├── README.md ├── biggie └── README.MD ├── flap └── README.MD ├── krypton └── README.MD ├── litka └── README.MD ├── sakura └── README.md ├── scrim ├── README-Old-Easy.md └── README.md ├── syracuse └── README.MD ├── valiant ├── GUI (RShift).png └── README.MD ├── vegaline ├── GUI (AltGr).png └── README.MD ├── virgin v4 ├── GUI (RShift).png ├── README.MD └── Tutorial (By TwoNick).mp4 ├── wing └── README.MD ├── xenon └── README.MD └── xyla └── README.MD /README.md: -------------------------------------------------------------------------------- 1 |

MC Crackmes

2 | 3 | **Trillium INC: https://discord.gg/vzXzFpv2gk** 4 | 5 | **Password to Crackmes: WalmartSolutions** 6 | 7 | --- 8 | **Welcome to Our Reverse Engineering & Cracking Training Repository!** 9 | 10 | This repository is designed for beginners and experienced enthusiasts alike to hone their reverse engineering and software cracking skills. Whether you're just starting out or looking to refine advanced techniques, these challenges offer a practical way to learn, experiment, and grow. 11 | 12 | ### Structure & Content 13 | - **Client-Based Challenges**: Directories are named after fictional or real-world-inspired "clients." Each represents a unique crackme challenge. 14 | - **Challenge Files**: Inside every client directory, you’ll find: 15 | - A download to a target file to analyze or crack. 16 | - A `README.md` file containing: 17 | - **Setup Instructions**: Guidance on launching the client, essential for dynamic analysis or verifying your solution. 18 | - **Hints/Solutions**: Tips to nudge you in the right direction. Some challenges may include community-contributed solutions if they’ve been solved previously. 19 | 20 | ### Safety First 21 | All challenges have been carefully reviewed and vetted to ensure they are safe to use. For added security in beginner-friendly crackmes, potential risks like webhooks have been removed to create a safer learning environment **in beginner crackmes**. 22 | 23 | ### Crackme ranks based on Dificulty: 24 | - 1–2: Beginner 25 | 26 | - 3–4: Intermediate 27 | 28 | - 5–6: Proficient 29 | 30 | - 7–8: Advanced 31 | 32 | - 9–10: Expert 33 | 34 | ### Useful Starting Tools & Documents 35 | **Recaf - Bytecode editor:** https://github.com/Col-E/Recaf-Launcher
36 | **IDA (Pro) - Advanced editor (Do NOT use for Java):** https://hex-rays.com/ida-free **OR** https://auth.lol/ida/ (Cracked v9.X)
37 | **Java Opcode List:** https://en.wikipedia.org/wiki/List_of_Java_bytecode_instructions OR https://www.coley.software/Recaf-documentation/use-bytecode-list.html
38 | 39 | ### How to Contribute 40 | - **Solutions & Improvements**: Feel free to submit pull requests with detailed write-ups or enhanced hints for existing challenges. 41 | - **New Challenges**: Contributions of original crackmes are welcome! Ensure they follow our safety guidelines. 42 | 43 | ### Credits 44 | - **3000IQPlay**: Doing all the work 45 | - **Ykela**: Wing, Xyla & Krypton Jar + Scrim crackme 46 | - **TwoNick**: [Virgin V4](https://github.com/WalmartSolutions/MC-Crackmes/tree/main/virgin%20v4) crackme 47 | - **Xenoware**: Syracuse Jar 48 | - **Labas339**: Litka files 49 | - **ZKM**: Biggie files 50 | - **JerkerX**: Flap files 51 | - **Ugin**: Valiant Jar 52 | 53 | ### TODO: 54 | - Dimasik crackme 55 | --- 56 | -------------------------------------------------------------------------------- /biggie/README.MD: -------------------------------------------------------------------------------- 1 |

Biggie Client Crackme

2 | 3 |

4 | A beginner-friendly reverse engineering challenge for Minecraft Standalone (MCP) 5 |

6 | 7 | --- 8 | ### Download: https://workupload.com/file/8XWJsFfuPrT 9 | 10 | ## 📌 Basic Information 11 | - **Minecraft Version:** `1.8.9` 12 | - **Loader:** `MCP` 13 | - **Difficulty:** `2/10` (Beginner) 14 | - **Required JVM Args:** `-noverify` 15 | - **Required Mods:** 16 | - N/A 17 | 18 | --- 19 | 20 | ## 🛠️ Setup Instructions 21 | 1. **Install Biggie**. 22 | 2. Place the Biggie folder in your `versions` folder. 23 | 3. Launch Minecraft with Biggie. 24 | 25 | **Verification:** 26 | - 🏆 Success: Lets you into the Main Menu screen. 27 | - 🔒 Failure: Nothing happens. 28 | 29 | **Protection:** 30 | - 🧬 Obfuscation: ✅ Junkcode 31 | - ⏰ Verification Timing: Login Screen (On Button Press) 32 | 33 | --- 34 | 35 | ## 🔍 Hints (Click to Reveal) 36 |
37 | 🚩 1st Hint 38 | 39 | 1. **Find the Login Screen:** 40 | - It looks like there is no string obfuscation. Try searching for some words that are in the Login Screen whenever you run the client. 41 |
42 | 43 |
44 | 🚩 2nd Hint 45 | 46 | 2. **GuiMainMenu References:** 47 | - Search for References on class ```GuiMainMenu```, one of the resulting class is the Login Screen. 48 |
49 | 50 |
51 | 🚩 3rd Hint 52 | 53 | 3. **Some Getters and Setters:** 54 | - I suggest you search for "127.0.0.1" (as we already removed the original connection for your safety) and look at 1 of the 2 resulting classes. There are some setter calls related to Auth. 55 |
56 | 57 | --- 58 | -------------------------------------------------------------------------------- /flap/README.MD: -------------------------------------------------------------------------------- 1 |

Flap Client Crackme

2 | 3 |

4 | A beginner-friendly reverse engineering challenge for Minecraft Standalone (MCP) 5 |

6 | 7 | --- 8 | ### Download: https://workupload.com/file/UVzZUCMubyd 9 | 10 | ## 📌 Basic Information 11 | - **Minecraft Version:** `1.8.9` 12 | - **Loader:** `MCP` 13 | - **Difficulty:** `1/10` (Beginner) 14 | - **Required JVM Args:** `N/A` 15 | - **Required Mods:** 16 | - N/A 17 | 18 | --- 19 | 20 | ## 🛠️ Setup Instructions 21 | 1. **Install Flap**. 22 | 2. Place the Flap folder in your `versions` folder. 23 | 3. Launch Minecraft with Flap. 24 | 25 | **Verification:** 26 | - 🏆 Success: Lets you into the Main Menu screen. 27 | - 🔒 Failure: Nothing happens. 28 | 29 | **Protection:** 30 | - 🧬 Obfuscation: ❌ 31 | - ⏰ Verification Timing: Login Screen (On Button Press) 32 | 33 | --- 34 | 35 | ## 🔍 Hints (Click to Reveal) 36 |
37 | 🚩 1st Hint 38 | 39 | 1. **Auth Package:** 40 | - ```vestige.util.keyauth``` 41 |
42 | 43 |
44 | 🚩 2nd Hint 45 | 46 | 2. **KeyAuth Reference:** 47 | - Search for References on class ```vestige/util/keyauth/api/KeyAuth``` (LoginScreen will show up). 48 |
49 | 50 |
51 | 🚩 3rd Hint 52 | 53 | 3. **What Method?:** 54 | - Edit the ```mouseClicked``` method inside the ```LoginScreen``` class. 55 |
56 | 57 | --- 58 | -------------------------------------------------------------------------------- /krypton/README.MD: -------------------------------------------------------------------------------- 1 |

Krypton Client Crackme

2 | 3 |

4 | A beginner-friendly reverse engineering challenge for Minecraft 1.21 (Fabric) 5 |

6 | 7 | --- 8 | ### Download: https://workupload.com/file/MPmdcgbFK3q 9 | 10 | ## 📌 Basic Information 11 | - **Minecraft Version:** `1.21` 12 | - **Loader:** `Fabric` 13 | - **Difficulty:** `2/10` (Beginner) 14 | - **Required JVM Args:** `N/A` 15 | - **Required Mods:** 16 | - [Fabric API](https://modrinth.com/mod/fabric-api/versions?g=1.21) 17 | 18 | --- 19 | 20 | ## 🛠️ Setup Instructions 21 | 1. **Install Fabric** for 1.21. 22 | 2. Place the client JAR in your `mods` folder. 23 | 3. Launch Minecraft with Fabric. 24 | 25 | **Verification:** 26 | - 🏆 Success: Client fully loads into game without errors. 27 | - 🔒 Failure: Crashes your game. 28 | 29 | **Protection:** 30 | - 🧬 Obfuscation: ✅ Skidfuscator 31 | - ⏰ Verification Timing: Initialization 32 | 33 | --- 34 | 35 | ## 🔍 Hints (Click to Reveal) 36 |
37 | 🚩 1st Hint 38 | 39 | 1. **URL... Socket... What do I look for?:** 40 | - Search for [```java/net/Socket```](https://www.geeksforgeeks.org/java-net-socket-class-in-java/) references as they use Socket for their Auth. 41 |
42 | 43 |
44 | 🚩 2nd Hint 45 | 46 | 2. **Booleans everywhere!:** 47 | - There are 4 methods which you need to modify. 2 are "boolean" return types and 2 "CompletableFuture" 48 |
49 | 50 |
51 | 🚩 3rd Hint 52 | 53 | 3. **Comptabdsfs what?:** 54 | - The code for the 2 methods (You can compile this code and just view the compiled code in Recaf and paste over the bytecode into Krypton): 55 | ``` 56 | CompletableFuture success = new CompletableFuture(); 57 | success.complete(true); 58 | return success; 59 | ``` 60 |
61 | 62 | --- 63 | -------------------------------------------------------------------------------- /litka/README.MD: -------------------------------------------------------------------------------- 1 |

Litka Client Crackme

2 | 3 |

4 | A beginner-friendly reverse engineering challenge for Minecraft Standalone (MCP) 5 |

6 | 7 | --- 8 | ### Download: https://workupload.com/file/Zc6RW54E67D 9 | 10 | ## 📌 Basic Information 11 | - **Minecraft Version:** `1.16.5` 12 | - **Loader:** `MCP` 13 | - **Difficulty:** `2/10` (Beginner) 14 | - **Required JVM Args:** `-noverify` 15 | - **Required Mods:** 16 | - N/A 17 | 18 | --- 19 | 20 | ## 🛠️ Setup Instructions 21 | 1. **Install Litka**. 22 | 2. Place the Litka folder in your `versions` folder. 23 | 3. Launch Minecraft with Litka. 24 | 25 | **Verification:** 26 | - 🏆 Success: Client fully loads into game without errors. 27 | - 🔒 Failure: Crashes your game. 28 | 29 | **Protection:** 30 | - 🧬 Obfuscation: ✅ Light 31 | - ⏰ Verification Timing: Initialization 32 | 33 | --- 34 | 35 | ## 🔍 Hints (Click to Reveal) 36 |
37 | 🚩 1st Hint 38 | 39 | 1. **Editor Crashers:** 40 | - If you are using Recaf 4X (You should), in the infromations tab click "Illgeal Signatures" so your decompiler does not crash. 41 |
42 | 43 |
44 | 🚩 2nd Hint 45 | 46 | 2. **HWID Whitelist:** 47 | - Search for string contains "pastebin" 48 |
49 | 50 |
51 | 🚩 3rd Hint 52 | 53 | 3. **The Finale:** 54 | - Patch a boolean variable in `````` method **OR** make HWID List & HWID Getter methods return the same value/s (Harder but better). 55 |
56 | 57 | 58 | --- 59 | -------------------------------------------------------------------------------- /sakura/README.md: -------------------------------------------------------------------------------- 1 |

Sakura Client Crackme

2 | 3 |

4 | A beginner-friendly reverse engineering challenge for Minecraft 1.20.4 (Fabric). 5 |

6 | 7 | --- 8 | ### Download: https://workupload.com/file/u8dsMaRSgvF 9 | 10 | ## 📌 Basic Information 11 | - **Minecraft Version:** `1.20.4` 12 | - **Loader:** `Fabric` 13 | - **Difficulty:** `1.5/10` (Beginner) 14 | - **Required JVM Args:** `N/A` 15 | - **Required Mods:** 16 | - [Fabric API](https://modrinth.com/mod/fabric-api/versions?g=1.20.4) 17 | 18 | - **Note: This crackme makes connections to the original Auth Site!!!** 19 | 20 | --- 21 | 22 | ## 🛠️ Setup Instructions 23 | 1. **Install Fabric** for 1.20.4. 24 | 2. Place the client JAR in your `mods` folder. 25 | 3. Launch Minecraft with Fabric. 26 | 27 | **Verification:** 28 | - 🏆 Success: Login Screen closes and allows you to open GUI. 29 | - 🔒 Failure: Nothing changes. 30 | 31 | **Protection:** 32 | - 🧬 Obfuscation: ✅ ??? 33 | - ⏰ Verification Timing: Login Screen (On Login Button Press, RShift In Game) 34 | 35 | --- 36 | 37 | ## 🔍 Hints (Click to Reveal) 38 |
39 | 🚩 1st Hint 40 | 41 | 1. **Finding the auth class:** 42 | - Search for `java/net/URL` or `java.net.HttpURLConnection` references (2nd option for 100% accuracy). 43 |
44 | 45 |
46 | 🚩 2nd Hint 47 | 48 | 2. **"This is not a boolean auth...":** 49 | - Focus on... 50 | ```java 51 | sakurasakurkaef info = new sakurasakurkaef(license, user, expiry); 52 | onResult.accept(true, info); 53 | ``` 54 | All parameters are `Strings`. Set in any values. and make sure the `onResult.accept` has the "true" value in the first param. 55 |
56 | 57 | --- 58 | 59 | -------------------------------------------------------------------------------- /scrim/README-Old-Easy.md: -------------------------------------------------------------------------------- 1 |

Scrim Client Crackme

2 | 3 |

4 | A beginner-friendly reverse engineering challenge for Minecraft 1.21/1 (Fabric). 5 |

6 | 7 | --- 8 | ### Download: https://workupload.com/file/Z6nR2ujeWMz 9 | 10 | ## 📌 Basic Information 11 | - **Minecraft Version:** `1.21` 12 | - **Loader:** `Fabric` 13 | - **Difficulty:** `1.5/10` (Beginner) 14 | - **Required JVM Args:** `N/A` 15 | - **Required Mods:** 16 | - [Fabric API](https://modrinth.com/mod/fabric-api/versions?g=1.21) 17 | 18 | - **Note: This crackme makes connections to the original Auth Site!!!** 19 | 20 | --- 21 | 22 | ## 🛠️ Setup Instructions 23 | 1. **Install Fabric** for 1.21. 24 | 2. Place the client JAR in your `mods` folder. 25 | 3. Launch Minecraft with Fabric. 26 | 27 | **Verification:** 28 | - 🏆 Success: Client fully loads into game without errors. 29 | - 🔒 Failure: Crashes your game. 30 | 31 | **Protection:** 32 | - 🧬 Obfuscation: ✅ Skidfuscator 33 | - ⏰ Verification Timing: Initialization 34 | 35 | --- 36 | 37 | ## 🔍 Hints (Click to Reveal) 38 |
39 | 🚩 1st Hint 40 | 41 | 1. **Auth package name:** 42 | - The auth package contains the word `Game`. 43 |
44 | 45 |
46 | 🚩 2nd Hint 47 | 48 | 2. **What method to look for:** 49 | - Look for `System.exit` references. 50 | 51 |
52 | 53 | --- 54 | 55 | -------------------------------------------------------------------------------- /scrim/README.md: -------------------------------------------------------------------------------- 1 |

Scrim Client Crackme

2 | 3 |

4 | A beginner-friendly reverse engineering challenge for Minecraft 1.21/1 (Fabric). 5 |

6 | 7 | --- 8 | ### Download: https://workupload.com/file/bVeNydb7dkN 9 | 10 | ## 📌 Basic Information 11 | - **Minecraft Version:** `1.21` 12 | - **Loader:** `Fabric` 13 | - **Difficulty:** `2.0/10` (Beginner) 14 | - **Required JVM Args:** `N/A` 15 | - **Required Mods:** 16 | - [Fabric API](https://modrinth.com/mod/fabric-api/versions?g=1.21) 17 | 18 | --- 19 | 20 | ## 🛠️ Setup Instructions 21 | 1. **Install Fabric** for 1.21. 22 | 2. Place the client JAR in your `mods` folder. 23 | 3. Launch Minecraft with Fabric. 24 | 25 | **Verification:** 26 | - 🏆 Success: Client fully loads into game without errors. 27 | - 🔒 Failure: Crashes your game. 28 | 29 | **Protection:** 30 | - 🧬 Obfuscation: ✅ J2CC (Native Obfuscator) 31 | - ⏰ Verification Timing: Initialization 32 | 33 | --- 34 | 35 | ## 🔍 Hints (Click to Reveal) 36 |
37 | 🚩 1st Hint 38 | 39 | 1. **Finding natived classes:** 40 | - Check what is natived. You can check by checking references for `j2cc/Loader` class. 41 |
42 | 43 |
44 | 🚩 2nd Hint 45 | 46 | 2. **What could possibly be natived?:** 47 | - Since Scrim is a skid of [Argon](https://github.com/LvStrnggg/argon), you can easily find what is natived and just recreate the part, without needing to touch the Native file. Once you recreate it, you can remove all the native methods along with the native files. 48 | 49 |
50 | 51 | --- 52 | 53 | -------------------------------------------------------------------------------- /syracuse/README.MD: -------------------------------------------------------------------------------- 1 |

Syracuse Client Crackme

2 | 3 |

4 | A beginner-friendly reverse engineering challenge for Minecraft 1.19.2 (Fabric). Obfuscation might be deceiving on the hardness of this crackme for some beginners. 5 |

6 | 7 | --- 8 | ### Download: https://workupload.com/file/rXXNnTzhvfm 9 | 10 | ## 📌 Basic Information 11 | - **Minecraft Version:** `1.19.2` 12 | - **Loader:** `Fabric` 13 | - **Difficulty:** `1.5/10` (Beginner) 14 | - **Required JVM Args:** `N/A` 15 | - **Required Mods:** 16 | - [Fabric API](https://modrinth.com/mod/fabric-api/versions?g=1.19.2) 17 | 18 | --- 19 | 20 | ## 🛠️ Setup Instructions 21 | 1. **Install Fabric** for 1.19.2. 22 | 2. Place the client JAR in your `mods` folder. 23 | 3. Launch Minecraft with Fabric. 24 | 25 | **Verification:** 26 | - 🏆 Success: Client fully loads into game without errors. 27 | - 🔒 Failure: Crashes your game. 28 | 29 | **Protection:** 30 | - 🧬 Obfuscation: ✅ Skidfuscator 31 | - ⏰ Verification Timing: Initialization 32 | 33 | --- 34 | 35 | ## 🔍 Hints (Click to Reveal) 36 |
37 | 🚩 1st Hint 38 | 39 | 1. **URL References:** 40 | - Search for ```java/net/URL``` reference. Pay attention to the member names and the method's name it self that invokes it. 41 |
42 | 43 |
44 | 🚩 2nd Hint 45 | 46 | 2. **Copy To Clipboard:** 47 | - ```net.caffeinemc.phosphor.common.util.chunk.hashmap``` has a method ```copyToClipboard``` that copies your HWID into your clipboard. 48 |
49 | 50 |
51 | 🚩 3rd Hint 52 | 53 | 3. **HWID Hashing:** 54 | - ```MessageDigest``` is used in ```getHWID``` method to Hash your HWID. 55 |
56 | 57 | --- 58 | -------------------------------------------------------------------------------- /valiant/GUI (RShift).png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/WalmartSolutions/MC-Crackmes/ee94e1a0e6782f623b163852fffdfde21c86bae1/valiant/GUI (RShift).png -------------------------------------------------------------------------------- /valiant/README.MD: -------------------------------------------------------------------------------- 1 |

Valiant Beta Crackme

2 | 3 |

4 | A beginner-friendly reverse engineering challenge for Minecraft 1.21/1 (Fabric). 5 |

6 | 7 | --- 8 | ### Download: https://workupload.com/file/4jbRpWKfmLB 9 | 10 | ## 📌 Basic Information 11 | - **Minecraft Version:** `1.21/1` 12 | - **Loader:** `Fabric` 13 | - **Difficulty:** `1.0/10` (Beginner) 14 | - **Required JVM Args:** `N/A` 15 | - **Required Mods:** 16 | - [Fabric API](https://modrinth.com/mod/fabric-api/versions?g=1.21) 17 | 18 | - **Note: This crackme makes connections to the original Auth Site!!!** 19 | 20 | --- 21 | 22 | ## 🛠️ Setup Instructions 23 | 1. **Install Fabric** for 1.21/1. 24 | 2. Place the client JAR in your `mods` folder. 25 | 3. Launch Minecraft with Fabric. 26 | 27 | **Verification:** 28 | - 🏆 Success: Client fully loads into game without errors. 29 | - 🔒 Failure: Crashes your game. 30 | 31 | **Protection:** 32 | - 🧬 Obfuscation: ❌ 33 | - ⏰ Verification Timing: Initialization 34 | 35 | --- 36 | 37 | ## 🔍 Hints (Click to Reveal) 38 |
39 | 🚩 1st Hint 40 | 41 | 1. **Check package/class names:** 42 | - There is a package and class names which give away the Auth at first glance. 43 |
44 | 45 |
46 | 🚩 2nd Hint 47 | 48 | 2. **Silly strings!:** 49 | - Search for strings containing "Authentication", "https://", "HWID", "Access" 50 |
51 | 52 | --- 53 | -------------------------------------------------------------------------------- /vegaline/GUI (AltGr).png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/WalmartSolutions/MC-Crackmes/ee94e1a0e6782f623b163852fffdfde21c86bae1/vegaline/GUI (AltGr).png -------------------------------------------------------------------------------- /vegaline/README.MD: -------------------------------------------------------------------------------- 1 |

VegaLine Crackme

2 | 3 |

4 | A beginner-friendly reverse engineering challenge for Minecraft Standalone (MCP) 5 |

6 | 7 | --- 8 | ### Download: https://workupload.com/file/yzbLKfwasHZ 9 | 10 | ## 📌 Basic Information 11 | - **Minecraft Version:** `1.12.2 (Use JDK 17.0.6)` 12 | - **Loader:** `MCP` 13 | - **Difficulty:** `2.0/10` (Beginner) 14 | - **Required JVM Args:** `N/A` 15 | - **Required Mods:** 16 | - N/A 17 | 18 | --- 19 | 20 | ## 🛠️ Setup Instructions 21 | 1. **Install VegaLine**. 22 | 2. Place the VegaLine folder in your `versions` folder. 23 | 3. Launch Minecraft with VegaLine. 24 | 25 | **Verification:** 26 | - 🏆 Success: Client fully loads into game without errors. 27 | - 🔒 Failure: Fail popup in russian + exit. 28 | 29 | **Protection:** 30 | - 🧬 Obfuscation: ➖ Specific Classes, Very light. 31 | - ⏰ Verification Timing: Initialization 32 | 33 | --- 34 | 35 | ## 🔍 Hints (Click to Reveal) 36 |
37 | 🚩 1st Hint 38 | 39 | 1. **Hide & Seek:** 40 | - Do not let the Class or Method names fool you. They might appear as ordinary, but they are not. 41 |
42 | 43 |
44 | 🚩 2nd Hint 45 | 46 | 2. **"!dlroW ,olleH":** 47 | - Search for "//:" in order to find backwards "https://" containing strings (Sensitive classes only). 48 |
49 | 50 |
51 | 🚩 3rd Hint 52 | 53 | 3. **Do not overthink:** 54 | - Locate all references to the Auth class and replace any return values with your own. Some of the code might look like it is important in the Auth class in order for the client to function properly but no. 55 |
56 | 57 | --- 58 | -------------------------------------------------------------------------------- /virgin v4/GUI (RShift).png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/WalmartSolutions/MC-Crackmes/ee94e1a0e6782f623b163852fffdfde21c86bae1/virgin v4/GUI (RShift).png -------------------------------------------------------------------------------- /virgin v4/README.MD: -------------------------------------------------------------------------------- 1 |

Virgin V4 Crackme

2 | 3 |

4 | An intermediary reverse engineering challenge for Minecraft 1.21.4 (Fabric). Uses JNIC but you will be shown full tutorial on how to defeat it. 5 |

6 | 7 | --- 8 | ### Download: https://workupload.com/file/3GeTCCxPjHM 9 | 10 | ### Patched DLL for Noobs: https://workupload.com/file/veQsQnUk6dL 11 | 12 | ## 📌 Basic Information 13 | - **Minecraft Version:** `1.21.4` 14 | - **Loader:** `Fabric` 15 | - **Difficulty:** `4.0/10` (Intermediate) 16 | - **Required JVM Args:** `N/A` 17 | - **Required Mods:** 18 | - [Fabric API](https://modrinth.com/mod/fabric-api/versions?g=1.21.4) 19 | 20 | --- 21 | 22 | ## 🛠️ Setup Instructions 23 | 1. **Install Fabric** for 1.21.4. 24 | 2. Place the client JAR in your `mods` folder. 25 | 3. Launch Minecraft with Fabric. 26 | 27 | **Verification:** 28 | - 🏆 Success: Client fully loads into game without errors. 29 | - 🔒 Failure: Crashes your game. 30 | 31 | **Protection:** 32 | - 🧬 Obfuscation: ✅ JNIC & Skidfuscator 33 | - ⏰ Verification Timing: Initialization 34 | 35 | --- 36 | 37 | ## 🔍 Hints (Click to Reveal) 38 |
39 | 🚩 1st Hint 40 | 41 | 1. **Focus on the native:** 42 | - Run the client in order to convert the ".bin" into a ".dll" (Unpacked) and focus on the ".dll" it self (Look into %temp% and find a "lib753897837573578375.tmp" looking like file). 43 |
44 | 45 |
46 | 🚩 2nd Hint 47 | 48 | 2. **Jar as Hint:** 49 | - If you look at the class ```me.fallenbreath.fastipping.client.Main```, the method names can give you a Hint at what function you will be looking at in the ".dll" 50 |
51 | 52 | ## Tutorial 53 | 54 | https://github.com/user-attachments/assets/5d717be0-238a-4149-8f41-87059a9c5bfc 55 | 56 | --- 57 | -------------------------------------------------------------------------------- /virgin v4/Tutorial (By TwoNick).mp4: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/WalmartSolutions/MC-Crackmes/ee94e1a0e6782f623b163852fffdfde21c86bae1/virgin v4/Tutorial (By TwoNick).mp4 -------------------------------------------------------------------------------- /wing/README.MD: -------------------------------------------------------------------------------- 1 |

Wing Client Crackme

2 | 3 |

4 | A beginner-friendly reverse engineering challenge for Minecraft 1.19.4 (Fabric) 5 |

6 | 7 | --- 8 | ### Download: https://workupload.com/file/yK4Pp7dYzYW 9 | 10 | ## 📌 Basic Information 11 | - **Minecraft Version:** `1.19.4` 12 | - **Loader:** `Fabric` 13 | - **Difficulty:** `2/10` (Beginner) 14 | - **Required JVM Args:** `N/A` 15 | - **Required Mods:** 16 | - [Fabric API](https://modrinth.com/mod/fabric-api/versions?g=1.19.4) 17 | 18 | --- 19 | 20 | ## 🛠️ Setup Instructions 21 | 1. **Install Fabric** for 1.19.4. 22 | 2. Place the client JAR in your `mods` folder. 23 | 3. Launch Minecraft with Fabric. 24 | 25 | **Verification:** 26 | - 🏆 Success: Client fully loads into game without errors. 27 | - 🔒 Failure: Crashes your game. 28 | 29 | **Protection:** 30 | - 🧬 Obfuscation: ✅ Light 31 | - ⏰ Verification Timing: Initialization 32 | 33 | --- 34 | 35 | ## 🔍 Hints (Click to Reveal) 36 |
37 | 🚩 1st Hint 38 | 39 | 1. **Authentication System:** 40 | - The client uses offline-mode auth (no server checks). 41 |
42 | 43 |
44 | 🚩 2nd Hint 45 | 46 | 2. **HWID Whitelist:** 47 | - Valid HWIDs are stored in: 48 | ```plaintext 49 | assets/mousetweaks/security.txt 50 | ``` 51 |
52 | 53 |
54 | 🚩 3rd Hint 55 | 56 | 3. **HWID Generation:** 57 | - The client fetches HWID using a **PowerShell script** (check runtime commands). 58 |
59 | 60 | --- 61 | -------------------------------------------------------------------------------- /xenon/README.MD: -------------------------------------------------------------------------------- 1 |

Xenon Client Crackme

2 | 3 |

4 | A beginner-friendly reverse engineering challenge for Minecraft 1.21/1 (Fabric) 5 |

6 | 7 | --- 8 | ### Download: https://workupload.com/file/sQQUkE7evuQ 9 | 10 | ## 📌 Basic Information 11 | - **Minecraft Version:** `1.21` 12 | - **Loader:** `Fabric` 13 | - **Difficulty:** `1.0/10` (Beginner) 14 | - **Required JVM Args:** `N/A` 15 | - **Required Mods:** 16 | - [Fabric API](https://modrinth.com/mod/fabric-api/versions?g=1.21) 17 | 18 | --- 19 | 20 | ## 🛠️ Setup Instructions 21 | 1. **Install Fabric** for 1.21. 22 | 2. Place the client JAR in your `mods` folder. 23 | 3. Launch Minecraft with Fabric. 24 | 25 | **Verification:** 26 | - 🏆 Success: Client fully loads into game without errors. 27 | - 🔒 Failure: Crashes your game. 28 | 29 | **Protection:** 30 | - 🧬 Obfuscation: ✅ Light 31 | - ⏰ Verification Timing: Initialization 32 | 33 | --- 34 | 35 | ## 🔍 Hints (Click to Reveal) 36 |
37 | 🚩 1st Hint 38 | 39 | 1. **Authentication System:** 40 | - The client uses offline-mode auth (no server checks). 41 |
42 | 43 |
44 | 🚩 2nd Hint 45 | 46 | 2. **HWID Generation:** 47 | - References `System.getenv` & `System.getProperty` 48 |
49 | 50 | --- 51 | -------------------------------------------------------------------------------- /xyla/README.MD: -------------------------------------------------------------------------------- 1 |

Xyla Client Crackme

2 | 3 |

4 | A beginner-friendly reverse engineering challenge for Minecraft 1.21 (Fabric) 5 |

6 | 7 | --- 8 | ### Download: https://workupload.com/file/Cqnb3UwDFQv 9 | 10 | ## 📌 Basic Information 11 | - **Minecraft Version:** `1.21` 12 | - **Loader:** `Fabric` 13 | - **Difficulty:** `2/10` (Beginner) 14 | - **Required JVM Args:** `N/A` 15 | - **Required Mods:** 16 | - [Fabric API](https://modrinth.com/mod/fabric-api/versions?g=1.21) 17 | 18 | --- 19 | 20 | ## 🛠️ Setup Instructions 21 | 1. **Install Fabric** for 1.21. 22 | 2. Place the client JAR in your `mods` folder. 23 | 3. Launch Minecraft with Fabric. 24 | 25 | **Verification:** 26 | - 🏆 Success: Client fully loads into game without errors. 27 | - 🔒 Failure: Crashes your game. 28 | 29 | **Protection:** 30 | - 🧬 Obfuscation: ❌ 31 | - ⏰ Verification Timing: Initialization 32 | 33 | --- 34 | 35 | ## 🔍 Hints (Click to Reveal) 36 |
37 | 🚩 1st Hint 38 | 39 | 1. **Auth Package:** 40 | - ```me.steinborn.krypton.api.auth``` 41 |
42 | 43 |
44 | 🚩 2nd Hint 45 | 46 | 2. **HWID Whitelist:** 47 | - Search for string contains "pastebin" (Find the correct link, there are 2 with different purpose each). 48 |
49 | 50 |
51 | 🚩 3rd Hint 52 | 53 | 3. **Spoofing Values:** 54 | - Spoof the fields/variables with your own infromation (UserInstance.class). 55 |
56 | 57 | --- 58 | --------------------------------------------------------------------------------