|
[建议]元宵节 发礼物
提议不错,但发帖的时间掌握的不好,应该在过节的前一天发才会有最佳的效果. |
|
[讨论]kanxue老大,为什么锁我的帖子
看雪论坛就是最大的组织,其他与破解相关的都属于分支.地方要服从中央. |
|
[求助]跪求 破解了的 sockmon2005
www.baidu.com |
|
ASPack 2.x (without poly)的脱壳及脱壳后问题
不是你的错,老王惹的祸. |
|
[加壳软件]ACProtect 2.0 released
RSA我这里直接就读0异常,不知道是为什么.我刚用WinLicense重加了一个,现在看来用不到了,要找一个有杀伤力的壳真是不易啊. |
|
[加壳软件]ACProtect 2.0 released
已经发过去了,用的是鸟壳,有危险哦. 其实我觉得这一版本有放水的嫌疑,没什么大改进,到像是特意诈尸吓人的. |
|
|
|
[加壳软件]ACProtect 2.0 released
除了升级了标号,没什么重大调整,而且是越活越抽抽,已经可以直接NOP了. |
|
如何脱太小文件的壳
发上来看看啊. |
|
送大家一个小玩具:OEPObfuscator
好象还是只能偷几句和一般使用的OEP盗取没什么区别,而盗取的字节数有限就没什么大用.有谁知道ASP是怎么把那么多的代码搬走的吗? 00401366 3C 55 cmp al, 55 00401368 75 16 jnz short 00401380 0040136A B8 0383EC04 mov eax, 4EC8303 0040136F AB stos dword ptr es:[edi] 00401370 B8 03892C24 mov eax, 242C8903 00401375 AB stos dword ptr es:[edi] 00401376 32C0 xor al, al 00401378 8806 mov [esi], al 0040137A 46 inc esi 0040137B E9 D7010000 jmp 00401557 00401380 66:3D 8BEC cmp ax, 0EC8B 00401384 75 1A jnz short 004013A0 00401386 66:B8 0154 mov ax, 5401 0040138A 66:AB stos word ptr es:[edi] 0040138C 66:B8 015D mov ax, 5D01 00401390 66:AB stos word ptr es:[edi] 00401392 66:33C0 xor ax, ax 00401395 66:8906 mov [esi], ax 00401398 83C6 02 add esi, 2 0040139B E9 B7010000 jmp 00401557 004013A0 3C 6A cmp al, 6A 004013A2 75 12 jnz short 004013B6 004013A4 C607 02 mov byte ptr [edi], 2 004013A7 47 inc edi 004013A8 66:A5 movs word ptr es:[edi], word ptr [esi> 004013AA 66:33C0 xor ax, ax 004013AD 66:8946 FE mov [esi-2], ax 004013B1 E9 A1010000 jmp 00401557 004013B6 3C 68 cmp al, 68 004013B8 75 1F jnz short 004013D9 004013BA 66:B8 0150 mov ax, 5001 004013BE 66:AB stos word ptr es:[edi] 004013C0 B8 07C70424 mov eax, 2404C707 004013C5 AB stos dword ptr es:[edi] 004013C6 33C0 xor eax, eax 004013C8 8806 mov [esi], al 004013CA 46 inc esi 004013CB A5 movs dword ptr es:[edi], dword ptr [e> 004013CC 83EE 04 sub esi, 4 004013CF 8906 mov [esi], eax 004013D1 83C6 04 add esi, 4 004013D4 E9 7E010000 jmp 00401557 004013D9 3C 64 cmp al, 64 004013DB 75 5A jnz short 00401437 004013DD 46 inc esi 004013DE 66:8B06 mov ax, [esi] 004013E1 66:3D A100 cmp ax, 0A1 004013E5 75 27 jnz short 0040140E 004013E7 C607 02 mov byte ptr [edi], 2 004013EA 47 inc edi 004013EB 66:B8 33C0 mov ax, 0C033 004013EF 66:AB stos word ptr es:[edi] 004013F1 B8 0364FF30 mov eax, 30FF6403 004013F6 AB stos dword ptr es:[edi] 004013F7 66:B8 0158 mov ax, 5801 004013FB 66:AB stos word ptr es:[edi] 004013FD 46 inc esi 004013FE 33C0 xor eax, eax 00401400 66:8946 FE mov [esi-2], ax 00401404 8906 mov [esi], eax 00401406 83C6 04 add esi, 4 00401409 E9 49010000 jmp 00401557 0040140E 66:3D 8925 cmp ax, 2589 00401412 0F85 3F010000 jnz 00401557 00401418 66:B8 0154 mov ax, 5401 0040141C 66:AB stos word ptr es:[edi] 0040141E B8 07648F05 mov eax, 58F6407 00401423 AB stos dword ptr es:[edi] 00401424 33C0 xor eax, eax 00401426 AB stos dword ptr es:[edi] 00401427 83C6 02 add esi, 2 0040142A 8946 FC mov [esi-4], eax 0040142D 8906 mov [esi], eax 0040142F 83C6 04 add esi, 4 00401432 E9 20010000 jmp 00401557 00401437 3C 50 cmp al, 50 00401439 75 16 jnz short 00401451 0040143B B8 0383EC04 mov eax, 4EC8303 00401440 AB stos dword ptr es:[edi] 00401441 B8 03890424 mov eax, 24048903 00401446 AB stos dword ptr es:[edi] 00401447 32C0 xor al, al 00401449 8806 mov [esi], al 0040144B 46 inc esi 0040144C E9 06010000 jmp 00401557 00401451 3C 53 cmp al, 53 00401453 75 16 jnz short 0040146B 00401455 B8 0383EC04 mov eax, 4EC8303 0040145A AB stos dword ptr es:[edi] 0040145B B8 03891C24 mov eax, 241C8903 00401460 AB stos dword ptr es:[edi] 00401461 32C0 xor al, al 00401463 8806 mov [esi], al 00401465 46 inc esi 00401466 E9 EC000000 jmp 00401557 0040146B 3C 56 cmp al, 56 0040146D 75 16 jnz short 00401485 0040146F B8 0383EC04 mov eax, 4EC8303 00401474 AB stos dword ptr es:[edi] 00401475 B8 03893424 mov eax, 24348903 0040147A AB stos dword ptr es:[edi] 0040147B 32C0 xor al, al 0040147D 8806 mov [esi], al 0040147F 46 inc esi 00401480 E9 D2000000 jmp 00401557 00401485 3C 57 cmp al, 57 00401487 75 16 jnz short 0040149F 00401489 B8 0383EC04 mov eax, 4EC8303 0040148E AB stos dword ptr es:[edi] 0040148F B8 03893C24 mov eax, 243C8903 00401494 AB stos dword ptr es:[edi] 00401495 32C0 xor al, al 00401497 8806 mov [esi], al 00401499 46 inc esi 0040149A E9 B8000000 jmp 00401557 0040149F 66:3D 83C4 cmp ax, 0C483 004014A3 75 15 jnz short 004014BA 004014A5 8B06 mov eax, [esi] 004014A7 C1E0 08 shl eax, 8 004014AA B0 03 mov al, 3 004014AC AB stos dword ptr es:[edi] 004014AD 4E dec esi 004014AE 33C0 xor eax, eax 004014B0 8906 mov [esi], eax 004014B2 83C6 04 add esi, 4 004014B5 E9 9D000000 jmp 00401557 004014BA 66:3D 83EC cmp ax, 0EC83 004014BE 75 1E jnz short 004014DE 004014C0 66:B8 0151 mov ax, 5101 004014C4 66:AB stos word ptr es:[edi] 004014C6 AD lods dword ptr [esi] 004014C7 C1E0 08 shl eax, 8 004014CA B0 03 mov al, 3 004014CC 2D 00000004 sub eax, 4000000 004014D1 AB stos dword ptr es:[edi] 004014D2 83EE 05 sub esi, 5 004014D5 33C0 xor eax, eax 004014D7 8906 mov [esi], eax 004014D9 83C6 04 add esi, 4 004014DC EB 79 jmp short 00401557 004014DE 66:3D 8965 cmp ax, 6589 004014E2 75 12 jnz short 004014F6 004014E4 8B06 mov eax, [esi] 004014E6 C1E0 08 shl eax, 8 004014E9 B0 03 mov al, 3 004014EB AB stos dword ptr es:[edi] 004014EC 4E dec esi 004014ED 33C0 xor eax, eax 004014EF 8906 mov [esi], eax 004014F1 83C6 04 add esi, 4 004014F4 EB 61 jmp short 00401557 004014F6 66:3D C745 cmp ax, 45C7 004014FA 75 27 jnz short 00401523 004014FC 66:B8 0568 mov ax, 6805 00401500 66:AB stos word ptr es:[edi] 00401502 83C6 03 add esi, 3 00401505 A5 movs dword ptr es:[edi], dword ptr [e> 00401506 83EE 05 sub esi, 5 00401509 AC lods byte ptr [esi] 0040150A C1E0 10 shl eax, 10 0040150D 66:B8 8F45 mov ax, 458F 00401511 C1E0 08 shl eax, 8 00401514 B0 03 mov al, 3 00401516 AB stos dword ptr es:[edi] 00401517 33C0 xor eax, eax 00401519 8946 FC mov [esi-4], eax 0040151C 8906 mov [esi], eax 0040151E 83C6 04 add esi, 4 00401521 EB 34 jmp short 00401557 00401523 66:3D 33DB cmp ax, 0DB33 00401527 75 14 jnz short 0040153D 00401529 C607 02 mov byte ptr [edi], 2 0040152C 66:B8 2BDB mov ax, 0DB2B 00401530 66:AB stos word ptr es:[edi] 00401532 66:33C0 xor ax, ax 00401535 66:8906 mov [esi], ax 00401538 83C6 02 add esi, 2 0040153B EB 1A jmp short 00401557 0040153D 66:3D 895D cmp ax, 5D89 00401541 75 12 jnz short 00401555 00401543 8B06 mov eax, [esi] 00401545 C1E0 08 shl eax, 8 00401548 B0 03 mov al, 3 0040154A AB stos dword ptr es:[edi] 0040154B 4E dec esi 0040154C 33C0 xor eax, eax 0040154E 8906 mov [esi], eax 00401550 83C6 04 add esi, 4 00401553 EB 02 jmp short 00401557 00401555 EB 2E jmp short 00401585 00401557 8B06 mov eax, [esi] 00401559 3C E8 cmp al, 0E8 0040155B 74 28 je short 00401585 0040155D 66:3D FF15 cmp ax, 15FF 00401561 74 22 je short 00401585 00401563 66:3D FF25 cmp ax, 25FF 00401567 74 1C je short 00401585 00401569 3C 74 cmp al, 74 0040156B 74 18 je short 00401585 0040156D 3C 75 cmp al, 75 0040156F 74 14 je short 00401585 00401571 3C 76 cmp al, 76 00401573 74 10 je short 00401585 00401575 3C 77 cmp al, 77 00401577 74 0C je short 00401585 00401579 3C E9 cmp al, 0E9 0040157B 74 08 je short 00401585 0040157D 3C EB cmp al, 0EB 0040157F ^ 0F85 E1FDFFFF jnz 00401366 |
|
送大家一个小玩具:OEPObfuscator
明天到了. |
|
[原创][下载]PEEK 0.6
更新的太快了,还是改用小版本号吧,否则两天就到1.0了. |
|
[原创][下载]PEEK 0.6
支持设顶. |
|
[求助]我想添加一些壳的信息到PEID数据库,怎么用OD查看壳的信息?
就是就是,FLY的坛子里有收集好的,直接下载就是了,自己做多累啊. |
|
[求助]我想添加一些壳的信息到PEID数据库,怎么用OD查看壳的信息?
不是有专门的工具吗? |
|
情报 : 微软对 kernel mode driver 的管制开始
最初由 dwing 发布 这么说WinLicense是给套进去了. |
|
我对混淆代码的粗浅认识
我觉得如果榨干全部水份,有用的代码实际上能有10%就不错.可能是这一部分认为有用的代码+下面认为有用的代码+下下面的......共同组成了一个没用的东西. |
|
[分享]SVK-Protector.v1.44汉化特别版-中国黑客小组
要求权限是11. 不过我并不认为是真的,这种东西应该是在EXETOOLS上首发才对,而且要先脱壳才行,能拿到主程序又能在这么短的时间里脱壳并修复所有SDK的应该不是什么黑客小组的人,估计又是谁拿evaluator的脱壳版PS的. |
|
[原创]如何利用病毒技术来进行脱壳。
我最喜欢的标准蛋蛋式收尾方式. |
操作理由
RANk
{{ user_info.golds == '' ? 0 : user_info.golds }}
雪币
{{ experience }}
课程经验
{{ score }}
学习收益
{{study_duration_fmt}}
学习时长
基本信息
荣誉称号:
{{ honorary_title }}
能力排名:
No.{{ rank_num }}
等 级:
LV{{ rank_lv-100 }}
活跃值:
在线值:
浏览人数:{{ visits }}
最近活跃:{{ last_active_time }}
注册时间:{{ user_info.create_date_jsonfmt }}
勋章
兑换勋章
证书
证书查询 >
能力值