An archive of crackmes I've solved!
From Wikipedia:
A crackme is a small program designed to test a programmer's reverse engineering skills. They are programmed by other reversers as a legal way to crack software, since no intellectual property is being infringed upon.
| date solved mm/dd/yyyy | crackme name and link | coded in: | software used | brief steps | solution |
|---|---|---|---|---|---|
| 02/25/2024 | MountainMan's Challenge #1 | C/C++ | ![]() |
hardcoded solution in statement | ThatWasEasy! |
| 02/25/2024 | M4st4rCr4ck's H1dd4n Fl4g | C/C++ | ![]() |
happened to find the function that prints the flag message, but not a way to actually trigger it | [+] FLAG{B3ST_R3V3RS3R} |
| 02/25/2024 | Nalxe's Christmas CrackMe | C/C++ | ![]() |
converted 0xee4 to dec | 3812 |
| 12/28/2022 | CrackMe #2 - register me in your name | C/C++ | ![]() |
noticed that that the program was trying to read data from a text file named "keyfile" | created a text file named "keyfile" on the same folder as the .exe was running. the registered name must be written in it. |
| 12/28/2022 | CrackMe1 | C/C++ | ![]() |
backtracked from the wrong serial messagebox. | CTF{9110-2324-0502-2034-3454} |
| 12/28/2022 | StupidCrackMe | C/C++ | & ![]() |
strcmp function comparing user input to global string in main. | LiL2281337 |
| 12/20/2022 | rootAhmed | .NET | ![]() |
On the Listing window, the u"JSX#SZ@!F&8@Cc%h3@!" line can be easily located at the end of the assembly user imput check. | JSX#SZ@!F&8@Cc%h3@! |
| 12/20/2022 | Crack Me With Ui. | .NET | ![]() |
same as above, but funnier. lel.. | 8103535 |
| 12/20/2022 | whoami | C/C++ | ![]() |
located solution string in the Listing window. | Dad |
| 12/12/2022 | easiest crackme you can find. | C/C++ | ![]() |
most basic stuff happening with a bit of hexa translation. | 1234 |

