Number of crackmes:
Number of writeups:
Comments:
| Name | Author | Language | Arch | Difficulty | Quality | Platform | Date | Writeups | Comments |
|---|
| Crackme | Date | Infos |
|---|
| Comment | Date | Link |
|---|---|---|
| As ilkiNUR stated, the correct password is in plaintext which made trying to circumvent the anti-debugging checks unnecessary. Here's my writeup: https://bobbyhillreverseengineering.blogspot.com/2025/11/crackme-bobxs-very-hard-antidebug-10.html Thank you for the challenge. | 4:15 PM 11/08/2025 | ==> |
| On 10/16/2025, I tweeted at him on X and he added the section to redeem the book with the promo code. I was able to place the order but I have yet to receive the book or any updates regarding it. I sent him a DM on 11/02/2025 to ask about the book but he has not responded. As of today, the link to redeem the book via promo code now responds with an error message. I have sent him a follow-up DM today(11/07/2025) to let him know about the error page. If I ever receive the book or a response, I'll add another comment but as of now, it isn't looking too good. | 11:20 PM 11/07/2025 | ==> |
| Thank you for the challenge. If you want to make it more challenging, obfuscate your function/variable names or strip symbols completely. Other than that, I appreciate you taking the time to write this, especially in assembly! Kudos. Here is my writeup: https://bobbyhillreverseengineering.blogspot.com/2025/10/crackme-fentcats-assembler-crackme.html | 7:06 PM 10/27/2025 | ==> |
| Thank you for the challenge. Here is my writeup: https://bobbyhillreverseengineering.blogspot.com/2025/10/keygenme-duckzzys-keygenme.html Shout out to British_UK | 7:59 PM 10/26/2025 | ==> |
| Woot woot, I think I got it! I normally write blog posts but as there is a reward involved, I obviously won't be doing that this time around! Thank you for the challenge Ryan! | 9:57 PM 10/14/2025 | ==> |
| I verified with keys of various length and determined that my previous comment is indeed the correct flag. (I hope) Here's my writeup. https://bobbyhillreverseengineering.blogspot.com/2025/10/crackme-antilagvips-medium-crackme.html | 9:09 PM 10/10/2025 | ==> |
| What is JXDS6KRGLZ4EMRBZ564QZMJX5GDYFZHAMRR? | 8:13 PM 10/10/2025 | ==> |
| Did you mean to upload a debug build? | 4:16 AM 10/08/2025 | ==> |
| Thank you for the challenge. Here's my writeup: https://bobbyhillreverseengineering.blogspot.com/2025/10/crackme-gits-simple-crackme-medium-hard.html | 9:40 PM 10/07/2025 | ==> |
| Glad I wasn't the only one who thought the way arguments were being passed was strange. @iwannabecoder, open a command prompt and navigate to the directory you're storing the crackme in. Then execute the program using the command prompt. cd /Downloads crackme.exe When your password is incorrect, you will not see any output. Here's my writeup: https://bobbyhillreverseengineering.blogspot.com/2025/10/rodrigoteixeiras-very-easy-disassembly.html | 3:42 AM 10/06/2025 | ==> |
| Dang, everyone has done a fantastic job of breaking down the key generation algorithm. I was thinking of working on a keygen today but it looks like it's already been taken care of. Any who, I took a similar approach to patching the program. Here's my writeup: https://bobbyhillreverseengineering.blogspot.com/2025/10/patchme-genass3s-patch-protect-lite.html Thank you genass3 for the challenge! | 5:59 PM 10/05/2025 | ==> |
| My first blogpost was a writeup on this crackme: https://bobbyhillreverseengineering.blogspot.com/2025/10/meists-passfind-crackme.html | 9:01 PM 10/03/2025 | ==> |
| Here is my writeup on this crackme: https://bobbyhillreverseengineering.blogspot.com/2025/10/crackme-genass3s-patch-protect.html Thank you genass3 for the challenge. I left a little note at the end for you. You may have already implemented those suggestions in your V2. | 8:20 PM 10/03/2025 | ==> |
| Here's my writeup: https://bobbyhillreverseengineering.blogspot.com/2025/10/atherustis-first-c-program.html | 6:44 AM 10/03/2025 | ==> |
| I enjoyed it. Here's a blog I wrote on it: https://bobbyhillreverseengineering.blogspot.com/2025/10/lags-crack-me-test.html | 10:04 PM 10/02/2025 | ==> |
| I was able to grab a copy of the missing DLLs from dll-files.com and dllme.com. I was missing 3 of them in total. Make sure that you grab the x64! I can confirm that the password is indeed "Free_Palestine!" | 3:00 AM 08/12/2024 | ==> |
| D3DX9 is required to complete this crackme. I was able to download the runtime from here: https://www.microsoft.com/en-us/download/details.aspx?id=8109 | 1:40 AM 08/12/2024 | ==> |