Reverse-Engineering-crackmes-with-Ghidra icon indicating copy to clipboard operation
Reverse-Engineering-crackmes-with-Ghidra copied to clipboard

A collection of random crackme solutions created using Ghidra SRE (software Reverse Engineering) tool for purpose of research.

Reverse Engineering of crackmes with Ghidra

=== About ===

A collection of random crackme and programming puzzle solutions created using GHIDRA SRE (Software Reverse Engineering) tool. This series of tutorials is for complete beginners in Assembly language (x86) and software reverse engineering (like me, lol). I created this repository because I wanted to share my solutions and approach, so anyone can learn something from it, and because I need practicing in both C/C++, ASM and Reverse Engineering.

=== List of crackmes solutions ===

=== Resources ===

  • Ghidra: https://github.com/NationalSecurityAgency/ghidra/
  • Ghidra courses: https://ghidra.re/online-courses/
  • x86 Assembly Guide: https://www.cs.virginia.edu/~evans/cs216/guides/x86.html
  • x86 Assembly Wikibooks guide: https://en.wikibooks.org/wiki/X86_Assembly
  • About Registers: https://wiki.skullsecurity.org/index.php?title=Registers
  • Understanding C by learning assembly: https://www.recurse.com/blog/7-understanding-c-by-learning-assembly
  • (RU) Уроки ассемблера: https://ravesli.com/uroki-assemblera/
  • (RU) Введение в ассемблер: http://av-assembler.ru/asm/afd/asm.htm
  • Repository of crackmes for training your skills: https://crackmes.one/
  • Free Hack Quest - Reverse Engineering puzzles: https://freehackquest.com/quests/reverse