a simple ever evolving set of crackme's to learn reverse engineering
  • C 50%
  • C++ 36.7%
  • Python 8.8%
  • Makefile 4.5%
Find a file
marco a1b701e525
wip: lay down groundwork for v6
a license key type checker
2026-03-12 18:39:34 +01:00
v1-strcmp feat: refactor to CTF style 2026-01-24 15:33:00 +01:00
v2-math ctf: add ctf binaries that are optimized 2026-01-24 15:37:10 +01:00
v3-modulo ctf: add ctf binaries that are optimized 2026-01-24 15:37:10 +01:00
v4-xor ctf: add ctf binaries that are optimized 2026-01-24 15:37:10 +01:00
v5-time fix: force x86_64 cuz CachyOS.. 2026-02-14 22:09:37 +01:00
v6-serial wip: lay down groundwork for v6 2026-03-12 18:39:34 +01:00
.gitignore fix: force x86_64 cuz CachyOS.. 2026-02-14 22:09:37 +01:00
README.md Update README.md 2026-01-22 10:31:08 +00:00

Crackme

A simple evolving set of crackme's for me to learn reverse engineering by analyzing my own code compiled to assembly.

Writeups

For each crackme I reversed I do a writeup discussing how I did it and explain stuff for future reference.

these can be found in the root of each sub folder for each crackme.

programs

  • v1: basic password checker with plaintext hardcoded password
  • v2: a program that requires a number from the user to be let in, here I had to find an algoritm
  • v3: similar to v2 this one also requires a number but with modulo instead
  • v4: basic password checker like v1 but with xor encoded strings instead.