WELCOME TO CRACKMY.APP
Share your crackmes, solve challenges, and climb the leaderboard in the ultimate reverse engineering community.
Why Choose CrackMy.App?
Join like-minded reverse engineers in our interactive crackme community.
Active Users
Crackmes Shared
Solutions Submitted
Total Downloads
Upload your own crackmes and challenge the community to solve them.
Test your skills by solving crackmes shared by other users.
Earn points and compete with others to reach the top.
Latest Crackmes
Recently uploaded challenges from our community
This is my last chance of trying to recruit good reverse engineers for a bigger project, who solves this challenge, doing a video with how he solved it, and sends it on the email left, will get contacted for further collaboration :) (The DLL moerte.dll is a security attachment to the exe, both of them are virtualized and packed, your job is to find a valid key or write a keygen, but do everything recorded) dll VT - https://www.virustotal.com/gui/file/f964f6259d96cfb3a15268d822013ca7fca9baf71d05d32a5333fb0bf9335f2e?nocache=1 exe VT - https://www.virustotal.com/gui/file/4aff9698da65f90b4ed5732dcc050cce52682f7580e1ebbabd3c4be90b6ea5e9?nocache=1 Contact E-mail - [email protected]
## Objective Explore the vast capabilities of a fully custom virtualized architecture to recover a hidden phrase. Unlike level 1, this virtual code will not be easily analyzed using a Ghidra processor or Binary Ninja architecture plugin without preprocessing. ## Features: A slew of protection mechanisms hinder static and dynamic analysis, in both the host code and virtualized code. - Multiple string encoding and encrypting schemes - Anti-debug - Anti-memory dump - Anti-patch - Anti-thread suspension - Wholly standardized algorithms - Modified standardized algorithms (this is a crackme, so they were changed to be reversible where required) - Control flow flattening - Jump tables - If-else ladders - No junk code (unless left in by accident) ## Dependencies **None**. No libc, no dynamic nor static libraries. The virtualized code takes up almost the whole binary. Despite that, it executes reliably on a system with an 8-core, 1.6GHz CPU and 8GB of DDR3 RAM. :::info A valid solution provides input that produces positive output. Patching is permitted for analysis, but the input must solve the unmodified executable. :::
You have to find the secret password, you have to record how you did it for the solution to be valid, without a video your solution is not valid due to the key being randomly generated in the memory. ZIP Password : fearmev2 The video has to be sent to [email protected] Goodluck!
Popular Crackmes
Popular challenges from our community
This is a very simple beginner crack me. Try to find the correct password. Patch if you want, but at first try to solve the crackme without patching. Good Luck !
Lets see if you have what it takes to intercept and modify packets in transit. Rules: 1. Intercept and Modify: You are allowed to intercept and modify the packets as they travel between the client and server. 2. No Modifications to Frontend: Modifying the webpage or any JavaScript code is strictly prohibited. 3. No Patching: You cannot patch the application itself. Good luck and have fun!
his crackme has been imported from crackmes.one. The original author is UnderKo. Original Description: Pass: 5
Recent Solutions
Recently uploaded solutions from our community
Ready to join the community?|
Sign up now and start sharing your crackmes or solving them!