Jump to content
View in the app

A better way to browse. Learn more.

Tuts 4 You

A full-screen app on your home screen with push notifications, badges and more.

To install this app on iOS and iPadOS
  1. Tap the Share icon in Safari
  2. Scroll the menu and tap Add to Home Screen.
  3. Tap Add in the top-right corner.
To install this app on Android
  1. Tap the 3-dot menu (⋮) in the top-right corner of the browser.
  2. Tap Add to Home screen or Install app.
  3. Confirm by tapping Install.

UnPackMe

The creation of new topics is disabled in these subforum categories.

Please create and post your new challenges in the appropriate subcategory of Downloads > Challenge of Reverse Engineering

A topic will then automagically be created and posted in these forums...

  1. delldell
    Started by delldell,

    VMProtect , ZProtect = Mix UnpackMe = Delphi 7 Have Fun delldell_UnpackMe_VMProtect_ZProtect.rar

  2. cypher
    Started by cypher,

    Hey guys, while testing ScyllaHide with current protectors I made this little exe. Its Obsidium v1.5 DEMO. Enabled protection options include "Remove Bytes at OEP", "API emulation", "Verify file size", "Encrypt resources" Unpack this and share NOTEPAD_obsidium_v1.5.rar

  3. chickenbutt
    Started by chickenbutt,

    Difficulty: 3 Language: PureBASIC Platform: Windows 32bit OS Version: XP/Vista/7/8/8.1/10 Packer/Protector: ASProtect 32 2.78 Description: This is considered the easiest protector to unpack with a VM. I only seen 2.5x unpackmes around the net and most of the links were dead, so I made a new one. One binary has just protections, and the other also has license features minus hardware-lock. I couldn't get the API file to generate HWID and use SDK for it and didn't want to try and keygen a HWID. License version has keygen and password features. Tip for inexperienced MUP people: Unpacks divided to the obvious sections with stolen OEP, import relay…

  4. Josman
    Started by Josman,

    Python CrackMe - FunnyProtector This is an python unpackme for testing my private python obfuscator You have to unpack it ! Good Luck File Information Submitter Josman Submitted 10/10/2020 Category UnPackMe View File

      • Like
    • 3 replies
    • 7.3k views
  5. iNoob
    Started by iNoob,

    Difficulty : 5 Language : C++ Platform : Windows OS Version : All Packer / Protector : Unknown Description : An EXE is compressed with an unknown packer. Unpack the EXE. Screenshot : Download : iNoobUnpackMe.zip

  6. LCF-AT
    Started by LCF-AT,

    Hello, so I have created & protected a new UnpackMe for you. I added also some detect stuff [medium level]. Just start the exe file and press the splash. Have fun again. ENIGMA 2.33 UnpackMe.rar

  7. GIV
    Started by GIV,

    Difficulty : 3 Language : Borland Platform : Windows X86 OS Version : XP and higher Packer / Protector : Enigma Protector 5.1 Description : Small unpackme. Is in fact a crackme that i have fund on the www and apply a Enigma protector layer. So the goal is to unpack. IMHO is not hard at all. So i give you a valid combo of HWID/name/key: HWID: 58603-7C96E-050B3-811FC NAME: giv@reversing.ro Key: KWFM62F-NMH8E94-BH2C98E-FDDEQHG-VK88BVD-PRXLNZA-FM6TWL7-U6NNJGL-3K5CMQY-BSXJM8W-LZ2NYTL-QWXQ69F-XBDPTNY-GWSNX2M-YTKJV9E-YHRWUPQ The file have a password too witch is very easy to bypass. Good luck! Screenshot : Crack Auth_Protected…

  8. Gladiator
    Started by Gladiator,

    Hi Attached file is simple VB6 File was protected with PeP latest Version so please try to unpack and then identify the way you used to beak it's protection. Thanks PeP_5.rar

      • Like
    • 9 replies
    • 9.1k views
  9. Xjun
    Started by Xjun,

    Difficulty : 6 Language : C++ Platform : Windows OS Version : Windows 7 Packer / Protector :VMProtect Ultimate 3.0.8 Description : Memory Protection -Yes Import protection -Yes Resource Protection -Yes Pack the output File -Yes Debugger - user-mode+Kernel-mode Virtualization Tools -Yes using VMProtect SDK. Screenshot : UnpackMe.7z

  10. 0x72
    Started by 0x72,

    Language : Python Platform : Windows OS Version : All Packer / Protector : My Protector (https://github.com/robert169/Python-Obfuscator) Description : Want to see how long it takes to get it unpacked, is easy tho but i want to know where can i improve it Spoiler Screenshot : Download : Protected.py

    • 1 reply
    • 7.4k views
  11. 4r1
    Started by 4r1,

    Hi all, I made an unpackme. Hope you enjoyed. Tutorials are welcome. 4r1 unpackme.zip

      • Like
    • 9 replies
    • 19.8k views
  12. Reasen
    Started by Reasen,

    Difficulty : Unknown Language : Delphi XE8 Platform : Windows x86/x64 OS Version : XP and above Packer / Protector : Safengine Shielden v2.3.8.0 Max Options + Virtualized button Function using Safengine SDK Description : This Safengine Version(last one) have support for virtualize the parts of the executable you want, i virtualized the button with the function (cracked or not cracked) and packed the executable with it, Good luck! SafengineCrackMe.zip Screenshot :

  13. lemonrain
    Started by lemonrain,

    please unpack it and make a tutorial. downlink also: http://www37.zippyshare.com/v/63867645/file.html unpackme.rar

  14. Teddy Rogers
    Started by Teddy Rogers,

    Armadillo 4.66 http://tuts4you.com/download.php?view.1688 Ted.

    • 18 replies
    • 15.7k views
    CodeExplorer
  15. redblkjck
    Started by redblkjck,

    Here is a simple unpackme that checks if still packed. It uses known checks from PECompact after the file is unpacked. - Injected API. This demos the use of IsPacked and WaterMark API, coded in Delphi. Solution is to unpack it and patch so it runs unpacked. This was coded for beginners learning so the level is very easy. Text references and the memo box are there to make it easier to understand what needs patched. Delphi decompilers will have no problem with this file. Only anti debug is the standard included from the packer. Try just not patching the watermark to the good cracker jmp as the watermark value could be crucial for other functions of a protected app. …

      • Like
    • 10 replies
    • 13.1k views
  16. Gladiator
    Started by Gladiator,

    Language : Delphi XE Platform : Microsoft Windows x32/x64 OS Version : XP/Vista/7/8/8.1/10 Packer / Protector : ArmoredBinary - Modern Binary Obfuscation Tool. Description : Attached file was protected with full version of armoredbinary obfuscator ( with medium protection approach ) , make sure unpacked file will execute successfully in any environment. You will dealing with OEP hiding , Resource Protection , Simple IAT Protection , AntiDump Tricks. Screenshot : Protected file after execution will be similar to Thanks. ArmoredBinary_Official_UnpackMe.rar

    • 1 reply
    • 9.6k views
  17. HellSpider
    Started by HellSpider,

    Difficulty : 8 Language : C++ Platform : Windows 32-bit and 64-bit OS Version : All Packer / Protector : VMProtect 3.0.9 Description : The objective is to interpret virtualized functions in the attached binaries. No additional options have been used - no memory protection, no import protection and no compression. The virtualized function(s) will execute when the following key(s) is/are pressed: VMP32 (V1) : P VMP32 (V2) : 1 and 2 VMP64 (V1) : P VMP64 (V2) : 1 and 2 The virtualized functions are not very large. Detailed information of the interpreting procedure/internals or a complete solution paper is pref…

  18. Teddy Rogers
    Started by Teddy Rogers,

    x86 Virtualizer http://tuts4you.com/download.php?view.1850 Ted.

    • 2 replies
    • 8.2k views
  19. flash_0
    Started by flash_0,

    Difficulty : 7-8 Language : C++ Platform : Windows x86 OS Version : XP and above Packer / Protector : VMProtect 3.0.9 Description : Not default VMP protection, just testing some thing. The main goal is - unpack sample, not key. Screenshot : unpack_me.rar

    • 0 replies
    • 7.5k views
  20. HellSpider
    Started by HellSpider,

    Difficulty : 7 Language : C/C++ Platform : Windows 32-bit and 64-bit OS Version : All Packer / Protector : Obsidium 1.5.2 Build 11 Description : The objective is to interpret and reconstruct 1 single procedure that has been virtualized. No additional options have been used. The virtualized function will execute when key 'P' is pressed. Detailed information of the interpreting procedure/internals or a complete solution paper is preferable. I will post similar challenges for other protectors if someone supplies me with a recent version (CodeVirtualizer, Themida, VMProtect, Enigma ...). Screenshot : devirtualizeme_o…

  21. Apuromafo
    Started by Apuromafo,

    testing about 3 trial sdk Difficulty : 4 Language : Delphi 7 SE Platform : Windows X86 OS Version : XP and above Packer / Protector : Enigma Protector 5.6 Description : Little hard unpackme for do a tutorial/tut maybe is hard because i not gived info of registration BR, Apuromafo SS: i know there with all harcoded things not must be imposible atached ide.dll only for unpacked if really need link Desktop.7z

  22. iNoob
    Started by iNoob,

    Difficulty : 7 Language : C++ Platform : Windows OS Version : All Packer / Protector : PeBundle 3.20 + PeCompact 3.02.2 Description : An EXE and DLL are bundled together with PeBundle and the result is compressed with PeCompact. The objective is to obtain the EXE and DLL (not bundled together). Screenshot : Download : HelloWorld.zip

      • Like
    • 2 replies
    • 7.8k views
  23. Xjun
    Started by Xjun,

    Unapck Safengine! unpackme.rar

      • Like
    • 42 replies
    • 52.9k views
  24. Xjun
    Started by Xjun,

    Difficulty : 6 Language : C++ Platform : Windows OS Version : All Packer / Protector : Safengine Description : hi,friends . I reversed the VMP3.1.2 (build 886) anti debug method and improved this method. You need to use the debugger to bypass his tooltip Screenshot : success screenshot: file : XAntiDebug2.rar

      • Thanks
      • Like
    • 12 replies
    • 21k views
  25. HellSpider
    Started by HellSpider,

    Difficulty : 8 Language : C/C++ Platform : Windows 32-bit and 64-bit OS Version : All Packer / Protector : Themida 2.4.6.0 Description : The objective is to interpret and reconstruct 3 procedures in each file that have been virtualized. No additional options have been used. The virtualized functions will execute when keys '1', '2' and '3' are pressed, respectively. 1 = WHITE 2 = RED 3 = BLACK Only one "brand" of VM has been used per file. I will upload additional ones when current challenges have been solved or seriously attempted. Detailed information of the interpreting procedure/internals or a complete solution paper is …

Configure browser push notifications

Chrome (Android)
  1. Tap the lock icon next to the address bar.
  2. Tap Permissions → Notifications.
  3. Adjust your preference.
Chrome (Desktop)
  1. Click the padlock icon in the address bar.
  2. Select Site settings.
  3. Find Notifications and adjust your preference.