Hall Of Fame

At first we wanted to move crackmes from the old web-site, to this site, in order to have a complete, and stable collection. But after some thought, we realized we're only interested in the better, more interesting crackmes. So, instead of adding them to the normal 'A-Z' archive, we've created a special place - a crackmes museum, with the best paintings and symphonies this art of protection and de-protection has to offer. Mind boggling crackmes, though protections, ingenious solutions and the simple fact that great things come in small packages!
Have a look, it worth's it! :)


Btw, notice that there are no vb crackmes. Its no coincidence!
You are welcomed to recommend other crackmes that you feel should be in this place.

Crackme Name Author Date Level Protection Solutions
SmallCrkMe Sten
4
One of the smallest DOS crackmes. Why is it here? Well, because is has one good point: "it's easy to make good protection even with small means." Crook
AntiSmEX2 Shaman
4
Decrypting a known buffer of bytes using a given password,and than, jumping to that decrypted buffer to continue execution! There are many crackmes on these theme, and they are all though! With hard guesses and a good value of luck, there's a way out! You should also try +Spath's phi crackme and P.S.A's JMP crackme. hijaq
crueme +Cruehead
5
One of the more ingenious solutions I've seen. Way to go Merkuur!
The crackme's sourcecode has also been published.
Merkuur
caveman and ipoly Ghiribizzo
5,4
Ghiri's imaginative crackmes. As the crackers from eb's forum have discovered, caveman is actually a game!
Ipoly was one of the first crackmes that used floating point instructions.

eb's forum

The+Q

scut's 2nd Scut
6
Do you know what's a G-LFSR? well, you should. You should also know how to reverse it. CRC32, for example, is a LFSR, and hence reversible. Have a look at Anarchriz's CRC revering article for more details. The+Q
test3 and test4 LordByte
5,7
LordByte's famous crackmes.

Arash

Crook

RSA-Me TSC
4
Public key algorithms in name-code protections are becoming very common.
Have a look at wizard's knapsack crackme as well.
ACiD BuRN
rbs2 Int13
4
Do you know what's a Feistel network? well, you should. Its a common architecture in modern symmetric ciphers. It's pretty simple to reverse, but it might appear difficult at first glance. The+Q
Penta Mercure
2

Could it be, graphics in protections?
Have a look at dread's directx crackme as well.

MrNop
roy
Zebra aLoNg3x
6
Here's a crackme based on solving a mathematical problem. Cornos
ucscrk2 [j0b]
6
Dongle crackme, with a beautiful solution. Ak Kort
Solar solar designer
6
Wow! Here the protection is emulating a new, specially designed CPU. Its pretty though to trace! Have a look at anormal's intensive essay on the subject, and ghiri's CPU crackme.
Assemblur Serge
4
The powerful "running line" technique. This crackmes has the most beautiful assembly code I've ever seen!
Have a look at +Aesculapius crackme for the HCU strainer, and DaFixer's solution. It features this technique under windows.
The+Q
yAtEs Crackme yAtEs
6
Cracking the TEA algorithm. You might want to read Fauzan Mirza's paper on block ciphers cryptanalysis, where other attacks on the TEA algorithm are covered.

Cronos

Megaman

Crackme #11 ZeroCoder
5
A little piece of evidence can help you crack the case. Cronos

Back to Main