| Hana's CrackME |
They should make more crackmes like this... Because it really encourages static analysis experience...
Good crackme |
2025-10-08 22:57 |
| Toxic CrackMe |
Pass: TheMagicEmpireMayBegin
A great cracking... It took me a few hours, but I really enjoyed it. |
2025-10-07 20:31 |
| Interpreter |
Password: kwenmafirsttest
Good crack! |
2025-10-05 00:40 |
| MISSION IMPOSSIBLE |
I changed JE in "00007FF7B744156E" to "JNZ" and compared cmp eax, ecx...
ECX contains the password characters...
At 00007FF7B744153C, the password comparison loop starts. |
2025-10-04 17:09 |
| Hyperion |
Very easy |
2024-10-21 22:37 |
| my first crackme |
Excellent Crackme! I broke down each function hand by hand until I found the exact checking part, and understood that to reach "Access Granted", the two blocks of memory compared in "memcmp" must be equal for EAX = 0 and the "test" instruction be valid , skipping the "jne" instruction |
2024-10-13 18:14 |
| Threaded Deception | Level 1 |
Finally, be able to finish the challenge. Interesting challenge!! |
2024-09-21 02:41 |
| Threaded Deception | Level 1 |
Managed to get the string "3Z___R3V3RU3", but something is still missing... Any light? |
2024-09-15 21:58 |