| As ilkiNUR stated, the correct password is in plaintext which made trying to circumvent the anti-debugging checks unnecessary.
Here's my writeup: https://bobbyhillreverseengineering.blogspot.com/2025/11/crackme-bobxs-very-hard-antidebug-10.html
Thank you for the challenge. |
==> |
| On 10/16/2025, I tweeted at him on X and he added the section to redeem the book with the promo code. I was able to place the order but I have yet to receive the book or any updates regarding it. I sent him a DM on 11/02/2025 to ask about the book but he has not responded. As of today, the link to redeem the book via promo code now responds with an error message. I have sent him a follow-up DM today(11/07/2025) to let him know about the error page. If I ever receive the book or a response, I'll add another comment but as of now, it isn't looking too good. |
==> |
| Thank you for the challenge. If you want to make it more challenging, obfuscate your function/variable names or strip symbols completely. Other than that, I appreciate you taking the time to write this, especially in assembly! Kudos.
Here is my writeup: https://bobbyhillreverseengineering.blogspot.com/2025/10/crackme-fentcats-assembler-crackme.html |
==> |
| Thank you for the challenge.
Here is my writeup: https://bobbyhillreverseengineering.blogspot.com/2025/10/keygenme-duckzzys-keygenme.html
Shout out to British_UK |
==> |
| Woot woot, I think I got it! I normally write blog posts but as there is a reward involved, I obviously won't be doing that this time around! Thank you for the challenge Ryan! |
==> |
| I verified with keys of various length and determined that my previous comment is indeed the correct flag. (I hope)
Here's my writeup.
https://bobbyhillreverseengineering.blogspot.com/2025/10/crackme-antilagvips-medium-crackme.html |
==> |
| What is JXDS6KRGLZ4EMRBZ564QZMJX5GDYFZHAMRR? |
==> |
| Did you mean to upload a debug build? |
==> |
| Thank you for the challenge.
Here's my writeup: https://bobbyhillreverseengineering.blogspot.com/2025/10/crackme-gits-simple-crackme-medium-hard.html |
==> |
| Glad I wasn't the only one who thought the way arguments were being passed was strange.
@iwannabecoder, open a command prompt and navigate to the directory you're storing the crackme in. Then execute the program using the command prompt.
cd /Downloads
crackme.exe
When your password is incorrect, you will not see any output.
Here's my writeup: https://bobbyhillreverseengineering.blogspot.com/2025/10/rodrigoteixeiras-very-easy-disassembly.html |
==> |
| Dang, everyone has done a fantastic job of breaking down the key generation algorithm. I was thinking of working on a keygen today but it looks like it's already been taken care of.
Any who, I took a similar approach to patching the program. Here's my writeup: https://bobbyhillreverseengineering.blogspot.com/2025/10/patchme-genass3s-patch-protect-lite.html
Thank you genass3 for the challenge! |
==> |
| My first blogpost was a writeup on this crackme: https://bobbyhillreverseengineering.blogspot.com/2025/10/meists-passfind-crackme.html |
==> |
| Here is my writeup on this crackme: https://bobbyhillreverseengineering.blogspot.com/2025/10/crackme-genass3s-patch-protect.html
Thank you genass3 for the challenge. I left a little note at the end for you. You may have already implemented those suggestions in your V2. |
==> |
| Here's my writeup: https://bobbyhillreverseengineering.blogspot.com/2025/10/atherustis-first-c-program.html |
==> |
| I enjoyed it.
Here's a blog I wrote on it: https://bobbyhillreverseengineering.blogspot.com/2025/10/lags-crack-me-test.html |
==> |
| I was able to grab a copy of the missing DLLs from dll-files.com and dllme.com. I was missing 3 of them in total. Make sure that you grab the x64!
I can confirm that the password is indeed "Free_Palestine!"
|
==> |
| D3DX9 is required to complete this crackme. I was able to download the runtime from here: https://www.microsoft.com/en-us/download/details.aspx?id=8109 |
==> |