My solutions to some crackmes that I have been collecting from the internet.
I have been doing (simply for fun and learn) and documented as good as I know.
Are ordered them by folders to classify them by different sources.
If you want to send me some crackme, contact me on Twitter.
In many cases, the notes taken in each crackme do not have a sequential or chronological order. They have only been added as they have been checking or detecting different functions or features. They are simply data that globally serve us to understand some parts of the whole. You have to understand that the reversing process involves following the code many times in many different ways and not everything looks the same way and at the same time.
All these solutions are the result of my learning, so it is very likely that they contain some errors, of concept, of procedure or even of interpretation of the code. Use it as a guide but you are welcome to comment or correct or anything you do not consider correct.
Little by little I will be adding crackmes. It all depends on the time I have available.
There are multiple tools that you can use for reverse engineering, but I basically use two programs.
For static analysis I use Ghidra https://ghidra-sre.org/, and for dynamic analysis I use the debugger x64dbg https://x64dbg.com/.
- Win32 - Level 0x00 - b1h0-ioli-crackme0x00.md
- Win32 - Level 0x01 - b1h0-ioli-crackme0x01.md
- Win32 - Level 0x02 - b1h0-ioli-crackme0x02.md
- Win32 - Level 0x03 - b1h0-ioli-crackme0x03.md
- Win32 - Level 0x04 - b1h0-ioli-crackme0x04.md
- Win32 - Level 0x05 - b1h0-ioli-crackme0x05.md
- Win32 - Level 0x06 - b1h0-ioli-crackme0x06.md
- Win32 - Level 0x07 - b1h0-ioli-crackme0x07.md
- Win32 - Level 0x08 - b1h0-ioli-crackme0x08.md
- Win32 - Level 0x09 - b1h0-ioli-crackme0x09.md
- Win32 - evilprogrammer - mexican
- Win32 - toaster - VIP_access_me
- Win64 - whitecr0w - Easy_Peasy
- Linux - Shad3 - Keyg3n_M1#1 (with keygen source code)
- Linux - oguzbey - Lucky Numbers
- Linux - BinaryNewbie - Small Keygenme (with keygen source code)
- Win32 - TheReverser - Find_password
- Win32 - Flamer - Crackme Roca
- Linux - gc - reverse1
- Win32 - unknown - Crackme#00
- Win32 - unknown - Crackme#01
- Win32 - unknown - crackme-easy-1 (with keygen source code)
Twitter: @310hkc41b
I advise you to always use a virtual machine to avoid problems of interaction with your system. And also that you check the executables with an antivirus, or send them to Virus Total or similar tools to prevent them from sneaking a program that could be "something more" than a crackme.