| Easiest |
took me around 8 mins, but found the solution. People should stop sharing answers here in the comments to be honest.
Thank you for your attention to this matter. |
2025-11-21 17:29 |
| crack the points |
literally hardcoded the 0 in your 'aYourCountPoint'. Patching that works! |
2025-11-21 17:15 |
| f-crackme |
1) username len greater than 8
2) username len smaller than 8 and greater than 1 |
2022-03-01 05:07 |
| f-crackme |
two conditions to get correct password:
1) username len 8, then password is "Mr."+username
2) username len 1 then password is username+"@fsociety" |
2022-03-01 05:06 |
| flag_eater_crackme KeyGen |
the strings are not in english 🙄 |
2022-03-01 03:07 |
| MY FIRT CRACKME |
Just have to find the logic in the decompiled code, then it's easy. idk why people are sharing answers in comments ughh. |
2022-02-28 05:54 |
| thanos vault |
ok, I just copied the wrong base64, that's why I didn't get the password. Now everything okay. |
2022-02-28 04:36 |
| thanos vault |
why is there a powershell script encoded in base64 string inside an executable written in C# ? xD
Found the flag, but is the password in base64 wrong ? Because it didn't work for me. |
2022-02-28 04:15 |
| Easy CrackMe - Creeper215 |
for everyone who can't unzip the zip file .
The password for the zip file is : crackmes.one
Btw this is very easy, no need for key gen, patch is ez.
just change jn to jnz after cmp instruction lol |
2022-02-27 16:50 |
| Crackme -.NET |
took you 5 mins to make.
took me 5 mins to get username and password.
I initially used dotPeek, all I got was some bmp images lol, then loaded up in IDA and found the values. |
2022-02-27 16:17 |
| Mexican |
Can we patch ? |
2022-02-27 11:51 |
| crackme |
19082004
It was in hex , so need to convert to base 10 then try to enter the password. |
2022-02-27 06:59 |
| easy_reverse |
An easy crackme for people who are getting into reverse engineering newly like me. |
2022-02-27 06:19 |