This repository contains my reverse engineering walkthrough and patch for the classic CrackMe challenge by The Dutch Cracker (TDC).
π Part of my coursework for Malware Analysis and Cyber Defence
π οΈ Reverse engineered and patched in under 12 hours
β¨ Goal: Turn a nagging binary into a grateful one
- Remove the nag screen at startup
- Make the "Re-Check" button display:
"Thank you for registering this software"
- Change the status box to:
"Clean crack! Good Job!"
remove-the-nag-by-tdc/
βββ README.md # You're reading this!
βββ RemoveTheNag.7z # Original CrackMe binary (unmodified)
βββ patch_notes.md # Patch strategy and byte-level summary
βββ screenshots/ # Before/after snapshots from IDA
β βββ before_patch.png
β βββ after_patch.png
βββ patched_binary.exe # Patched binary if legally shareable
π Read the full Medium article for a fun and philosophical breakdown:
π https://medium.com/
This repository is for educational purposes only.
No copyrighted or malicious software is included or distributed.
Reverse engineering was performed on a publicly available CrackMe intended for legal, academic learning.
- π Donβt trust shiny strings β they distract
- π±οΈ GUI apps need interaction β click before you hack
- π Global variables are the heartbeat of binary state
- π§ββοΈ Reverse engineering is about listening, not brute-forcing
- IDA Free 8.3
- HxD Hex Editor
- Windows 10 VM (FlareVM)
Happy reversing! π―