Challenge of Reverse Engineering
Try a challenge or contribute your own, any platform or operating system...
The creation of new topics is disabled in these subforum categories.
Please create and post your new challenges in the appropriate subcategory of Downloads > Challenge of Reverse Engineering
A topic will then automagically be created and posted in these forums...
-
Example CrackMe - Debug Blocker x64 This is an example for submitting a CrackMe in the Downloads section of the site. You can download the file and run Debug Blocker x64. Nothing too exciting will happen! The challenge here would be to patch the debug-blocker function so that it does not spawn a second process. File Information Submitter Teddy Rogers Submitted 02/23/2020 Category CrackMe View File
-
MD5 KeygenMe Hint: MD5(UsernameUpper + ':' + salt), take first 16 hex chars, format as XXXX-XXXX-XXXX-XXXX. File Information Submitter otmanov Submitted 09/20/2025 Category KeygenMe View File
-
.NET Reactor v7.3 (Embedded DLL's) File protected by .NET Reactor v7.3 having Code Virtualization enabled. By nature the application using Dependency Injection (this time heavily developed), the 3rd party files embedded to main exe (see shot2), in addition System.Data.SQLite.dll lying near application. Find registration combination and reply it with the success message! Custom antidebugger File Information Submitter whoknows Submitted 06/26/2025 Category UnPackMe (.NET) View File
-
-
- 28 replies
- 7.8k views
- 2 followers
-
-
All Protection Options Enjoy ! ; ) UnPackMe.TEP.3.80.rar
-
-
- 27 replies
- 16.4k views
- 1 follower
-
-
DNGuard HVM v4.94 Hey, Dropping my second UnpackMe challenge, made just for fun. This one’s a bit tougher than my first, but still very doable. The goal is to unpack and analyze the binary and reach the success message. Cracking it is extra, not required. It’s a simple .NET WinForms app that asks for a password and shows “Access granted” when the condition is met. The UI is trivial, the focus is on what’s happening once protections kick in. Protected with DNGuard HVM Enterprise. Source code, compiler-generated code, constructors, strings, managed resources, and blob heaps are encrypted. HVM and HVM II are both enabled at level 5, with proxy methods and additional runtime…
-
-
- 25 replies
- 4.1k views
- 1 follower
-
-
This target is protected with Themida 2.3.1.0 x64 Virtualize Protection Core With: TIGER64 (Black) Good luck! UnpackMe Themida 2.3.1.0 x64.rar
-
Custom Python Obfuscator (CM) Decryption doesn't involve modifying the Python interpreter; everything is done through code obfuscation. Password verification is performed via hash comparison—finding the correct hash to compare against counts as success. My custom obfuscator has just been released—come and give it a try! It includes techniques such as control-flow obfuscation, string encryption, virtualization, and C++ white-box implementation. File Information Submitter 1346 Submitted 12/13/2025 Category CrackMe View File
-
Safengine Licensor v2.4 (HWID Lock) I coded a simple Win x64 GUI application with a close button and protected it using Safengine Shielden v2.4. Challenge is to; bypass the hardware ID lock; unpack the application. Let us go together to solve this issue. File Information Submitter lovejoy226 Submitted 06/11/2024 Category UnPackMe View File
-
-
- 28 replies
- 16.4k views
- 2 followers
-
-
Language : C/C++ Platform : Windows x32 OS Version : ( Windows 7,10) Packer / Protector : None Description : Goal : Find correct key. Enter key in textbox and click OK button then you see result . Screenshot : crackme_release.exe
-
-
- 1 reply
- 5.6k views
- 1 follower
-
-
The Enigma Protector x64 v7.4 (HWID Lock) Two simple Win x64 GUI applications protected using Enigma x64 v7.4. Challenge is to; bypass the hardware ID lock; unpack the application. Let us go together to solve this issue. File Information Submitter lovejoy226 Submitted 06/17/2024 Category UnPackMe View File
-
-
- 36 replies
- 20.7k views
- 5 followers
-
-
The Enigma Protector v7.70 (x32 & x64) This is an example program I used to shell The Enigma 7.7. You can shell it, bypass it, PatchHWID, KeyGen to make it run normally. Of course, it would be best if the shell could be peeled off.Have fun! https://workupload.com/file/EGgppWamMA6 Cracked: File Information Submitter lengyue Submitted 11/24/2024 Category UnPackMe View File
-
-
- 46 replies
- 40.2k views
- 3 followers
-
-
DNGuard HVM v4.93 So this is my first upload - I hope I am doing this right. I have included all the protections in the screenshots being used. Good luck File Information Submitter Visual Studio Submitted 11/11/2025 Category UnPackMe (.NET) View File
-
[ Crackme ] Unknown .NET Protection [ VM ] Hi, First of all i have to say " this is not my project and some friend ask me to upload challenge here " Compiler : .NET Protection : [+] Binary Obfuscation [+] Code Virtualization [+] Anti-Debugging / Anti-Tampering [+] Maybe some other protection Rule : Patch file to accept any password or find real password ( both accepted ) i will appreciate if you write something about you have done Hint : Run & Analyze file inside VM or isolated environment becuase of file isn't mine so i'm not responsible for anything Regards File Information Submitter Gladiator Submi…
-
Difficulty : (3-4 Maybe?) Language : (C# .NET) Platform : (Windows) OS Version : (Windows 10) Packer / Protector : (FujiFuscator) Description : Please give me a detailed tutorial on how you unpacked this. Screenshot : UnPackMe.exe
-
-
- 16 replies
- 23.8k views
- 1 follower
-
-
WinLicense v3.1.3.0 x86 (All Protection Options) UnpackMe - WinLicense 3.1.3.0 x86 Full Protect HWID Lock + Entry Point Virtualization + Etc... HWID: 1111-2222-3333-4444-5555-6666-7777-8888 Author:boot From:Tuts4you Time:2023.04.02 File Information Submitter boot Submitted 04/02/2023 Category UnPackMe View File
-
-
- 115 replies
- 69k views
- 6 followers
-
-
BinaryShield (Custom VM) This is my first attempt at a binary protector. Currently, the VM has very little protection, so this should be good for those interested in learning about VM-based obfuscation. I intend on uploading new challenges that feature my protector as I add more features. GOAL: - You must find the correct key. Simply patching to get a goodboy message is NOT allowed. - Bonus points for devirt and explanation of your approach. - MOST IMPORTANTLY, have fun! :) File Information Submitter ra1n Submitted 09/23/2024 Category CrackMe View File
-
-
- 5 replies
- 7k views
- 2 followers
-
-
Eazfuscator.NET v2025.01 File protected by eazfuscator v2025.01 having Code Virtualization enabled. Find registration combination and reply it with the success message! File Information Submitter whoknows Submitted 07/22/2025 Category UnPackMe (.NET) View File
-
-
- 13 replies
- 3.8k views
- 2 followers
-
-
The Enigma Protector v7.50 (x32 & x64 DEMO) This is an encryption example using The Enigma Protector 7.50 encryption. Enigma 7.5_x64_DEMO.rar TEP_7.5x32_DEMO.rar File Information Submitter lengyue Submitted 04/29/2024 Category UnPackMe View File
-
-
- 16 replies
- 10.2k views
- 2 followers
-
-
Nuitka 2.1.5 (Python 3.11) Hi Nuitka compiled python 3.11 file Correct password doesn't important Just patching Thanks File Information Submitter Sh4DoVV Submitted 04/18/2024 Category CrackMe View File
-
-
- 7 replies
- 7.4k views
- 3 followers
-
-
EAZFuscator .NET 2022.2 Max Preset (BlackHat) - Updated 04/06/22 Update 04-June 2022 Version 2022.2 Unpack Password - BH2022.2 Old 2022.1 Info - This unpackme is protected with latest version of EAZfuscator = https://www.gapotchenko.com/eazfuscator.net/features Password to unpack = EAZ2022 (I made a RAR file with password protection because I was unable to upload the unpackme directly. I was getting error due to false virus alarm) Your job is to unpack the file fully. Partial unpacking won't be accepted. File Information Submitter BlackHat Submitted 03/30/2022 …
-
-
- 16 replies
- 22.4k views
- 4 followers
-
-
C++ x64 Protection [ Crackme ] C++ x64 Protection Compiler: C++ (x64) Protection: Heavy obfuscation (control flow flattening, opaque predicates) Full code virtualization (custom VM with unique opcode set) Anti-tamper checks (integrity verification, debugger detection) Encrypted string/table storage Custom packer layering the entire binary Challenge: This is a server-client authentication system protected by a custom packer. The client executable performs login validation by communicating with a local/emulated server component. Goal: Patch the client to bypass authentication OR Emulate the server to allow successful login with any credentials You are free to choose either…
-
- 0 replies
- 435 views
- 1 follower
-
-
r00t0 KeygenMe v4 Difficulty: 5 Language: C GCC Platform: x64 OS Version: Windows 10+ Packer / Protector : Selfmade Description : Implement keygenme that generate a serial derived from a nickname. Also demonstrate a generator that, given a nickname, produces the correct serial. I used my own tool that I've been developing for two years. It started as an optimizer, but I’m now experimenting with the reverse idea — using it to help with obfuscation and code retranslation. File Information Submitter r00t0 Submitted 11/02/2025 Category KeygenMe View File
-
VMProtect x64 v3.6 HWID Lock (All Protection Options) Unpackme x64 - VMProtect 3.6 HWID License (All Protection Options) VMP x64 SDK + HWID Lock +etc... WwW.Tuts4you.CoM https://forum.tuts4you.com/ If you can unpack it, please make a tutorial... I will mark the answers with tutorials as a solution. The compressed package includes a simple MP4 display, please pay attention to check... Created by boot / From Tuts4you 2023.06.21 File Information Submitter boot Submitted 06/21/2023 Category UnPackMe View File
-
-
- 47 replies
- 23.6k views
- 8 followers
-
-
Hello everybody Here's a simple unpackme The File is packed with Dotnet Protector last version Enjoy ! EDIT : the new unpackme is attached here Protected.rar
-
VMProtect v3.8.1 Ultra (Mutation + Virtualization) The target is an old software (from 2010) coded in c++, I just apply the VMP protection without any special code as I show in the two screenshots. All available protection features in VMProtect were used with this unpackme. Refer to the attached images for the specific protection settings used. Challenge is to unpack the file, providing an explanation and details on your methodology. File Information Submitter X0rby Submitted 04/17/2023 Category UnPackMe View File
-
-
- 21 replies
- 24.7k views
- 3 followers
-