Download address of 160 CrackMe packages:
[Disassembly Exercise] 160 CrackMe is a CrackMe series that is more suitable for beginners to learn reverse cracking.
The antivirus software may report a false report due to some CRACKME packers in CHM. Please feel free to use it.
001—Acid burn
[Disassembly exercise] 160 CrackMe 001
[Disassembly exercise] 160 CrackMe 001(2)
002—Afkayas.1
[Disassembly exercise] 160 CrackMe 002
[Disassembly exercise] 160 CrackMe 002(2)
003—AfKayAs.2
[Disassembly exercise] 160 CrackMe 003
[Disassembly exercise] 160 CrackMe 003(2)
004–ajj.1
[Disassembly exercise] 160 CrackMe 004
[Disassembly exercise] 160 CrackMe 004(2)
005–ajj.2(Super difficult)
[Disassembly exercise] 160 CrackMe 005
[Disassembly exercise] 160 CrackMe 005(2)
006—aLoNg3x.1
[Disassembly exercise] 160 CrackMe 006
007—aLoNg3x.2
[Disassembly exercise] 160 CrackMe 007
008—Andrénalin.1
[Disassembly exercise] 160 CrackMe 008
009—Andrénalin.2
[Disassembly exercise] 160 CrackMe 009
[Disassembly exercise] 160 CrackMe 009(2)
010—Andrénalin.3
[Disassembly exercise] 160 CrackMe 0010
[Disassembly exercise] 160 CrackMe 0010(2)
011—Andrénalin.4
[Disassembly exercise] 160 CrackMe 0011
[Disassembly exercise] 160 CrackMe 0011(2)
012—attackiko(16-bit NE, more difficult)
[Disassembly exercise] 160 CrackMe 0012
[Disassembly exercise] 160 CrackMe 0012(2)
013—badboy
[Disassembly exercise] 160 CrackMe 0013
[Disassembly exercise] 160 CrackMe 0013(2)
014—bjanes
[Disassembly exercise] 160 CrackMe 0014
[Disassembly exercise] 160 CrackMe 0014(2)
015—blaster99
[Disassembly exercise] 160 CrackMe 0015
016—BJCM20A
[Disassembly exercise] 160 CrackMe 0016
017—BJCM30A(A bit difficult, time check, algorithm is not too complicated)
[Disassembly exercise] 160 CrackMe 0017
018—Brad Soblesky.1
[Disassembly exercise] 160 CrackMe 0018
019—Brad Soblesky.2
[Disassembly exercise] 160 CrackMe 0019
020—BuLLeT.8
[Disassembly exercise] 160 CrackMe 0020
021—Brad Soblesky.2(The algorithm is simple, but the password is dynamically generated according to the input, which can be obtained by making a registration machine. If you write the registration machine, you have to deal with those jump branch tables)
[Disassembly exercise] 160 CrackMe 0021
022—CarLitoZ.1(The algorithm is simple, but the difficulty lies in the super-long string and lengthy code)
[Disassembly exercise] 160 CrackMe 0022
023—Chafe.1
[Disassembly exercise] 160 CrackMe 0023
024—Chafe.2
[Disassembly exercise] 160 CrackMe 0024
025—CodeZero.1.exe
[Disassembly exercise] 160 CrackMe 0025
026—Colormaster.exe
[Disassembly exercise] 160 CrackMe 0026
[Disassembly exercise] 160 CrackMe 0026(2)
027—Cosh.1.exe
[Disassembly exercise] 160 CrackMe 0027
028—CoSH.2.exe(Simple, the username length is greater than 5, the serial number is 6287-)
[Disassembly exercise] 160 CrackMe 0028
029—CoSH.3.exe
[Disassembly exercise] 160 CrackMe 0029
030—cracking4all.1.exe(Difficulties: as follows)
1
2
3
4
|
[/font] [font=Tahoma]0040325C | C7 45 90 D0 07 00 00 | mov dword ptr ss :[ ebp -70], 7D0[/font] [font=Tahoma]00403263 | FF 15 38 61 40 00 | call dword ptr ds :[<&rtcMidCharVar>][/font] [font=Tahoma] |
0x7D0=2000 (decimal), rtcMidCharVar takes the specified character 2, 0, 0, 0 in decimal 2000
[Disassembly exercise] 160 CrackMe 0030
031—cracking4all.2.exe
[Disassembly exercise] 160 CrackMe 0031
032—crackme.2.exe(The difficulty is average, the analysis starts from the API, and the key events are in editN_change)
[Disassembly exercise] 160 CrackMe 0032
[Disassembly exercise] 160 CrackMe 0032(2)
033—Cruehead.1.exe
[Disassembly exercise] 160 CrackMe 0033
034—Cruehead.3.exe
[Disassembly exercise] 160 CrackMe 0034
035—cupofcoffe.1.exe
[Disassembly exercise] 160 CrackMe 0035
036—cupofcoffe.2.exe
[Disassembly exercise] 160 CrackMe 0036
037—CyberBlade.1.exe
[Disassembly exercise] 160 CrackMe 0037
038—CyberBlade.1.exe
[Disassembly exercise] 160 CrackMe 0038
039—damn.exe(A bit difficult, the author requires registration machine and PATCH)
[Disassembly exercise] 160 CrackMe 0039
040—DaNiEl-RJ.1.exe
[Disassembly exercise] 160 CrackMe 0040
Reviews
There are no reviews yet.