Wasted Debugging: ~08:07:00
Learned a lot from it. It was a shame I didn't know how to unpack UPX manually before (took several hours on its own, now its a matter of seconds). I hope someone writes a comprehensive solution for it because I would like to learn how to bypass its Anti-Decompilation technique. |
2024-04-23 11:41 |
| First crackMe in C++ |
Seeing “asdasd” being translated into “qfnqfn” was the eureka for me. |
2024-04-21 19:19 |
| HardBaby (1.5 kb crackme) |
Reversed the algorithm. But I don't have a clue how to write a keygen for it. |
2024-04-20 23:57 |
| AsTinyAsHard (2.5 kb crackme) |
I really enjoyed it. Analyzing both statically and dynamically in parallel helped a lot. |
2024-04-20 23:56 |
| SerialGen (2 kb crackme), write a keygen |
Another one from me: https://pastebin.com/uVGR2P1b
The program can also be patched to serve as THE keygen. Just find this sequence of bytes "83C418B88B20400050" with a hex editor program and replace the last byte 50 (push eax) with 90 (nop). RE the program yourself as to why this works. |
2024-04-20 23:53 |