Hall Of Fame
At first we wanted
to move crackmes from the old web-site, to this site, in order to have a complete,
and stable collection. But after some thought, we realized we're only interested
in the better, more interesting crackmes. So, instead of adding them to the
normal 'A-Z' archive, we've created a special place - a crackmes museum, with
the best paintings and symphonies this art of protection and de-protection has
to offer. Mind boggling crackmes, though protections, ingenious solutions and
the simple fact that great things come in small packages!
Have a look, it worth's it! :)
Btw, notice that there are no vb crackmes. Its no coincidence!
You are welcomed to recommend other crackmes that you feel should be in this
place.
Crackme Name | Author | Date | Level | Protection | Solutions |
SmallCrkMe | Sten |
4
|
One of the smallest DOS crackmes. Why is it here? Well, because is has one good point: "it's easy to make good protection even with small means." | Crook | |
AntiSmEX2 | Shaman |
4
|
Decrypting a known buffer of bytes using a given password,and than, jumping to that decrypted buffer to continue execution! There are many crackmes on these theme, and they are all though! With hard guesses and a good value of luck, there's a way out! You should also try +Spath's phi crackme and P.S.A's JMP crackme. | hijaq | |
crueme | +Cruehead |
5
|
One of the
more ingenious solutions I've seen. Way to go Merkuur! The crackme's sourcecode has also been published. |
Merkuur | |
caveman and ipoly | Ghiribizzo |
5,4
|
Ghiri's imaginative
crackmes. As the crackers from eb's forum have discovered, caveman is actually
a game! Ipoly was one of the first crackmes that used floating point instructions. |
||
scut's 2nd | Scut |
6
|
Do you know what's a G-LFSR? well, you should. You should also know how to reverse it. CRC32, for example, is a LFSR, and hence reversible. Have a look at Anarchriz's CRC revering article for more details. | The+Q | |
test3 and test4 | LordByte |
5,7
|
LordByte's famous crackmes. | ||
RSA-Me | TSC |
4
|
Public key
algorithms in name-code protections are becoming very common. Have a look at wizard's knapsack crackme as well. |
ACiD BuRN | |
rbs2 | Int13 |
4
|
Do you know what's a Feistel network? well, you should. Its a common architecture in modern symmetric ciphers. It's pretty simple to reverse, but it might appear difficult at first glance. | The+Q | |
Penta | Mercure |
2
|
Could it
be, graphics in protections? |
MrNop roy |
|
Zebra | aLoNg3x |
6
|
Here's a crackme based on solving a mathematical problem. | Cornos | |
ucscrk2 | [j0b] |
6
|
Dongle crackme, with a beautiful solution. | Ak Kort | |
Solar | solar designer |
6
|
Wow! Here the protection is emulating a new, specially designed CPU. Its pretty though to trace! Have a look at anormal's intensive essay on the subject, and ghiri's CPU crackme. | ||
Assemblur | Serge |
4
|
The powerful
"running line" technique. This crackmes has the most beautiful
assembly code I've ever seen! Have a look at +Aesculapius crackme for the HCU strainer, and DaFixer's solution. It features this technique under windows. |
The+Q | |
yAtEs Crackme | yAtEs |
6
|
Cracking the TEA algorithm. You might want to read Fauzan Mirza's paper on block ciphers cryptanalysis, where other attacks on the TEA algorithm are covered. | ||
Crackme #11 | ZeroCoder |
5
|
A little piece of evidence can help you crack the case. | Cronos |