- Transformation (easy)
- vault-door-training (easy)
- WinAntiDbg0x300 (medium)
- WinAntiDbg0x200 (medium)
- WinAntiDbg0x100 (medium)
- weirdSnake (medium)
- packer (medium)
- FastCheck (medium)
- Classic Crackme 0x100 (medium)
- Picker III (medium)
- Picker II (medium)
- Picker I (medium)
- GDB baby step 4 (medium)
- GDB baby step 3 (medium)
- GDB baby step 2 (medium)
- GDB baby step 1 (medium)
- Bit-O-Asm-4 (medium)
- Bit-O-Asm-3 (medium)
- Bit-O-Asm-2 (medium)
- Bit-O-Asm-1 (medium)
- ASCII FTW (medium)
- Virtual Machine 0 (medium)
- timer (medium)
- Safe Opener 2 (medium)
- Reverse (medium)
- Ready Gladiator 2 (medium)
- Ready Gladiator 1 (medium)
- Ready Gladiator 0 (medium)
- unpackme.py (medium)
- unpackme (medium)
- Safe Opener (medium)
- patchme.py (medium)
- Fresh Java (medium)
- file-run2 (medium)
- file-run1 (medium)
- bloat.py (medium)
- Bbbbloat (medium)
- crackme-py (medium)
- ARMssembly 0 (medium)
- Shop (medium)
- keygenme-py (medium)
- speeds and feeds (medium)
- ARMssembly 1 (medium)
- vault-door-5 (medium)
- vault-door-4 (medium)
- vault-door-3 (medium)
- vault-door-6 (medium)
- asm1 (medium)
- Virtual Machine 1 (hard)
- No way out (hard)
- Wizardlike (hard)
- Keygenme (hard)
- not crypto (hard)
- MATRIX (hard)
- breadth (hard)
- riscy business (hard)
- ARMssembly 4 (hard)
- gogo (hard)
- Hurry up! Wait! (hard)
- Rolling My Own (hard)
- ARMssembly 2 (hard)
- Checkpass (hard)
- Easy as GDB (hard)
- Powershelly (hard)
- ARMssembly 3 (hard)
- Let's get dynamic (hard)
- OTP Implementation (hard)
- reverse_cipher (hard)
- asm3 (hard)
- vault-door-7 (hard)
- droids2 (hard)
- B1ll_Gat35 (hard)
- Need For Speed (hard)
- Forky (hard)
- droids3 (hard)
- droids4 (hard)
- asm2 (hard)
- droids1 (hard)
- droids0 (hard)
- vault-door-8 (hard)
- asm4 (hard)