|
[原创] 不公开了
论坛是越来越不行了啊 发站内信好像都不能发了 |
|
[原创]Ollydbg2.0汉化修正第二版,修正窗口汉字显示不全问题,修正了之前网上汉化部份错误
好了重新弄了一下,可以了应该 |
|
[讨论]找一下比我注册早的会员~~嘎嘎
2004的飘过曾今N年没上过看雪 |
|
内容已删除
那token就是clientkey 快速登录用的,加上token前面的time就是clientkey了 |
|
[下载]OllyDbg 2.01 beta 2 (API文档更新)
dump窗口不支持ascii字符串显示,这问题好像一直没改 |
|
[原创][推荐]OllyDBG 数据转换和反汇编代码插件 2011-3-2更新
希望在复制asm的时候 可以加上c格式跟delphi格式的,那个复制子过程比较方便省了很多时间,如果有c的格式跟delphi的格式那就更方便了 _declspec(naked) XXXXXX() { _asm{ } } prodecure XXXXXX();stdcall asm jxx @XXX @XXX: end; |
|
[讨论]某某程序答题简单分析
qq幻想的答题,我这里有识别%75左右有些还是要手工答的 输错就死了。。 |
|
[求助]请大家帮我看看这是什么算法,找一些特征找不到
00588000 81EC A8000000 sub esp, 0A8 00588006 53 push ebx 00588007 55 push ebp 00588008 8BAC24 B8000000 mov ebp, dword ptr ss:[esp+B8] 0058800F 56 push esi 00588010 57 push edi 00588011 6A 04 push 4 00588013 8D4424 18 lea eax, dword ptr ss:[esp+18] 00588017 50 push eax 00588018 8D8C24 80000000 lea ecx, dword ptr ss:[esp+80] 0058801F C64424 1C 63 mov byte ptr ss:[esp+1C], 63 00588024 C64424 1D 6F mov byte ptr ss:[esp+1D], 6F 00588029 C64424 1E 7E mov byte ptr ss:[esp+1E], 7E 0058802E C64424 1F CD mov byte ptr ss:[esp+1F], 0CD 00588033 C64424 18 27 mov byte ptr ss:[esp+18], 27 00588038 C64424 19 F8 mov byte ptr ss:[esp+19], 0F8 0058803D C64424 1A D2 mov byte ptr ss:[esp+1A], 0D2 00588042 C64424 1B FF mov byte ptr ss:[esp+1B], 0FF 00588047 E8 14FBFFFF call Game.00587B60 0058804C 6A 04 push 4 0058804E 8D4C24 14 lea ecx, dword ptr ss:[esp+14] 00588052 51 push ecx 00588053 8D8C24 A0000000 lea ecx, dword ptr ss:[esp+A0] 0058805A E8 01FBFFFF call Game.00587B60 0058805F 90 nop 00588060 E8 8BF8FFFF call Game.005878F0 00588065 0FB6F0 movzx esi, al 00588068 E8 83F8FFFF call Game.005878F0 0058806D 0FB6F8 movzx edi, al 00588070 E8 7BF8FFFF call Game.005878F0 00588075 0FB6D8 movzx ebx, al 00588078 E8 73F8FFFF call Game.005878F0 0058807D C1E6 08 shl esi, 8 00588080 0BF7 or esi, edi 00588082 C1E6 08 shl esi, 8 00588085 0BF3 or esi, ebx 00588087 0FB6C0 movzx eax, al 0058808A C1E6 08 shl esi, 8 0058808D 0BC6 or eax, esi 0058808F 3D DC495ACD cmp eax, CD5A49DC 00588094 ^ 73 CA jnb short Game.00588060 00588096 8B8C24 BC000000 mov ecx, dword ptr ss:[esp+BC] 0058809D 33D2 xor edx, edx 0058809F 895424 18 mov dword ptr ss:[esp+18], edx 005880A3 895424 1C mov dword ptr ss:[esp+1C], edx 005880A7 895424 20 mov dword ptr ss:[esp+20], edx 005880AB 895424 24 mov dword ptr ss:[esp+24], edx 005880AF 895424 28 mov dword ptr ss:[esp+28], edx 005880B3 895424 2C mov dword ptr ss:[esp+2C], edx 005880B7 894C24 18 mov dword ptr ss:[esp+18], ecx 005880BB 895424 30 mov dword ptr ss:[esp+30], edx 005880BF 894424 1C mov dword ptr ss:[esp+1C], eax 005880C3 B9 08000000 mov ecx, 8 005880C8 8D7424 18 lea esi, dword ptr ss:[esp+18] 005880CC 8D7C24 38 lea edi, dword ptr ss:[esp+38] 005880D0 8D5424 78 lea edx, dword ptr ss:[esp+78] 005880D4 C74424 34 02000000 mov dword ptr ss:[esp+34], 2 005880DC F3:A5 rep movsd 005880DE 52 push edx 005880DF 8D4C24 3C lea ecx, dword ptr ss:[esp+3C] 005880E3 E8 38FDFFFF call Game.00587E20 005880E8 B9 08000000 mov ecx, 8 005880ED 8D7424 18 lea esi, dword ptr ss:[esp+18] 005880F1 8D7C24 58 lea edi, dword ptr ss:[esp+58] 005880F5 8D8424 98000000 lea eax, dword ptr ss:[esp+98] 005880FC F3:A5 rep movsd 005880FE 50 push eax 005880FF 8D4C24 5C lea ecx, dword ptr ss:[esp+5C] 00588103 E8 18FDFFFF call Game.00587E20 00588108 6A 04 push 4 0058810A 55 push ebp 0058810B 8D4C24 40 lea ecx, dword ptr ss:[esp+40] 0058810F E8 FCFAFFFF call Game.00587C10 00588114 6A 04 push 4 00588116 83C5 04 add ebp, 4 00588119 55 push ebp 0058811A 8D4C24 60 lea ecx, dword ptr ss:[esp+60] 0058811E E8 EDFAFFFF call Game.00587C10 00588123 5F pop edi 00588124 5E pop esi 00588125 5D pop ebp 00588126 5B pop ebx 00588127 81C4 A8000000 add esp, 0A8 0058812D C3 retn |
|
[求助]请大家帮我看看这是什么算法,找一些特征找不到
005883E0 81EC A0040000 sub esp, 4A0 005883E6 A1 3C2F6B00 mov eax, dword ptr ds:[6B2F3C] 005883EB 33C4 xor eax, esp 005883ED 53 push ebx 005883EE 55 push ebp 005883EF 8BAC24 B4040000 mov ebp, dword ptr ss:[esp+4B4] 005883F6 56 push esi 005883F7 8BB424 B0040000 mov esi, dword ptr ss:[esp+4B0] 005883FE 57 push edi 005883FF 898424 AC040000 mov dword ptr ss:[esp+4AC], eax 00588406 E8 E5F4FFFF call Game.005878F0 ; GetTickCount 0058840B 0FB6F8 movzx edi, al 0058840E E8 DDF4FFFF call Game.005878F0 ; GetTickCount 00588413 0FB6C0 movzx eax, al 00588416 894424 14 mov dword ptr ss:[esp+14], eax 0058841A E8 D1F4FFFF call Game.005878F0 ; GetTickCount 0058841F 0FB6C8 movzx ecx, al 00588422 898C24 8C040000 mov dword ptr ss:[esp+48C], ecx 00588429 E8 C2F4FFFF call Game.005878F0 ; GetTickCount 0058842E 8B5424 14 mov edx, dword ptr ss:[esp+14] 00588432 C1E7 08 shl edi, 8 00588435 0BFA or edi, edx 00588437 0FB6D8 movzx ebx, al 0058843A 8B8424 8C040000 mov eax, dword ptr ss:[esp+48C] 00588441 C1E7 08 shl edi, 8 00588444 0BF8 or edi, eax 00588446 8D9424 8C040000 lea edx, dword ptr ss:[esp+48C] 0058844D C1E7 08 shl edi, 8 00588450 52 push edx 00588451 0BDF or ebx, edi 00588453 53 push ebx 00588454 E8 A7FBFFFF call Game.00588000 00588459 0FB68424 97040000 movzx eax, byte ptr ss:[esp+497] 00588461 0FB68C24 96040000 movzx ecx, byte ptr ss:[esp+496] 00588469 0FB69424 95040000 movzx edx, byte ptr ss:[esp+495] 00588471 C1E0 08 shl eax, 8 00588474 0BC1 or eax, ecx 00588476 0FB68C24 94040000 movzx ecx, byte ptr ss:[esp+494] 0058847E C1E0 08 shl eax, 8 00588481 0BC2 or eax, edx 00588483 C1E0 08 shl eax, 8 00588486 0BC1 or eax, ecx 00588488 894424 1C mov dword ptr ss:[esp+1C], eax 0058848C 66:8B8424 9A040000 mov ax, word ptr ss:[esp+49A] 00588494 0FB6D4 movzx edx, ah 00588497 0FB6C0 movzx eax, al 0058849A C1E2 08 shl edx, 8 0058849D 0BD0 or edx, eax 0058849F 8B8424 98040000 mov eax, dword ptr ss:[esp+498] 005884A6 0FB6CC movzx ecx, ah 005884A9 C1E2 08 shl edx, 8 005884AC 0BD1 or edx, ecx 005884AE 0FB6C0 movzx eax, al 005884B1 C1E2 08 shl edx, 8 005884B4 0BD0 or edx, eax 005884B6 8D8424 88040000 lea eax, dword ptr ss:[esp+488] 005884BD 8D7C24 1C lea edi, dword ptr ss:[esp+1C] 005884C1 895424 20 mov dword ptr ss:[esp+20], edx 005884C5 E8 86F4FFFF call Game.00587950 005884CA 8B8424 8D040000 mov eax, dword ptr ss:[esp+48D] 005884D1 0FB69424 8F040000 movzx edx, byte ptr ss:[esp+48F] 005884D9 C1E2 08 shl edx, 8 005884DC 8D8C24 94040000 lea ecx, dword ptr ss:[esp+494] 005884E3 51 push ecx 005884E4 0FB6CC movzx ecx, ah 005884E7 0BD1 or edx, ecx 005884E9 0FB68C24 90040000 movzx ecx, byte ptr ss:[esp+490] 005884F1 C1E2 08 shl edx, 8 005884F4 0FB6C0 movzx eax, al 005884F7 0BD0 or edx, eax 005884F9 0FB68424 8E040000 movzx eax, byte ptr ss:[esp+48E] 00588501 C1E2 08 shl edx, 8 00588504 0BD1 or edx, ecx 00588506 0FB68C24 8D040000 movzx ecx, byte ptr ss:[esp+48D] 0058850E 52 push edx 0058850F 0FB69424 93040000 movzx edx, byte ptr ss:[esp+493] 00588517 C1E2 08 shl edx, 8 0058851A 0BD0 or edx, eax 0058851C 0FB68424 90040000 movzx eax, byte ptr ss:[esp+490] 00588524 C1E2 08 shl edx, 8 00588527 0BD1 or edx, ecx 00588529 C1E2 08 shl edx, 8 0058852C 0BD0 or edx, eax 0058852E 52 push edx 0058852F E8 FCFBFFFF call Game.00588130 00588534 83C4 14 add esp, 14 00588537 8D8C24 24040000 lea ecx, dword ptr ss:[esp+424] 0058853E C78424 24040000 00386700 mov dword ptr ss:[esp+424], Game.00673800 00588549 E8 72E6FFFF call Game.00586BC0 0058854E 8BCB mov ecx, ebx 00588550 C1E9 08 shr ecx, 8 00588553 8BD3 mov edx, ebx 00588555 885C24 10 mov byte ptr ss:[esp+10], bl 00588559 6A 04 push 4 0058855B 8D4424 14 lea eax, dword ptr ss:[esp+14] 0058855F 884C24 15 mov byte ptr ss:[esp+15], cl 00588563 C1EA 10 shr edx, 10 00588566 C1EB 18 shr ebx, 18 00588569 50 push eax 0058856A 8D8C24 2C040000 lea ecx, dword ptr ss:[esp+42C] 00588571 885424 1A mov byte ptr ss:[esp+1A], dl 00588575 885C24 1B mov byte ptr ss:[esp+1B], bl 00588579 E8 72E6FFFF call Game.00586BF0 0058857E 8B8424 B8040000 mov eax, dword ptr ss:[esp+4B8] 00588585 8BC8 mov ecx, eax 00588587 8BD0 mov edx, eax 00588589 884424 10 mov byte ptr ss:[esp+10], al 0058858D C1E8 18 shr eax, 18 00588590 C1E9 08 shr ecx, 8 00588593 884424 13 mov byte ptr ss:[esp+13], al 00588597 6A 04 push 4 00588599 8D4424 14 lea eax, dword ptr ss:[esp+14] 0058859D 884C24 15 mov byte ptr ss:[esp+15], cl 005885A1 C1EA 10 shr edx, 10 005885A4 50 push eax 005885A5 8D8C24 2C040000 lea ecx, dword ptr ss:[esp+42C] 005885AC 885424 1A mov byte ptr ss:[esp+1A], dl 005885B0 E8 3BE6FFFF call Game.00586BF0 005885B5 8D8C24 24040000 lea ecx, dword ptr ss:[esp+424] 005885BC E8 8FE6FFFF call Game.00586C50 005885C1 8B9424 34040000 mov edx, dword ptr ss:[esp+434] 005885C8 8B8424 38040000 mov eax, dword ptr ss:[esp+438] 005885CF 8B8C24 30040000 mov ecx, dword ptr ss:[esp+430] 005885D6 899424 A0040000 mov dword ptr ss:[esp+4A0], edx 005885DD 6A 10 push 10 005885DF 8D9424 A0040000 lea edx, dword ptr ss:[esp+4A0] 005885E6 898424 A8040000 mov dword ptr ss:[esp+4A8], eax 005885ED 898C24 A0040000 mov dword ptr ss:[esp+4A0], ecx 005885F4 8B8C24 40040000 mov ecx, dword ptr ss:[esp+440] 005885FB 52 push edx 005885FC 8D4424 24 lea eax, dword ptr ss:[esp+24] 00588600 50 push eax 00588601 898C24 B4040000 mov dword ptr ss:[esp+4B4], ecx 00588608 E8 33060000 call Game.00588C40 0058860D 8B9424 98040000 mov edx, dword ptr ss:[esp+498] 00588614 8B8424 9C040000 mov eax, dword ptr ss:[esp+49C] 0058861B 8BCD mov ecx, ebp 0058861D 8911 mov dword ptr ds:[ecx], edx 0058861F 8B9424 A0040000 mov edx, dword ptr ss:[esp+4A0] 00588626 8941 04 mov dword ptr ds:[ecx+4], eax 00588629 8B8424 A4040000 mov eax, dword ptr ss:[esp+4A4] 00588630 8951 08 mov dword ptr ds:[ecx+8], edx 00588633 8941 0C mov dword ptr ds:[ecx+C], eax 00588636 8A8C24 94040000 mov cl, byte ptr ss:[esp+494] 0058863D 884D 10 mov byte ptr ss:[ebp+10], cl 00588640 8B06 mov eax, dword ptr ds:[esi] 00588642 83C5 10 add ebp, 10 00588645 45 inc ebp 00588646 8BC8 mov ecx, eax 00588648 C1E9 08 shr ecx, 8 0058864B 884D 01 mov byte ptr ss:[ebp+1], cl 0058864E 8845 00 mov byte ptr ss:[ebp], al 00588651 8BC8 mov ecx, eax 00588653 C1E9 10 shr ecx, 10 00588656 C1E8 18 shr eax, 18 00588659 884D 02 mov byte ptr ss:[ebp+2], cl 0058865C 8845 03 mov byte ptr ss:[ebp+3], al 0058865F 8B1E mov ebx, dword ptr ds:[esi] 00588661 C1E3 04 shl ebx, 4 00588664 8BD5 mov edx, ebp 00588666 83C5 04 add ebp, 4 00588669 8BCB mov ecx, ebx 0058866B 83C6 08 add esi, 8 0058866E 8BC1 mov eax, ecx 00588670 C1E9 02 shr ecx, 2 00588673 8BFD mov edi, ebp 00588675 F3:A5 rep movsd 00588677 2BEA sub ebp, edx 00588679 8BC8 mov ecx, eax 0058867B 83E1 03 and ecx, 3 0058867E 03EB add ebp, ebx 00588680 55 push ebp 00588681 F3:A4 rep movsb 00588683 52 push edx 00588684 8D4C24 30 lea ecx, dword ptr ss:[esp+30] 00588688 51 push ecx 00588689 E8 A2060000 call Game.00588D30 0058868E 8B8C24 C4040000 mov ecx, dword ptr ss:[esp+4C4] 00588695 83C4 18 add esp, 18 00588698 5F pop edi 00588699 5E pop esi 0058869A 5D pop ebp 0058869B 8D43 15 lea eax, dword ptr ds:[ebx+15] 0058869E 5B pop ebx 0058869F 33CC xor ecx, esp 005886A1 E8 F3920900 call Game.00621999 005886A6 81C4 A0040000 add esp, 4A0 005886AC C3 retn |
|
美化ODDragAttach 嘿嘿
至少看起来整齐好看多了 |
|
[原创]让Immunity Debugger v1.73 支持所有OD插件
_IMMDBG_ 修改成_ODBG_ 后面还有函数的不能用ue替换要手动修改, 14个函数 因为_ODBG_少了两个字节所以要把后面的拉到前面来,最后多出两位用0填充 |
|
[原创]让Immunity Debugger v1.73 支持所有OD插件
修改不好意思打错字了 |
|
|
操作理由
RANk
{{ user_info.golds == '' ? 0 : user_info.golds }}
雪币
{{ experience }}
课程经验
{{ score }}
学习收益
{{study_duration_fmt}}
学习时长
基本信息
荣誉称号:
{{ honorary_title }}
能力排名:
No.{{ rank_num }}
等 级:
LV{{ rank_lv-100 }}
活跃值:
在线值:
浏览人数:{{ visits }}
最近活跃:{{ last_active_time }}
注册时间:{{ user_info.create_date_jsonfmt }}
勋章
兑换勋章
证书
证书查询 >
能力值