Number of crackmes:
Number of writeups:
Comments:
| Name | Author | Language | Arch | Difficulty | Quality | Platform | Date | Downloads | Writeups | Comments |
|---|---|---|---|---|---|---|---|---|---|---|
| without fantasy | sporta778 | C/C++ | x86-64 | 3.6 | 5.0 | Windows | 2025-01-18 14:56 | 25 | 0 | 10 |
| Bobby | sporta778 | C/C++ | x86-64 | 2.5 | 5.3 | Windows | 2024-03-06 10:52 | 29 | 1 | 21 |
| Crackme | Date | Infos |
|---|---|---|
| The Juggler (Rust + C + asm) | 2024-09-26 15:52 | solution |
| Virtualization (20 kb crackme) | 2024-09-24 15:06 | solution |
| simple vm | 2024-07-11 16:08 | solution |
| CrackMeBaby By Igr0t | 2024-07-02 12:22 | solution |
| VENIX_VM | 2024-06-13 16:03 | solution and devirtualizer. |
| Fort Knox | 2024-05-13 14:59 | Solution for Fort Knox crackme |
| Obfuscation of C (7 kb crackme) | 2024-05-03 10:57 | Solution |
| VM_Madness | 2024-04-25 13:14 | Solution for VM_Madness |
| VMAdventures 2 | 2024-04-19 10:02 | Solution for VMAdventures 2 |
| Easy Password Reverse 2 | 2024-02-14 14:57 | Easy Password Reverse 2 by Clyax |
| pavler4VM | 2024-01-27 11:14 | solution for pavler4VM |
| virtual.1 (Win) | 2024-01-18 08:49 | Just soultion for virtual.1 crackme. |
| aname crackme | 2023-12-20 15:44 | Solution for crackme aname. |
| messy crackme | 2023-12-19 15:40 | Solution for messy crackme by aname |
| Crackme | Comment | Date |
|---|---|---|
| without fantasy | ehhh, i am stupid, here a lot passwords... this is not that i wanted((( | 2025-01-31 21:33 |
| easy crackme | u can make .bat file with 0x103b arguments and it will type yes, | 2025-01-26 01:17 |
| easy crackme | Need some intellectual person, how xor 0x38 0x19 to receive in eaz 0xa | 2025-01-25 20:11 |
| without fantasy | maybe this is bad tip , but that :"Password is too long". | 2025-01-23 21:00 |
| VM challenge lol | survivalizeed, and again if you a look at these crackmes with VM, they have common thing, like a cycle of dispatch command. This is look like to reasearch bicycle , but i think it can be real made yourself "universal" devirtualizer. "universal" becouse he will be specified for crackmes, and again becouse these crackme have enough easy and similar to each other strucutre. And againg they have own cycle,RAM,ROM. It just look like fantasy but nevertheless. | 2024-09-30 12:54 |
| The Juggler (Rust + C + asm) | I writed solution, this state is waiting approval. Will look, will be it approved or not. | 2024-09-29 18:54 |
| VM challenge lol | again hardcore)))) | 2024-09-27 16:31 |
| The Juggler (Rust + C + asm) | Hehe i found password, more precisely place where occur comparing with password, but now this crackme work under debugger... What is going on. I remebmer this application freezes under debugger, strange....Maybe i do not understand something. BTW i found method of printing to console;) | 2024-09-26 12:26 |
| Virtualization (20 kb crackme) | Ничего там нет путанного, и никакой не путанный код. На оценку 6.0 это конечно не тянет. I will write solution | 2024-09-24 12:32 |
| Virtualization (20 kb crackme) | даю подсказку , длина пароля 6. | 2024-09-24 10:56 |
| Virtualization (20 kb crackme) | задом наперед от исходной проверки, где выбирается правильный ли пароль или нет. | 2024-09-19 08:16 |
| Virtualization (20 kb crackme) | ну потому что программа каждый раз распаковывается | 2024-09-18 09:20 |
| Virtualization (20 kb crackme) | о русские...;) | 2024-08-30 15:48 |
| Obfuscation of C (7 kb crackme) | by the way, my solution posted;) | 2024-07-17 21:37 |
| Simple Stack VM Challenge | Platform for this crackme windows. you need not have linux. | 2024-07-15 19:08 |
| Bobby | Rules of this site offer that you do not should patch program. | 2024-07-12 16:34 |
| simple vm | enough easy | 2024-07-11 14:35 |
| Simple Stack VM Challenge | ahh , it is correct in my home computer it is work correct, maybe it is have some problem with windows defender | 2024-07-10 00:18 |
| x64 Crackme (Encrypted Strings) | again just memcmp... | 2024-07-09 13:16 |
| Simple Stack VM Challenge | Are you sure* | 2024-07-09 11:07 |
| Simple Stack VM Challenge | You are sure that this crackme is work? Just this is terminate yourself... | 2024-07-09 11:06 |
| CrackMeBaby By Igr0t | yes, nice picture.. | 2024-07-06 08:41 |
| My first crackme made in Rust | difficulty look like 1.0 | 2024-07-02 15:17 |
| CrackMeBaby By Igr0t | *uploaded. | 2024-07-02 12:24 |
| CrackMeBaby By Igr0t | I do not know , Kaspersy do not find any. I upload solution. | 2024-07-02 12:23 |
| VENIX_VM | About difficulty, here no presents score 0.5... | 2024-06-13 16:06 |
| VENIX_VM | i upload now solution. | 2024-06-13 16:02 |
| VM_Madness2 | i will better write some more easey solution, i sawed here presents inside more calls later survilized...))) but structurce same)) | 2024-06-11 22:56 |
| VM_Madness2 | i have some ambitions, but look like this is do not according to some things | 2024-05-23 22:27 |
| VM_Madness2 | sorry survivalizeed , here present crackme he threw me off track, these cool guys said cool things on forums... | 2024-05-23 21:32 |
| The Juggler (Rust + C + asm) | I'll think about it. Here need some intellectual person;) This strange thing , when i set breakpoint to AddVectoredExceptionHandler and restart crackme, aplication just flash at EntryPoint and terminated. And yet here present some TLS code, but this seems this is not accroding to things writed in articles... | 2024-05-21 19:26 |
| The Juggler (Rust + C + asm) | ehh sorry i am confused, here system dll | 2024-05-18 14:27 |
| The Juggler (Rust + C + asm) | mov eax,dword ptr ds:[r13+50] and again r13 = gs:[60] , checking second bit. Here some specific knowledge. | | 2024-05-18 14:20 |
| The Juggler (Rust + C + asm) | test dword ptr ds:[r13+BC],800000 what is it? r13 = gs:[60], in article writed (pNtGlobalFlag & 0x70)(peb+0xbc) for detecting debugger. | 2024-05-18 14:11 |
| The Juggler (Rust + C + asm) | gs:[60] it is can be readead in articles, but what is it gs:[30] ? | 2024-05-17 22:09 |
| The Juggler (Rust + C + asm) | it is have some VEH , and also i have seen gs:[30] , i learned PEB , but what is this i do not know, here need some learn articles.... | 2024-05-17 20:34 |
| The Juggler (Rust + C + asm) | sorry begin codes of function... | 2024-05-17 16:28 |
| The Juggler (Rust + C + asm) | UAWAVAUA | 2024-05-17 16:24 |
| The Juggler (Rust + C + asm) | this is address of function ;)) | 2024-05-17 16:24 |
| Obfuscation of C (7 kb crackme) | show off on flat place...;)) | 2024-05-16 22:40 |
| VM_Madness2 | if possible? I am already scared... | 2024-05-14 20:41 |
| The Juggler (Rust + C + asm) | i do not know, but definitely this crackme do not like debugger... | 2024-05-14 10:05 |
| Obfuscation of C (7 kb crackme) | and it was 3 may... do not angry to me.... | 2024-05-10 21:52 |
| VM_Madness | ok. | 2024-05-09 18:43 |
| Obfuscation of C (7 kb crackme) | i send solution... | 2024-05-09 18:42 |
| Fort Knox | what are you drink or smoke for come up with this algorithm of coding....;) | 2024-05-09 10:41 |
| VM_Madness | do not hurry and do not worry. if really I'm not experienced in these things. I am even can not work with ida ... etc . Only debugger. I think here a lot cool peoples, but they in silence mode. | 2024-05-09 00:50 |
| VM_Madness | ;) | 2024-05-08 23:52 |
| VM_Madness | it is no question where, just when i was young it was interested things like 0 ring, winapi , sockets... but just no place to do with it something.... it was more 20 years ago... just have free time to make these things.. | 2024-05-08 21:12 |
| Obfuscation of C (7 kb crackme) | maybe here trojan ;) if author trying to hide something... | 2024-05-08 19:35 |
| VM_Madness | i am odrinary man, from the world by thread.. | 2024-05-08 16:52 |
| VM_Madness | lets go..;) | 2024-05-08 14:30 |
| VM_Madness | thanks | 2024-05-07 18:58 |
| Algocrack Me | it difficulity look like equla to 1.0 | 2024-05-07 15:54 |
| Obfuscation of C (11 kb crackme) | obfus.h_ | 2024-05-07 15:33 |
| Obfuscation of C (7 kb crackme) | see it in debugger, it enough straight forward assembler code... in crackme 11 kb more strange calls. | 2024-05-05 20:41 |
| Obfuscation of C (11 kb crackme) | it is not question in time, it is straight forward crackme... here no things to surprise... | 2024-05-03 22:11 |
| Obfuscation of C (11 kb crackme) | In my opinion, manually unpack this is receive working .exe file. Maybe i do not understand something? | 2024-05-03 14:10 |
| Obfuscation of C (11 kb crackme) | "good luck? ;)" important words for this crackme, going throught code and finding important comparing. Maybe here can be writed interest solution? Maybe... | 2024-05-03 14:01 |
| Obfuscation of C (11 kb crackme) | khmmm, i do not understand, program unpacking yourself... And why so high score of crackme? instills fear..... | 2024-05-03 13:41 |
| Obfuscation of C (7 kb crackme) | I send solution... | 2024-05-03 10:57 |
| Obfuscation of C (7 kb crackme) | your* | 2024-05-03 09:24 |
| Obfuscation of C (7 kb crackme) | This difficulity do not accroding presents. I think it difficulity 1.5. What can do you UPX-Patcher, or even just UPX packer, if program just unpacking yourself. Where obfuscation? I do not see it. I will write solution. | 2024-05-03 09:10 |
| VM_Madness | if they approval approval , go next | 2024-04-28 20:43 |
| 0xbabe | CrackMe #2 | I send solution, i am too I'm in a hurry. Here present uniformity with VM | 2024-04-27 21:10 |
| VM_Madness | ANY-K$Y $ any symbol , and you can add any string to it, i writed solution, and i send it on site... | 2024-04-25 20:43 |
| VM_Madness | sorry no needed , i found it... | 2024-04-24 14:17 |
| VM_Madness | Hehe... here some secret. Rbx after calling functions of core VM do not changed , but after first call of it function it loaded by zero from eax, in which saved memory0 (but memory0 loaded in first function by zero).Memory0 = qword [rcx] (rcx loaded at input of core function). | 2024-04-24 13:56 |
| VM_Madness | I understand you, but if you will see at this https://crackmes.one/crackme/65f1f892cddae72ae250b57e, i interpret this crackme as microcomputer becouse it microcomputer have RAM (random access memory) and RAM2. I think it no problem call it virtual machine , but for me it is too loudly. This is just my cockroaches. | 2024-04-23 22:22 |
| VM_Madness | okay if it will hard i will ask... | 2024-04-23 21:33 |
| VM_Madness | no no i think i do not ask , i already process first function, and i now started learn second call this function of proccessing codes of microcomputer. i think i can find password and write disassembler. Just ANY- i found. But i think it loudly said that this devirtualizer. I call it disassembler. But maybe i do not understand some abstraction. | 2024-04-23 21:32 |
| VM_Madness | It loudly said VM, i call it microcomputer. i was surprised, but codes changed after restarting application... | 2024-04-23 20:41 |
| aname crackme | goal: find password ... | 2024-04-19 22:46 |
| aname crackme | sixpek try to it https://crackmes.one/crackme/661daf77cddae72ae250c836 | 2024-04-19 22:44 |
| VMAdventures 2 | nice , i am writing solution. i was surprised some things.. | 2024-04-17 20:36 |
| VM_Madness | some activation microcomputer writer's.... | 2024-04-16 09:58 |
| VMAdventures 2 | sorry , disassembler | 2024-04-09 20:09 |
| VMAdventures 2 | nice place to write debugger....)))) | 2024-04-09 20:09 |
| CFFlat | @justAuser if understand correctly, you just need use cmd.exe. console application. | 2024-03-20 10:17 |
| Easy Password Reverse 3 | ehhhh sorry , i thinked Ghidra it is super secret algorithm, it is just disassembler... it hard to me speculative analyze code.... just debugger.... | 2024-03-19 18:24 |
| Bobby | it cool , i found one yet article where crackme solved with this angr. it enough hard to realize it.... | 2024-03-19 15:44 |
| Bobby | looking at you, I'm freaking out. | 2024-03-17 22:12 |
| Bobby | by the way name Bobby it is just from my fantasy. | 2024-03-17 09:18 |
| Bobby | cnathansmith i think i have low IQ to understand this humor, maybe i do not understand some context. | 2024-03-17 09:16 |
| Bobby | ? | 2024-03-16 22:02 |
| Bobby | Now Bobby glad;)) | 2024-03-15 08:39 |
| simple password crack me (not simple) | you are ambitious, urine them;)) | 2024-03-08 21:17 |
| Bobby | do not offend my Bobby!;)) | 2024-03-08 09:43 |
| Easy Password Reverse 3 | it's strange how in two applications random can give some subsequence identical numbers??? | 2024-03-04 12:30 |
| Easy Password Reverse 3 | *myself | 2024-02-29 22:23 |
| Easy Password Reverse 3 | maybe i do not understand but how you can transofmate this code in just random%62. | 2024-02-29 21:03 |
| Easy Password Reverse 3 | 62 look like %0x3e | 2024-02-29 20:49 |
| Easy Password Reverse 3 | i give up , i can just it make in yourself program but i do not understand physical meaning: call add rbp,1 mov edx,eax cdqe imul rax,rax,FFFFFFFF84210843 mov ecx,edx sar ecx,1F shr rax,20 add eax,edx sar eax,5 sub eax,ecx imul eax,eax,3E sub edx,eax movsxd rdx,edx movzx eax,byte ptr ss:[rsp+rdx+20] mov byte ptr ss:[rbp-1],al cmp rbp,rbx jne untitled1.7FF710F315E0 how it can be some %62 ? i do not understand | 2024-02-29 20:48 |
| Easy Password Reverse 3 | One second enough time to run in 2 cmd windows's 2 application's : crackme and keygen, and the will have same time received by the _time64(<ime). | 2024-02-29 12:53 |
| Easy Password Reverse 3 | p.p.s and yet , one second for microprocessor this is how one year for us:))) | 2024-02-28 20:36 |
| Easy Password Reverse 3 | p.s. do not swear to me , i am figuratively know that is time attack:)) | 2024-02-28 20:27 |
| Easy Password Reverse 3 | In really i think it big word that this timing attack. _time64 return time with resoultion 1 second. I think here can be maded stay along application and it will can give several result's in which we can find true password. | 2024-02-28 20:16 |
| Easy Password Reverse 3 | Nice cnathansmith. | 2024-02-28 15:39 |
| Easy Password Reverse 2 | Mahesh, look like some social engineering?)) | 2024-02-16 19:51 |
| Easy Password Reverse 2 | Just in debugger press f9 3 times, and u will located at EntryPoint of application. | 2024-02-13 12:59 |
| Easy Password Reverse 2 | here just some manipulation with username | 2024-02-11 19:00 |
| Easy Password Reverse 2 | later this is assembler, what about u talking, just u need think. just use debugger, here no hard thing , later. What about talking, what is class. Just using username, i think i can solve it | 2024-02-11 18:58 |
| pavler4VM | this is not show off)) | 2024-01-26 19:16 |
| pavler4VM | this is not according to overview. especially difficulty level. Later... | 2024-01-26 18:03 |
| Simple Crackme | hehe olives8 contains in offset 0x250 in file... | 2024-01-23 15:11 |
| Simple Crackme | it can be solved with debugger?)) | 2024-01-19 08:20 |
| virtual.1 (Win) | CRACKMES.ONE | 2024-01-16 15:30 |
| im crackme | i do not want say anythink about u bad , but u Bkav Pro W64.AIDetectMalware Google Detected Ikarus Trojan.Win64.Spy MaxSecure Trojan.Malware.300983.susgen Hmmm why here do not present kaspersky ? they hate russians?. by the way i am from Russia... OK ok if u know better i do not will argue with u. just toxik comment.... | 2024-01-05 20:02 |
| im crackme | microsoft defender detec this as trojan... | 2023-12-25 12:26 |
| find_serial_key | this is trojan. | 2023-12-25 11:40 |
| forth | Enter password: 232123456789012345678901234 Correct | 2023-12-25 11:30 |
| forth | Enter password: 113456789012345678901234567 Correct | 2023-12-25 11:30 |
| forth | i think it difficulty 1. | 2023-12-25 11:28 |
| Simple Crackme | he will take this person on work:) | 2023-12-21 15:04 |
| messy crackme | ok)) | 2023-12-14 19:36 |
| messy crackme | I do not know an aproach to this crackme, but u finaly kill my motivation... | 2023-12-14 12:01 |
| basik | crackmes.one. pizza= password for crackme | 2023-12-12 16:00 |
| basik | password "pizza". Just staright strcmp with string in command line. | 2023-12-11 20:26 |
| 0xbabe | CrackMe #2 | mistake offset is 0x448 | 2023-12-11 16:04 |
| 0xbabe | CrackMe #2 | it's easy in offset of file u need 0x449 patch byte to 0xc4 and programm will always show good password, but i do not understand what is correct password.. i do not understand how it compare to correct password.... | 2023-12-11 15:42 |
| 0xbabe | CrackMe #2 | solution in studio! | 2023-12-11 11:57 |
| simple crackme | i do not devle into, but username: miah, password: bigballs666. debuger can hide from your antidebugging..... just condition do not work from isdebuggerpresent()..... | 2023-11-30 16:17 |
| aname crackme | im_your_password_140714 Thanks , i like it. Just remebmer childhood when programmers on zx spectrum, make a lot xor, for defense programm.... | 2023-11-30 12:18 |
| lua crackme | load_pw do not work... strange... | 2023-11-27 18:55 |
| lua crackme | print(PASSWORD()) = //.A?%V} and random symbol. Any tips. We can modify lua script, but i do not understand... | 2023-11-27 16:35 |
| crackme0 | this is just place where dividing must be integer number. Just even sum code of letters (eg 0x41 - 0x37, 0x42-0x37, 0x43-0x37, 0x44-0x37) must be equal to odd sum code of letters ( 0x41&0xf, 0x42&0xf,0x43&0xf, 0x44&0xf) | 2023-11-21 18:55 |
| crackme0 | OAMBICID | 2023-11-21 15:59 |
| crackme0 | IAKAEAOA | 2023-11-21 15:41 |
| crackme0 | oops just 8 A. AAAAAAAA | 2023-11-21 11:10 |
| crackme0 | AAAAAAAAA | 2023-11-21 11:10 |
| XOR crackmes | )))) i do not know... how? | 2023-11-08 19:27 |
| XOR crackmes | maybe username maybe solve this task..... | 2023-11-08 19:26 |
| ROT13 crackme | what a algorithm here, it cmp just with constant. | 2023-11-08 12:33 |
| ROT13 crackme | 5418. just stray cmp with constant | 2023-11-08 12:30 |
| my_second_crackme | 01236ABCMabcs ... a lot password's.... | 2023-11-08 07:59 |
| my_second_crackme | for example 095ABCMabcs | 2023-11-08 07:55 |
| EasyCrackMe:) | 12345 | 2023-11-03 16:27 |
| snowball | virus!! | 2023-11-03 16:01 |
| My first | B. | 2023-11-03 15:50 |
| easy crack me Pusik | admin666 and byPupsik just constant. | 2023-11-03 15:20 |
| Christmas Crackme | strange it's deteckted as virus | 2023-11-03 11:02 |
| Christmas Crackme | sorry | 2023-11-02 21:05 |
| Christmas Crackme | TROJAN????????? | 2023-11-02 20:58 |
| Christmas Crackme | THIS IS JUST TROJAN,,?????????? | 2023-11-02 20:57 |
| Сipher | or u need write codes which writeing in memory, in the disasembler code u will find a lot mov [mem1],0xc0, 0xc1, 0xc2 etc.... | 2023-11-02 20:44 |
| Сipher | u need write a message in russian... | 2023-11-02 20:36 |
| Сipher | just if u use english , this is not shift a message by the way... | 2023-11-02 20:36 |
| Сipher | this is just clue, in the overview :"be careful with language". | 2023-11-02 19:23 |
| Сipher | this is just method coding message. On my computer this is russian text. This is just shift all symbol in message by shift that you write in second input. First input= message, second input= shift. E.G. ABC= first input =message , second input = 1 =shift, so coding message = BCD. i think its just russian crackme. Here no things to find, this strange const= 0xB60B60B7 and imul, and sar by 0x5, and sar by 0x1f very strange...... | 2023-11-02 19:11 |
| Сipher | crackmes.one | 2023-11-02 16:43 |