|
|
|
[原创]Armadillo v6.04 Custom Build 0056, 0335, 0447 Cracked
现在我只是游览论坛而已。。。很少release crack因为比较忙。。。 |
|
Armadillo v4.44 Public Build Cracked
最初由 gkend 发布 i cannot do anything about it....only public build downloadable from the site. if u can supply the custom build i can crack it for u.... |
|
Armadillo v4.44 Public Build Cracked
public build does not have nanomites, IT elimination, strategic code splicing features.... |
|
[下载]ASProtect.v.1.35.build.04.25.Release.WinAll.Incl.Keygenerator-TMG
....TMG always rock...and a sad day for ASProtect author... |
|
[?考](LoveBoom) ASProtect SKE 2.X +Stolen Code ??
最初由 syscom 发布 yes the first option is the fastest way to fix the VM... btw, i already fully unpack the above program and release it to the net(if u know where to find my crack)...it's took me about 2-3 hours to recover the VM.. |
|
[?考](LoveBoom) ASProtect SKE 2.X +Stolen Code ??
最初由 南蛮妈妈 发布 u have 2 options 1 is dump the section and add it at the end of the dumped file.. 2 is recover the original code here is the code for location 409de4 MOV EDX,EDI MOV EDI,EAX MOV ECX,-1 XOR EAX,EAX REPNE SCAS BYTE PTR ES:[EDI] LEA EAX,DWORD PTR DS:[EDI-1] MOV EDI,EDX RETN |
|
Armadillo V4.40主程序脱壳
最初由 heXer 发布 thanks i found that two locations... @fly custom build has this problem ...but the beta custom build does not has this problem... |
|
Armadillo V4.40主程序脱壳
hi fly, do u able to protect an exe using the unpacked version? all my program get general extraction error when protected with the unpacked version.... i'm still not able to find out how arma detect itself being unpacked.... |
|
OdllyDbg + ASProtect 2.0x 高速?? (?例)
最初由 VolX 发布 the above code is never get executed... i found more than 1 like the above code in the code section...but all never get called.. check this code 0108F315 3B45 FC CMP EAX,DWORD PTR SS:[EBP-4] 0108F318 75 45 JNZ SHORT 0108F35F 0108F31A EB 01 JMP SHORT 0108F31D 0108F31C 9A 807B7400 742>CALL FAR 2274:00747B80 ; Far call 0108F323 EB 01 JMP SHORT 0108F326 0108F325 9A 8B451050 8B4>CALL FAR 458B:5010458B ; Far call 0108F32C 14 50 ADC AL,50 0108F32E E8 25F7FFFF CALL 0108EA58 0108F333 50 PUSH EAX 0108F334 8BCE MOV ECX,ESI 0108F336 8B55 18 MOV EDX,DWORD PTR SS:[EBP+18] 0108F339 8BC3 MOV EAX,EBX 0108F33B E8 44FCFFFF CALL 0108EF84 <--this is the call use to determine the call/jump type in this latest version... 0108F340 EB 1D JMP SHORT 0108F35F 0108F342 EB 01 JMP SHORT 0108F345 0108F344 - E9 8B451050 JMP 511938D4 0108F349 8B45 14 MOV EAX,DWORD PTR SS:[EBP+14] 0108F34C 50 PUSH EAX 0108F34D E8 06F7FFFF CALL 0108EA58 0108F352 50 PUSH EAX 0108F353 8BCE MOV ECX,ESI 0108F355 8B55 18 MOV EDX,DWORD PTR SS:[EBP+18] 0108F358 8BC3 MOV EAX,EBX 0108F35A E8 A9FDFFFF CALL 0108F108 <--this is the call to determine call/jump type in previous version but in this version it's never get executed... 0108F35F 4F DEC EDI 0108F360 0373 6C ADD ESI,DWORD PTR DS:[EBX+6C] 0108F363 85FF TEST EDI,EDI 0108F365 ^ 77 A0 JA SHORT 0108F307 0108F367 68 84F30801 PUSH 108F384 ; ASCII "111 " 0108F36C E8 375DFFFF CALL 010850A8 ...no time to get more analysis on this new aspr VM...maybe after there is a working reg key that we can protect our own exe which make the work much easier... |
|
OdllyDbg + ASProtect 2.0x 高速?? (?例)
最初由 VolX 发布 it's asprotect itself... here is the post at exetools http://www.exetools.com/forum/showthread.php?t=7667&highlight=asprotect |
|
OdllyDbg + ASProtect 2.0x 高速?? (?例)
the VM (stolen code) of aspr has been updated in the latest version 2.2 beta...this version of VM is quite hard to recover...i still dun know how aspr determine the type of jump.... |
|
有点怪的脱壳后平台运行倒闭?
hi try to test this unpacked file , i do not have win98 so cannot test... i use back the IAT from the original file... ... 附件:unsplitted.rar |
|
[原创]ACProtect1.41-同益起名 完美脱壳
....hao bian tai..pfpf |
|
王子进来一下,脚本请教
最初由 hnhuqiong 发布 try this... find eip,#720D3C577709# mov jmp1,$RESULT find eip,#c60768# //jmp mov jmp2,$RESULT eval "jmp {jmp2}" asm jmp1,$RESULT |
|
MoleBox Pro v2.4.0.1805 零售版
最初由 ww66 发布 ur patch is not working...please use my original patch.exe... |
|
脱壳之路能走多远?
nothing is impossible....it's just matter of time.... |
|
[讨论]看了《二哥正式退出Debug和Unpack生涯》后的感想
haih... after reading "二哥正式退出Debug和Unpack生涯"... i felt my situation is a bit similar to him... this one and a half year, always sit in front of the computer,debug, unpack and crack....and seldom go out with frens... now really getting bored with this kind of stuff... i think have to take some time to learn some other things.... |
操作理由
RANk
{{ user_info.golds == '' ? 0 : user_info.golds }}
雪币
{{ experience }}
课程经验
{{ score }}
学习收益
{{study_duration_fmt}}
学习时长
基本信息
荣誉称号:
{{ honorary_title }}
能力排名:
No.{{ rank_num }}
等 级:
LV{{ rank_lv-100 }}
活跃值:
在线值:
浏览人数:{{ visits }}
最近活跃:{{ last_active_time }}
注册时间:{{ user_info.create_date_jsonfmt }}
勋章
兑换勋章
证书
证书查询 >
能力值