Challenge of Reverse Engineering
Try a challenge or contribute your own, any platform or operating system...
The creation of new topics is disabled in these subforum categories.
Please create and post your new challenges in the appropriate subcategory of Downloads > Challenge of Reverse Engineering
A topic will then automagically be created and posted in these forums...
-
Example CrackMe - Debug Blocker x64 This is an example for submitting a CrackMe in the Downloads section of the site. You can download the file and run Debug Blocker x64. Nothing too exciting will happen! The challenge here would be to patch the debug-blocker function so that it does not spawn a second process. File Information Submitter Teddy Rogers Submitted 02/23/2020 Category CrackMe View File
-
DotFix NiceProtect x32 v7.1 A Delphi file is protected with an old version DotFix NiceProtect (7.1) Original Entry Point is encrypted Just find and restore OEP, recover the IAT and unpack it File Information Submitter fReestYler Submitted 10/06/2025 Category UnPackMe View File
-
-
- 1 reply
- 623 views
- 1 follower
-
-
DNGuard HVM v4.93 So this is my first upload - I hope I am doing this right. I have included all the protections in the screenshots being used. Good luck File Information Submitter Visual Studio Submitted 11/11/2025 Category UnPackMe (.NET) View File
-
-
- 11 replies
- 4.3k views
- 2 followers
-
-
Themida & VMProtect (Same Virtualized Code Sections) I want you guys who are capable of unvirtualizing and unpacking them to upload the final ones. These files are just the same part of the codes virtualized which are 2 lines of the original mfc source codes. So if you can unvirtualize them and unpack them, please upload the final ones. Any other protections are excluded absolutely. Give it a try and improve your skills. Best Regards. sean. File Information Submitter lovejoy226 Submitted 04/07/2025 Category UnPackMe View File
-
-
- 6 replies
- 5.9k views
- 1 follower
-
-
Prometheus (12 Layers of Insanity) A recruitment challenge for those who see what others cannot. The binary guards an encrypted message. To reveal it, you must provide the correct 28-character key. There is no backdoor, no shortcut, no unintended solution—only the key. The verification process spans twelve interconnected layers. Each depends on others. Disrupting one cascades through all. The binary knows its own shape and will notice if you change it. Some defenses are apparent through static analysis. Others manifest only at runtime. A few exist in the liminal space between instruction and execution—observable only through their effects, never their implementation. Di…
-
Difficulty : I guess 3 is enough. Language : Delphi Platform : Windows x32/x64 OS Version : XP and above Packer / Protector : None. Description : Goals: 1. Write a valid keygen for the target. Good luck! Screenshot : Go Figure!!! Fixed.zip
-
-
- 6 replies
- 7.8k views
- 1 follower
-
-
VMPLicenseProtector This is a recently developed recreational utility. I'm unsure which forum section is appropriate, so moderators please feel free to move it if necessary. The tool implements a combined The Enigma and VMProtect protection scheme and is designed for applying VMProtect to Win32/Win64 executables and DLLs without requiring source code. It is not compatible with .NET assemblies. The interface supports Chinese/English language switching. To function, VMProtect_Con.exe must be placed in the tool's directory. Note that the tool itself is incompatible with Windows 7 and requires the DirectX 11 runtime to be installed. Software protected with it remains compat…
-
-
- 7 replies
- 2.2k views
- 3 followers
-
-
WinLicense v3.1.3.0 x86 (All Protection Options) UnpackMe - WinLicense 3.1.3.0 x86 Full Protect HWID Lock + Entry Point Virtualization + Etc... HWID: 1111-2222-3333-4444-5555-6666-7777-8888 Author:boot From:Tuts4you Time:2023.04.02 File Information Submitter boot Submitted 04/02/2023 Category UnPackMe View File
-
-
- 116 replies
- 79.8k views
- 7 followers
-
-
CrackMe (Custom .NET JIT-Runtime) The CrackMe I made has a special feature - custom jit. Bruteforce is not necessary. To launch, install .NET 10 To run the file, delete CrackMe.deps.json - this way the file will load the local runtime, and not from the root folder. File Information Submitter Dark_Bull Submitted 01/10/2026 Category CrackMe View File
-
- 0 replies
- 126 views
- 1 follower
-
-
The Enigma Protector v6.9 I have protected a simple file with the Enigma Protector 6.9. Try to unpack. For a skilled reverser will not be as hard as it seems. HWID: A7707-65A71-43529-A59E1-41C2F-C5AA0-EB308-3F774 Name: tuts4you Key: BG8QC4UMZW3QMTH99U6ZTF8FJJNDAPKY5E2XNL3CMHRVUMLSB2QWRBSYBGF4RNHX7WC26W2GQMNBNPUU3YUTDXDS387A2UURMUVJ88P5PPC9ZCEQHFHW4J6ZQRAK7GW6DRK4QH4CGCEQM7F9K39J89S4CRARX3L3LPABBXU23M8QXP6A85L2CZFJZF66KF5NFTZ557872DA3 File Information Submitter GIV Submitted 07/20/2021 Category UnPackMe View File
-
-
- 60 replies
- 64.3k views
- 9 followers
-
-
Cool Beans (License Challenge) Good evening everyone, I’ve put together my first CrackMe using DNGuard 4.94 and its License Management feature. The application is called “Cool Beans.exe” - terrible name, I know 😄 Once cracked successfully, you’ll be taken to the main form, which displays a (slightly stupid) message. Hope you enjoy taking a look. Cheers 🍻 🔐 DNGuard 4.94 Protections UsedEncryption Encrypt compiler-generated code Encrypt .ctor (constructor) methods Encrypt blob heaps Encrypt strings HVM (Hardware Virtual Machine) Protection Enable HVM technology HVM Code Protection Level: 5 HVM II technology enabled HVM II Level: 5 HVM protection for method LocalVarSig…
-
Armadillo x64 v9.64 (General/Default Protection Options) Unpackme - Armadillo x64 v9.64 | WwW.Tuts4You.CoM General/Default Protection Options = HWID Lock + etc... If you can unpack it, please make a tutorial... The compressed package includes a simple MP4 display, please pay attention to check... HWID:87DF-0E78 NAME:boot KEY:000016-M9KY7Y-1PM436-8JKH7H-G8QXCH-3ACEGN-Y5ND6B-TY4VJ2-5FX1WY-WGJBFB After seeing the dynamic screen, please click the LEFT MOUSE button to exit OR press the "ESC" button once to exit. Created by boot / From Tuts4you 2023.06.19 File Information Submitter boot …
-
-
- 8 replies
- 6.8k views
- 2 followers
-
-
MD5 KeygenMe Hint: MD5(UsernameUpper + ':' + salt), take first 16 hex chars, format as XXXX-XXXX-XXXX-XXXX. File Information Submitter otmanov Submitted 09/20/2025 Category KeygenMe View File
-
.NET Reactor v7.3 (Embedded DLL's) File protected by .NET Reactor v7.3 having Code Virtualization enabled. By nature the application using Dependency Injection (this time heavily developed), the 3rd party files embedded to main exe (see shot2), in addition System.Data.SQLite.dll lying near application. Find registration combination and reply it with the success message! Custom antidebugger File Information Submitter whoknows Submitted 06/26/2025 Category UnPackMe (.NET) View File
-
-
- 28 replies
- 17.9k views
- 3 followers
-
-
All Protection Options Enjoy ! ; ) UnPackMe.TEP.3.80.rar
-
-
- 27 replies
- 25.4k views
- 2 followers
-
-
DNGuard HVM v4.94 Hey, Dropping my second UnpackMe challenge, made just for fun. This one’s a bit tougher than my first, but still very doable. The goal is to unpack and analyze the binary and reach the success message. Cracking it is extra, not required. It’s a simple .NET WinForms app that asks for a password and shows “Access granted” when the condition is met. The UI is trivial, the focus is on what’s happening once protections kick in. Protected with DNGuard HVM Enterprise. Source code, compiler-generated code, constructors, strings, managed resources, and blob heaps are encrypted. HVM and HVM II are both enabled at level 5, with proxy methods and additional runtime…
-
-
- 25 replies
- 13.6k views
- 2 followers
-
-
This target is protected with Themida 2.3.1.0 x64 Virtualize Protection Core With: TIGER64 (Black) Good luck! UnpackMe Themida 2.3.1.0 x64.rar
-
-
- 2 replies
- 9.3k views
- 1 follower
-
-
Custom Python Obfuscator (CM) Decryption doesn't involve modifying the Python interpreter; everything is done through code obfuscation. Password verification is performed via hash comparison—finding the correct hash to compare against counts as success. My custom obfuscator has just been released—come and give it a try! It includes techniques such as control-flow obfuscation, string encryption, virtualization, and C++ white-box implementation. File Information Submitter 1346 Submitted 12/13/2025 Category CrackMe View File
-
- 0 replies
- 315 views
- 1 follower
-
-
Safengine Licensor v2.4 (HWID Lock) I coded a simple Win x64 GUI application with a close button and protected it using Safengine Shielden v2.4. Challenge is to; bypass the hardware ID lock; unpack the application. Let us go together to solve this issue. File Information Submitter lovejoy226 Submitted 06/11/2024 Category UnPackMe View File
-
-
- 28 replies
- 25.3k views
- 2 followers
-
-
Language : C/C++ Platform : Windows x32 OS Version : ( Windows 7,10) Packer / Protector : None Description : Goal : Find correct key. Enter key in textbox and click OK button then you see result . Screenshot : crackme_release.exe
-
-
- 1 reply
- 5.7k views
- 2 followers
-
-
The Enigma Protector x64 v7.4 (HWID Lock) Two simple Win x64 GUI applications protected using Enigma x64 v7.4. Challenge is to; bypass the hardware ID lock; unpack the application. Let us go together to solve this issue. File Information Submitter lovejoy226 Submitted 06/17/2024 Category UnPackMe View File
-
-
- 36 replies
- 21.6k views
- 5 followers
-
-
The Enigma Protector v7.70 (x32 & x64) This is an example program I used to shell The Enigma 7.7. You can shell it, bypass it, PatchHWID, KeyGen to make it run normally. Of course, it would be best if the shell could be peeled off.Have fun! https://workupload.com/file/EGgppWamMA6 Cracked: File Information Submitter lengyue Submitted 11/24/2024 Category UnPackMe View File
-
-
- 46 replies
- 41.5k views
- 3 followers
-
-
[ Crackme ] Unknown .NET Protection [ VM ] Hi, First of all i have to say " this is not my project and some friend ask me to upload challenge here " Compiler : .NET Protection : [+] Binary Obfuscation [+] Code Virtualization [+] Anti-Debugging / Anti-Tampering [+] Maybe some other protection Rule : Patch file to accept any password or find real password ( both accepted ) i will appreciate if you write something about you have done Hint : Run & Analyze file inside VM or isolated environment becuase of file isn't mine so i'm not responsible for anything Regards File Information Submitter Gladiator Submi…
-
Difficulty : (3-4 Maybe?) Language : (C# .NET) Platform : (Windows) OS Version : (Windows 10) Packer / Protector : (FujiFuscator) Description : Please give me a detailed tutorial on how you unpacked this. Screenshot : UnPackMe.exe
-
-
- 16 replies
- 24.1k views
- 1 follower
-
-
BinaryShield (Custom VM) This is my first attempt at a binary protector. Currently, the VM has very little protection, so this should be good for those interested in learning about VM-based obfuscation. I intend on uploading new challenges that feature my protector as I add more features. GOAL: - You must find the correct key. Simply patching to get a goodboy message is NOT allowed. - Bonus points for devirt and explanation of your approach. - MOST IMPORTANTLY, have fun! :) File Information Submitter ra1n Submitted 09/23/2024 Category CrackMe View File
-
-
- 5 replies
- 7.2k views
- 2 followers
-