Number of crackmes:
Number of writeups:
Comments:
| Name | Author | Language | Arch | Difficulty | Quality | Platform | Date | Downloads | Writeups | Comments |
|---|
| Crackme | Date | Infos |
|---|---|---|
| RecursiveBC (Java) | 2025-09-27 20:45 |
| Crackme | Comment | Date |
|---|---|---|
| Java KeyFind V2 CrackMe | Are you uploading the same task for everyone?)) | 2025-10-31 12:30 |
| SianVM KeyFind | lolw-sian-jar | 2025-10-31 10:49 |
| Java KeyFind Crackme | it-looks-so-dumb | 2025-10-28 15:34 |
| Impossible PatchingMe | Located comparison at 0x1400bd566 (cmp byte ptr [rbp-0x64], 0) followed by a conditional jump to the failure handler and replaced the conditional je instruction with two nop bytes (0x90 0x90) at file offset 0x00000000000BC5EA (772458) to disable the failure branch. Thank you for task | 2025-10-03 10:45 |
| try to debug | Hmm, it took 20 minutes... - h3110f413nD_9L@9Jl!s*jG IT allocates an execute-enabled stub at runtime (0x140004dcc) and decrypts 0x17 bytes from .rdata (0x1400100b0) using a byte wise XOR derived from the constants 0xDEADBEEFCAFEBABE and 0x1337BABE12345678. The resulting buffer is compared via the imported memcmp thunk (0x140009280) against the user-supplied wide string, so the decrypted ASCII text is the exact key accepted by the program Thank you for your work | 2025-09-30 09:56 |
| Dry Tau Mac KeygenMe One | trendcrusher 596E-A989-6FB0-548E | 2025-09-27 22:03 |
| Dry Tau Mac KeygenMe One | Thank you it's a good task Dry Tau 07D3-A4D8-73D8-B2A0 Very fun | 2025-09-27 22:00 |
| RecursiveBC (Java) | Yeah a couple of the VM semantics did trip me up - the bogus flag updates on some ALU ops and a quirky byte order on loads made my first emulator wrong. I fixed it by difftesting tiny bytecode snippets against the real VM until every opcode matched. After that the hash collapsed to a small round function, and I did a constrained search over printable bytes not blind brute force. Nice touch with the misleading dispatch and opaque predicates, that kept it fun | 2025-09-27 21:45 |
| RecursiveBC (Java) | Not brute forcing. I extracted and emulated your hidden VM from the JAR, verified its 32-bit instruction semantics, and only then ran a tiny constrained search over printable chars to satisfy the final 0x6A3B7FF5 check. | 2025-09-27 21:25 |
| RecursiveBC (Java) | Thank you... I spent three hours working on the task, it was interesting. I learned a lot for myself. Password: nscSK1fV | 2025-09-27 20:05 |
| ScaledSnake (Python) | Wow nice, wait new version. Thanks for your work | 2025-09-26 21:50 |
| ScaledSnake (Python) | }la | 2025-09-26 20:31 |
| ScaledSnake (Python) | thanks)Its easy. GJ | 2025-09-26 17:46 |
| First C program | I love this fruit) | 2025-09-17 23:14 |
| crack me test | Gh0st_Hunt... You know next) | 2025-09-17 23:01 |
| Hacker's Edge Book CrackMe v3 | xxoslayo, no it's not correct | 2025-09-13 12:30 |
| Hacker's Edge Book CrackMe v3 | Thanks) | 2025-09-11 15:07 |
| Runtime (Windows) (x64) | It's not certain that there is anything, but just in case) Need to check carefully. | 2025-09-10 09:46 |
| Runtime (Windows) (x64) | 27/72 security vendors flagged this file as malicious | 2025-09-10 09:43 |
| passfind | Thanks | 2025-09-08 09:55 |
| Find the serial key 2 | Serial - -AZAAfAAAAA1AAAxA-AA | 2025-09-07 09:26 |
| Hacker's Edge Book CrackMe v2 | Ok sorry for early spoiler. Thanks for your task😊 | 2025-09-07 06:56 |
| Helium | Very nice, thanks... helium-crackme.exe Welcome to Helium. Access granted, welcome to the system! solved the problem in an hour) license.bin (Zstd+MessagePack) builds a small neural network and checks 9 fixed inputs (seeds). The output is 32 bits; after thresholding ( 0.5) it must match T(S) = (ROL32(S, 5) * (ROL32(S, 5) ^ 0xDEDBEEF) + 4919) & 0xFFFFFFFF | 2025-09-06 23:00 |
| WeeperVM -- Level 2 | hmm... Its correct or no - Trac{SXgM7Sa{3X5a9wnvm{lSDakcfewsccy3d{WCVoASS{pCS31gsg3{ag3kTCSl6cN2CXqpskVv9_mK2iGrvg33qM0kpCh{rLceKf3b} | 2025-09-06 21:15 |
| Patch protect v2 | And corect password without patch - Key:))*;'.(* Applicatin finished. Thank you for this) | 2025-09-06 19:51 |
| Patch protect v2 | Thank you)Patch working well. Starting application with PatchCRC protection CRC Monitoring Thread Started Key:dfr54435435 - not real) Applicatin finished. | 2025-09-06 19:46 |
| KeygenMe | Username: 41Le1yID!uFbAxC Password: a0bahTbblPba0Bb Correct! Access Granted. Thanks, but so easy) | 2025-09-06 19:07 |
| Easy Crackme (obfuscated password) | TotallyNotThePassword | 2025-09-05 20:09 |
| Non-cryptographically secure hash (my first crackme!) | c{oOwc | 2025-09-05 15:15 |