Reverse Engineering For Mac



A collection of crackmes for OS X. Send them to me if you have new ones to add!

Frida is and will always be free software (free as in freedom). We want to empower the next generation of developer tools, and help other free software developers achieve interoperability through reverse engineering. The process of duplicating an existing component, subassembly, or product, without the aid of drawings, documentation, or computer model is known as reverse engineering. Forward vs Reverse Engineering. Reverse engineering can be mainly viewed as the process of analyzing a system to identify its components and their interrelationships, to create. Download at ghidra-sre.org. The National Security Agency released the source code of Ghidra, its reverse engineering tool, April 4. This source code repository includes instructions to build on all supported platforms (macOS, Linux, and Windows). With this release, developers will be able to collaborate by creating patches, and extending the tool to fit their cybersecurity needs. IDA Pro runs on Windows, Linux and Mac OS X and can debug a large array of specific platforms (Windows 32/64-bit, Linux 32/64-bit, OS X x86/x64, iOS, Android, etc.). This can be carried out either locally or remotely. Remote debuggers are very useful to safely dissect potentially harmful programs.

User submitted (keep’em coming!):

Reverse Engineering Machine

CrackMe_nr1_qwertyoruiop.app.zip
SHA256(CrackMe_nr1_qwertyoruiop.app.zip)= 9a09b12b29f5a76a70dcaa863f777eaceaba68e10d51e20df3ca213df4ac4fcc

Nighthawk_CrackMe.zip
SHA256(Nighthawk_CrackMe.zip)= 5b9005b954d7ac8da40883e5fa78b180ea90f3d526918b22ca9ee84db9b34ad6

nilbytesCrackMe.zip
SHA256(nilbytesCrackMe.zip)= 22288b4038dc2044cd8bbb5b801c224fb55b2822fb4cbec1b4ed39bb9356b520

CrackMe.1.by.James.Moriarty.zip
SHA256(CrackMe.1.by.James.Moriarty.zip)= 266059c011736754ba1548bca85a3b86393c946fabbae0163a735a5af0597470

cykeycrackme_1.app.zip
SHA256(cykeycrackme_1.app.zip)= 6f7bc96cd8d774e71aa05cbb3c066f8be8ec78e5d917589b28c9f1e7a4708be5

Reverse

From MSJ 2009 contest:

MSJ2009#1.zip
(SHA1(MSJ2009#1.zip)= ed1e7ef4cc2d64cedbdaa85757371be5dae3aecb)

Reverse Engineering Software For Mac

MSJ2009#2.zip
(SHA1(MSJ2009#2.zip)= 47685aab5f43c064e4b24903f868df1100461ed7)

MSJ2009#3.zip
(SHA1(MSJ2009#3.zip)= 6eaa7a552ff16320465f40708c9a576bc2f45a51)

Reverse engineering software for mac

MSJ2009#4.zip
(SHA1(MSJ2009#4.zip)= 704fc7a23b05f923d46d83779aa21fb8e01b672a)

MSJ2009#5.zip
SHA1(MSJ2009#5.zip)= d658112201949386f025725f1582bf3ef5f73e6a

From HAWKE (someone left the link in the comments, I haven’t tried them yet but the code seems safe):

1-Sandwich.zip
(SHA1(1-Sandwich.zip)= f9b33d549dbb1a4643302f95dc5bc354394d0651)

2-Unicorn.zip
(SHA1(2-Unicorn.zip)= 4c7ce2bbb09588e1b221693946eeb7f3bbdc55eb)

3-Fox.zip
(SHA1(3-Fox.zip)= 198bc0d61b2128253540430d3c3479b48a0ea6bd)

Reverse Engineering For Kids

4-Socks.zip
(SHA1(4-Socks.zip)= 94e96302a5120c174091e6913ede65cdd21092b5)

From Corruptfire.com:

boolRegistered.app.zip
(SHA1(boolRegistered.app.zip)= 7f220ed8c72ddf2a17ea8841801dde0b4569ffa7)

DeadSimple.zip
(SHA1(DeadSimple.zip)= 0dc117ebb348253eb678e507ba775a3832810a84)

FiveNiner.zip
(SHA1(FiveNiner.zip)= b076d0018628ee933cc4d953c403d1519b83e3e0)

SmellsGood.zip
(SHA1(SmellsGood.zip)= 1a6162a89d1b33001438ef1d2900771490c496fd)

From MacSerialJunkies 2010 Contest:

Pie.zip
(SHA1(Pie.zip)= 50930794ef1fbd8fe72dfbb1fa5aba50b799d460)