|
[分享]2012最新破解工具箱
为神马下不了 说什么种子文件不存在 |
|
[原创]中秋送礼 TP游戏MASM驱动最新源代码大放送
哈哈 谢谢了 我下下来瞅瞅 |
|
[公告]祝大家中秋快乐,阖家欢乐!
准备先休息几天 然后出去玩。 |
|
[分享]放个邀请码出来
支持一下泉哥: AA8E8CC6EC0B6925CF5BAC5C55AC0* * 代表数字,看看谁运气好吧,领到邀请码的在下面回个确认贴。 请大家遵守看雪各版版规 祝大家中秋 国庆快乐 |
|
[分享]Exploit 编写系列教程 1-10合集 [修正]
收下了 非常感谢泉哥 |
|
[推荐]大象的教程(CE使用视频)
感谢楼主分享 |
|
[求助]代码变形乱序还原
是我理解错了, 貌似见过这个方法。 |
|
[求助]代码变形乱序还原
一般是在函数入口点处修改,用一个call调用 直接到自己的代码处 执行完自己的程序在回来执行原程序的代码。 感染型病毒一般这样干 也不排除别的 call调用里面主要是自己的代码,一般是加密的。但是他要执行自己的代码肯定得解密。所以你要分析call里面的循环部分(一般就是解密函数)。 Note: 直接用OD加载 进call里面,动态调试 或者IDA用idc脚本或者python都是可以的。 我一般是用OD解密完了再dump出来 用IDA加载分析。 |
|
[分享]一个小把戏
哈哈 逗你玩~~~ |
|
[注意]测试你的肺活量,按住键盘0,憋气,看你能有多少行,男人不做假!
00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 |
|
[原创]脱壳入门初级教学
好好学习 天天脱壳 |
|
[初级]用实例讲解OllyICE(OllyDBG)破解一个商业时间限制软件[原创]
写的不错 菜鸟看懂了 |
|
[原创]一次艰难的渗透纪实
哈哈 谢谢楼主奉献, 原创威武 |
|
[讨论]一个面试官的问题
方法?? 一个神奇的问题! 理解不了 |
|
[注意]测试你的肺活量,按住键盘0,憋气,看你能有多少行,男人不做假!
00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 |
|
[原创]虚拟机检测技术剖析
拜读,学习中 |
|
[分享]Android最佳学习路线图
介绍的不错 支持支持 |
|
|
|
[推荐]《BackTrack 4: 利用渗透测试保证系统安全》出版了
吼吼,不错的一本书。 |
操作理由
RANk
{{ user_info.golds == '' ? 0 : user_info.golds }}
雪币
{{ experience }}
课程经验
{{ score }}
学习收益
{{study_duration_fmt}}
学习时长
基本信息
荣誉称号:
{{ honorary_title }}
能力排名:
No.{{ rank_num }}
等 级:
LV{{ rank_lv-100 }}
活跃值:
在线值:
浏览人数:{{ visits }}
最近活跃:{{ last_active_time }}
注册时间:{{ user_info.create_date_jsonfmt }}
勋章
兑换勋章
证书
证书查询 >
能力值