a simple ever evolving set of crackme's to learn reverse engineering
Find a file
Marco 61d2148a86 ctf: add ctf binaries that are optimized
v1 is still unoptimized, and it progressionally gets more optimized
2026-01-24 15:37:10 +01:00
v1-strcmp feat: refactor to CTF style 2026-01-24 15:33:00 +01:00
v2-math ctf: add ctf binaries that are optimized 2026-01-24 15:37:10 +01:00
v3-modulo ctf: add ctf binaries that are optimized 2026-01-24 15:37:10 +01:00
v4-xor ctf: add ctf binaries that are optimized 2026-01-24 15:37:10 +01:00
.gitignore feat: complete v3! 2026-01-19 22:38:12 +01:00
README.md Update README.md 2026-01-22 10:31:08 +00:00

Crackme

A simple evolving set of crackme's for me to learn reverse engineering by analyzing my own code compiled to assembly.

Writeups

For each crackme I reversed I do a writeup discussing how I did it and explain stuff for future reference.

these can be found in the root of each sub folder for each crackme.

programs

  • v1: basic password checker with plaintext hardcoded password
  • v2: a program that requires a number from the user to be let in, here I had to find an algoritm
  • v3: similar to v2 this one also requires a number but with modulo instead
  • v4: basic password checker like v1 but with xor encoded strings instead.