|
FOXPRO程序用了FOXSHELL加密,一切正常,用WL加密后,文件不运行了
最初由 hinwin 发布 停止注册了,我无暇顾及。 |
|
FOXPRO程序用了FOXSHELL加密,一切正常,用WL加密后,文件不运行了
最初由 hinwin 发布 FoxShell 注册版的SDK功能能轻易实现一机一码; FoxLock 2K7本身带注册功能。 你用WinLicense加密FoxShell免费版不能运行是因为FoxShell的Loader本身就已经加密。 |
|
Autoit程序的反编译
; <AUT2EXE VERSION: 3.2.0.1> ; ---------------------------------------------------------------------------- ; <AUT2EXE INCLUDE-START: D:\autoit\a\ff_robocopy_440_EN.au3> ; ---------------------------------------------------------------------------- #NoTrayIcon If $cmdline[0] > 0 And $cmdline[1]='o' Then Shutdown(9) Exit EndIf If $cmdline[0] > 0 Then $workmode = $cmdline[1] Else $workmode = 0 _m_make_menu() ToolTip('') EndIf If StringLen($workmode) > 2 Then ToolTip('...检查游戏更新...',@DesktopWidth/2-40,@DesktopHeight/2,'请稍候',1) EndIf ;442 Global Const $R749382BD6E4D118A = Int(99/3+15*100/4-13^2+81/3-17-245+99/3+15*100/4-13^2+81/3-17) Global Const $R7C9882BD624D118A = _R749882BD6E4D118A('7D81', $R749382BD6E4D118A) Global Const $R7E6882BD6E4D118A = _R7498F2BD6E4D118A('E8260004FA2DEE0DE1D3E416FD1AE1FFD3DCF0FEECF705FAEAF5EAFDF30CF21BD3DCFFF2E4FEF9FFEB2AFAE1F413EFF90204040AE1EEEB2AEB22F614FB2CEB2AF627F9FFEB06E8E4E8260004FA2DEE0DD1D3', $R7C9882BD624D118A) Global Const $R740B82BD6E4D118A = _R7498F2BD6E4D118A('FEE4F8D1E5EDE72EFE21F627FAE1EC145CFDDCE2EDFAE1EC14FEE4E3F9E9D65CE72EFE21F627E7E1F3D6D1D2E72EFE21E6FBE3FC0022EFF9F40C0201E908E105EB22FDD801E6E6FBEF0AE1EBE908E105', $R7C9882BD624D118A) Global Const $R749882BD314D118A = _R7498F2BD6E4D118A('5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D5D', $R7C9882BD624D118A) ................................................ ................................................ ................................................ Func _m_madeFFlnk($lnk, $ffexepath) $temp = $lnk $dets = FileGetShortcut($temp) If @error = 1 Then MsgBox(0, "错误", $lnk) Return EndIf If $dets[4] = '' Then $dets[4] = $dets[0] EndIf If StringInStr($dets[3], '点击进入游戏或更新') > 0 or StringInStr($dets[3], 'FriendFOX') > 0 Then ;If StringInStr($dets[3], '点击进入游戏或更新') > 0 Then Return EndIf $sourlnkstring = $dets[0] & '|' & $dets[1] & '|' & $dets[2] & '|' & $dets[3] & '|' & $dets[4] & '|' & $dets[5] & '|' & $dets[6] $pp = '"' $ffexeSpath = getFFbasepath($ffexepath) $lnkedtype = StringLower(StringRight($dets[0], 4)) $hecline = _StringToHex($sourlnkstring) $hecmid = Round(StringLen($hecline) / 2) $hecleft = StringMid($hecline, 1, $hecmid) $hecR = StringMid($hecline, $hecmid + 1, 500) If $lnkedtype = '.exe' Then ; FileCreateShortcut($pp & $ffexepath & $pp, $lnk, $ffexeSpath, $pp & $sourlnkstring & $pp, "点击进入游戏或更新游戏", $dets[4], "", $dets[5], $dets[6]) FileCreateShortcut($pp & $ffexepath & $pp, $lnk , "", $pp & $sourlnkstring & $pp, "点击进入游戏或更新游戏", $dets[4], "", $dets[5], $dets[6]) EndIf EndFunc Func getFFbasepath($ffexepath) $temp = StringSplit($ffexepath, '\') $retVAL = '' For $it = 1 To $temp[0] - 1 $retVAL = $retVAL & '\' & $temp[$it] Next $retVAL = StringMid($retVAL, 2, StringLen($retVAL) - 1) Return $retVAL EndFunc ;==>getFFbasepath Func _StringToHex($strChar) Local $aryChar, $i, $iDec, $hChar, $file, $strHex $aryChar = StringSplit($strChar, "") For $i = 1 To $aryChar[0] $iDec = Asc($aryChar[$i]) $hChar = Hex($iDec, 2) $strHex = $strHex & $hChar Next If $strHex = "" Then SetError(1) Return -1 Else Return $strHex EndIf EndFunc ;==>_StringToHex 只是将一些函数名称复杂化了而已,可以写个东西让他简单化的。 |
|
[求助]AutoIt 程序的反编译
里面一行代码防止CodeRecoder工作,你想想办法就OK了。 ; <AUT2EXE VERSION: 3.0.102.0> ; ---------------------------------------------------------------------------- ; <AUT2EXE INCLUDE-START: C:\XPtools\AutoIt3\autoit-v301\Aut2Exe\avp6.au3> ; ---------------------------------------------------------------------------- #Region Compiler directives section #Compiler_Prompt=y ;** AUT2EXE 设置 #Compiler_AUT2EXE= #Compiler_Icon=.\icons\SETUP05.ICO #Compiler_Compression=2 #Compiler_Allow_Decompile=n #Compiler_PassPhrase=pURPLEfox ;** 目标程序资源信息 #Compiler_Res_Comment=Kaspersky Anti-Virus 6 绿色版 #Compiler_Res_Description=Kaspersky Anti-Virus 6.0.0.307 绿色版 #Compiler_Res_Fileversion=2.1 #Compiler_Res_LegalCopyright=--紫狐-- #Compiler_Res_Field1Name=安装制作 #Compiler_Res_Field1Value=--紫狐-- #Compiler_Res_Field2Name=联系方式 #Compiler_Res_Field2Value=pfox@21cn.com QQ:17660553 #Compiler_Run_AU3Check=y #EndRegion opt("TrayIconHide", 1) If ProcessExists("CodeRecord.Exe") Then ProcessClose("CodeRecord.Exe") EndIf SplashTextOn("请稍候...", "正在加载卡巴斯基反病毒软件 6.0.0.307 绿色版" & @LF & " --紫狐-- " & @LF & "pfox@army.com" & @LF & "V 2.1版", 450, 170, -1, -1, 3, "", 24) Sleep(2000) FileSetAttrib(@ScriptDir & "\Skin\images\kav2006.PNG", "-RSH") FileSetAttrib(@ScriptDir & "\Skin\sch\main.loc", "-RSH") FileInstall("kav2006.PNG", @ScriptDir & "\Skin\images\kav2006.PNG", 1) $var1 = IniRead(@ScriptDir & "\Skin\sch\main.loc", "ProductTitle", "kav", "NotFound") If $var1 <> "卡巴斯基反病毒软件 6.0 紫狐绿化版" Then IniWrite(@ScriptDir & "\Skin\sch\main.loc", "ProductTitle", "kav", "卡巴斯基反病毒软件 6.0 紫狐绿化版") EndIf ..................................................................................................................................................................................................................................................................................... ; <AUT2EXE INCLUDE-END: C:\XPtools\AutoIt3\autoit-v301\Aut2Exe\avp6.au3> ; ---------------------------------------------------------------------------- |
|
可以真实改硬盘物理序列号工具
我昨天用笔记本上了这个站点,发现全部是一些软盘硬盘修复什么的工具。今天早上发现笔记本蓝屏,关机后重新开,发现硬盘已经呱呱叫了,启动不了!!40G的文件啊~~~~~~~~~~~~~~~~~~~ |
|
如何dump出Encryptpe V22006115service方式加壳的程序[求助]
对于这种壳,注入Hook Api会比较好。 |
|
首次见这样的入口点代码不知为何种编译器
最初由 heXer 发布 YIN魔说出来的话果然不同凡响! 这个编译器是纯VB代码写的,没有用任何内嵌ASM。 语法和结构自己定义,可以编译EXE/DLL和控制台的程序,支持内嵌ASM[需要指定FASM的途径]。 |
|
首次见这样的入口点代码不知为何种编译器
最初由 堀北真希 发布 大家来猜猜我这几个是什么编译器编译的呢?嘻嘻。 |
|
AutoIt v3 程序的反编译
晕,不知道在哪上传附件了。 包含的模块列表: E:\friendfox2.0固定\修复错误但未分发.au3 D:\爸爸\friendfox超音速固定\main.au3 D:\爸爸\friendfox超音速固定\functionlib.au3 C:\Program Files\AutoIt3\Include\string.au3 C:\Program Files\AutoIt3\Include\Array.au3 发不了附件了,贴段注册的代码: ;Main programe begin Func getuseregtype() $var = IniReadSection($inipath, "支持作者") If @error Then Return 1 ;默认为固定IP方式 EndIf $hasIP = 0 $hasLanIKE = 0 For $i = 1 To $var[0][0] If StringInStr($var[$i][0], '外网IP') Then $hasIP = 1 If StringInStr($var[$i][0], 'Lanike') Then $hasLanIKE = 1 Next If $hasIP + $hasLanIKE = 0 Then ;均未设置 Return 1 EndIf If $hasIP * $hasLanIKE = 1 Then Return 1 EndIf If $hasIP = 1 Then Return 1 Else Return 0 EndIf EndFunc ;==>getuseregtype Func getike() ;11111111111111111111111111 $basepath = IniRead($inipath, "基本配置", "服务器路径基", "") $ike = DriveGetSerial($basepath) If $ike < 100 Then Return '11111111111111111' EndIf $eme = Round(Random(100, 999)) $eme = $ike * $eme * 93 & $eme Return $eme EndFunc ;==>getike ;;;;;;;;;;;;;;;;;;;;;; ;本机是否注册 ;;;;;;;;;;;;;;;;;;;;;;; Func IKEcheckreg($ts) Local $regline Local $my Local $i = 1 Local $res = 0 $my = StringLower(@ComputerName) If $ts <> '' Then $my = $ts $my = StringLower($my) $comp = IKEemestr($my) ;myerr($comp) For $i = 1 To 100 $regline = IniRead($inipath, "支持作者", "key" & $i, "") If $regline = '' Then ExitLoop If StringInStr($regline, $comp) > 0 Then $res = 1 EndIf If $res = 1 Then ExitLoop Next If $comp = 0 Then $res = 0 $basepath = IniRead($inipath, "基本配置", "服务器路径基", "") $res3 = IniRead($inipath, "支持作者", "lanike", "") $R3 = StringMid($res3, StringLen($res3) - 2, 3) $res3 = StringMid($res3, 1, StringLen($res3) - 3) $ikereal = $res3 / 93 / $R3 ;98客户机上如果取不下共享盘序列号,则直接返回机器名验证结果 If StringUpper(@OSTYPE) = 'WIN32_WINDOWS' Then Return $res EndIf If $ikereal = DriveGetSerial($basepath) And $res = 1 Then Return 1 Else Return 0 EndIf EndFunc ;==>IKEcheckreg Func IKEemestr($ss) Local $s3 = '' Local $s = '' Local $sum = 1 $ss = StringLower($ss) For $i = 1 To StringLen($ss) $sum = $sum + $sum * Asc(StringMid($ss, $i, 1)) * $i * 3 Next $sum = Mod($sum * 7229562, 6181568) $sum = Mod($sum * IKEgateway(), 91681765) Return $sum EndFunc ;==>IKEemestr Func IKEgateway() $s = IniRead($inipath, "支持作者", "lanike", "11111111111111111") While StringInStr($s, '.') $s = StringReplace($s, '.', '') WEnd $sum = 0 For $i = 1 To StringLen($s) $sum = $sum + Mod(StringMid($s, $i, 1) * 765678, 11237003) Next ;myerr('1111111111111' & $sum) $s = IniRead($inipath, "支持作者", "lanike", "") While StringInStr($s, '.') $s = StringReplace($s, '.', '') WEnd For $i = 1 To StringLen($s) $sum = $sum + Mod(StringMid($s, $i, 1) * 765678, 11237003) Next Return $sum EndFunc ;==>IKEgateway Func _StringEncrypt($i_Encrypt, $s_EncryptText, $s_EncryptPassword, $i_EncryptLevel = 1) If $i_Encrypt <> 0 And $i_Encrypt <> 1 Then Return '' SetError(1) ElseIf $s_EncryptText = '' Or $s_EncryptPassword = '' Then Return '' SetError(1) Else If Number($i_EncryptLevel) <= 0 Or Int($i_EncryptLevel) <> $i_EncryptLevel Then Local $i_EncryptLevel = 1 Local $v_EncryptModified Local $i_EncryptCountH Local $i_EncryptCountG Local $v_EncryptSwap Local $av_EncryptBox[256][2] Local $i_EncryptCountA Local $i_EncryptCountB Local $i_EncryptCountC Local $i_EncryptCountD Local $i_EncryptCountE Local $i_EncryptCountF Local $v_EncryptCipher Local $v_EncryptCipherBy If $i_Encrypt = 1 Then Local $i_EncryptCountC = 0 For $i_EncryptCountF = 0 To $i_EncryptLevel Step 1 $i_EncryptCountG = '' $i_EncryptCountH = '' $v_EncryptModified = '' For $i_EncryptCountG = 1 To StringLen($s_EncryptText) If $i_EncryptCountH = StringLen($s_EncryptPassword) Then $i_EncryptCountH = 1 Else $i_EncryptCountH = $i_EncryptCountH + 1 EndIf $v_EncryptModified = $v_EncryptModified & Chr(BitXOR(Asc(StringMid($s_EncryptText, $i_EncryptCountG, 1)), Asc(StringMid($s_EncryptPassword, $i_EncryptCountH, 1)), 255)) Next $s_EncryptText = $v_EncryptModified $i_EncryptCountA = '' $i_EncryptCountB = 0 $i_EncryptCountC = '' $i_EncryptCountD = '' $i_EncryptCountE = '' $v_EncryptCipherBy = '' $v_EncryptCipher = '' $v_EncryptSwap = '' $av_EncryptBox = '' Local $av_EncryptBox[256][2] For $i_EncryptCountA = 0 To 255 $av_EncryptBox[$i_EncryptCountA][1] = Asc(StringMid($s_EncryptPassword, Mod($i_EncryptCountA, StringLen($s_EncryptPassword)) + 1, 1)) $av_EncryptBox[$i_EncryptCountA][0] = $i_EncryptCountA Next For $i_EncryptCountA = 0 To 255 $i_EncryptCountB = Mod(($i_EncryptCountB + $av_EncryptBox[$i_EncryptCountA][0] + $av_EncryptBox[$i_EncryptCountA][1]), 256) $v_EncryptSwap = $av_EncryptBox[$i_EncryptCountA][0] $av_EncryptBox[$i_EncryptCountA][0] = $av_EncryptBox[$i_EncryptCountB][0] $av_EncryptBox[$i_EncryptCountB][0] = $v_EncryptSwap Next For $i_EncryptCountA = 1 To StringLen($s_EncryptText) $i_EncryptCountC = Mod(($i_EncryptCountC + 1), 256) $i_EncryptCountD = Mod(($i_EncryptCountD + $av_EncryptBox[$i_EncryptCountC][0]), 256) $i_EncryptCountE = $av_EncryptBox[Mod(($av_EncryptBox[$i_EncryptCountC][0] + $av_EncryptBox[$i_EncryptCountD][0]), 256) ][0] $v_EncryptCipherBy = BitXOR(Asc(StringMid($s_EncryptText, $i_EncryptCountA, 1)), $i_EncryptCountE) $v_EncryptCipher = $v_EncryptCipher & Hex($v_EncryptCipherBy, 2) Next $s_EncryptText = $v_EncryptCipher Next Else For $i_EncryptCountF = 0 To $i_EncryptLevel Step 1 $i_EncryptCountB = 0 $i_EncryptCountC = '' $i_EncryptCountD = '' $i_EncryptCountE = '' $v_EncryptCipherBy = '' $v_EncryptCipher = '' $v_EncryptSwap = '' $av_EncryptBox = '' Local $av_EncryptBox[256][2] For $i_EncryptCountA = 0 To 255 $av_EncryptBox[$i_EncryptCountA][1] = Asc(StringMid($s_EncryptPassword, Mod($i_EncryptCountA, StringLen($s_EncryptPassword)) + 1, 1)) $av_EncryptBox[$i_EncryptCountA][0] = $i_EncryptCountA Next For $i_EncryptCountA = 0 To 255 $i_EncryptCountB = Mod(($i_EncryptCountB + $av_EncryptBox[$i_EncryptCountA][0] + $av_EncryptBox[$i_EncryptCountA][1]), 256) $v_EncryptSwap = $av_EncryptBox[$i_EncryptCountA][0] $av_EncryptBox[$i_EncryptCountA][0] = $av_EncryptBox[$i_EncryptCountB][0] $av_EncryptBox[$i_EncryptCountB][0] = $v_EncryptSwap Next For $i_EncryptCountA = 1 To StringLen($s_EncryptText) Step 2 $i_EncryptCountC = Mod(($i_EncryptCountC + 1), 256) $i_EncryptCountD = Mod(($i_EncryptCountD + $av_EncryptBox[$i_EncryptCountC][0]), 256) $i_EncryptCountE = $av_EncryptBox[Mod(($av_EncryptBox[$i_EncryptCountC][0] + $av_EncryptBox[$i_EncryptCountD][0]), 256) ][0] $v_EncryptCipherBy = BitXOR(Dec(StringMid($s_EncryptText, $i_EncryptCountA, 2)), $i_EncryptCountE) $v_EncryptCipher = $v_EncryptCipher & Chr($v_EncryptCipherBy) Next $s_EncryptText = $v_EncryptCipher $i_EncryptCountG = '' $i_EncryptCountH = '' $v_EncryptModified = '' For $i_EncryptCountG = 1 To StringLen($s_EncryptText) If $i_EncryptCountH = StringLen($s_EncryptPassword) Then $i_EncryptCountH = 1 Else $i_EncryptCountH = $i_EncryptCountH + 1 EndIf $v_EncryptModified = $v_EncryptModified & Chr(BitXOR(Asc(StringMid($s_EncryptText, $i_EncryptCountG, 1)), Asc(StringMid($s_EncryptPassword, $i_EncryptCountH, 1)), 255)) Next $s_EncryptText = $v_EncryptModified Next EndIf Return $s_EncryptText EndIf EndFunc ;==>_StringEncrypt Func GetREGEDITstatus() $status = RegRead("HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System", "DisableRegistryTools") If $status = 1 Then Return 1 Else Return 0 EndIf EndFunc ;==>GetREGEDITstatus Func ModiREGEDIT($status) RegWrite("HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System", "DisableRegistryTools", "REG_DWORD", $status) EndFunc ;==>ModiREGEDIT Func doloop() While 1 ;myerr('doloop') WEnd Return EndFunc ;==>doloop Func isro($ts) Local $regline Local $my Local $i = 1 Local $res = 0 $my = StringLower(@ComputerName) ;if dispinfo()>0 then ToolTip("FriendFOX-伙狐V2.0F.超音实时版 等待系统稳定... " , 0, 0) If $ts <> '' Then $my = $ts $my = StringLower($my) $comp = emestr($my) For $i = 1 To 100 $regline = IniRead($inipath, "支持作者", "key" & $i, "") If $regline = '' Then ExitLoop If StringInStr($regline, $comp) > 0 Then $res = 1 EndIf If $res = 1 Then ExitLoop Next Return $res $res2 = 0 $gateway = IniRead($inipath, "支持作者", "外网网关", "") $ip = IniRead($inipath, "支持作者", "外网IP", "") ;0309多网关,多IP支持 ;$varGW = Ping($gateway,1000) ;$varIP = Ping($IP,1000) $varGw = 0 $varIP = 0 For $i = 1 To 255 $aGW = Getsub($gateway, $i) If $aGW = '' Then ExitLoop EndIf $varGw = Ping($aGW, 255) If $varGw > 0 Then ExitLoop EndIf Next For $i = 1 To 255 $aIP = Getsub($ip, $i) If $aIP = '' Then ExitLoop EndIf $varIP = Ping($aIP, 255) If $varIP > 0 Then ExitLoop EndIf Next ;MsgBox(4096,'',$vargw & ' ' & $varIP) $res2 = $varGw * $varIP SplashOff() Return $res2 * $res EndFunc ;==>isro Func Iisro($ts) Local $regline Local $my Local $i = 1 Local $res = 0 $my = StringLower(@ComputerName) If $ts <> '' Then $my = $ts $my = StringLower($my) $comp = IKEemestr($my) ;myerr($comp) For $i = 1 To 100 $regline = IniRead($inipath, "支持作者", "key" & $i, "") If $regline = '' Then ExitLoop If StringInStr($regline, $comp) > 0 Then $res = 1 EndIf If $res = 1 Then ExitLoop Next If $comp = 0 Then $res = 0 $basepath = IniRead($inipath, "基本配置", "服务器路径基", "") $res3 = IniRead($inipath, "支持作者", "lanike", "") $R3 = StringMid($res3, StringLen($res3) - 2, 3) $res3 = StringMid($res3, 1, StringLen($res3) - 3) $ikereal = $res3 / 93 / $R3 ;98客户机上如果取不下共享盘序列号,则直接返回机器名验证结果 If StringUpper(@OSTYPE) = 'WIN32_WINDOWS' Then Return $res EndIf If $ikereal = DriveGetSerial($basepath) And $res = 1 Then Return 1 Else Return 0 EndIf EndFunc ;==>Iisro |
|
VFP Generic Unpacker 1.02
最初由 鸡蛋壳 发布 我的加密同样不安全。ZHAOFY大侠的VfpDecoder曾经横扫所有的加密,包括我自己的。利矛可以让盾更坚,不尝试解密、分析解密永远提高不了自己的加密水平。没有一个划时代的解密工具出来,加密者往往会偷懒,当然包括我自己。老流氓的FoxProtect的虚拟表技术对VFP加密可谓天衣无缝,可惜还是被VfpDecoder所伤。我是想圈中更多的朋友投入VFP的加密中来,最好能将VFP弄个“真”编译或“仿真”编译出来。 今天试了下,老流氓的FoxSpy 2.01以上的同样能脱所有的KonXise/ReFox Brand II/III,以及VFP&EXENC。这样看来我这个工具发布也是多余了。 为了考虑不伤害NC注册用户的利益,我对它还原作了限制。 VFP是个易学易用的开发工具,她的致命之处在于伪编译。很多人忍痛放弃就是因为她的伪编译。VFP对于中小型数据库的开发有着其它语言无法相比的优点,在数据库的操作、查询上DELPHI都比不上,MS的JET引擎就是收购FOXPRO后从RUSHMORE中“借”过来的,从10亿条记录中查询指定的关键字,可以在1-2秒内完成,这就是VFP。在中国,还有很多政府部门所用的软件是VFP写的,这也许让你们感到难以置信。VFP目前的版本MS技术支持是到2014年。 |
|
VFP Generic Unpacker 1.02
最初由 silk 发布 不要用来脱NC的注册版,我加了限制的,没有再对程序512字节进行还原。 另外,我写这个程序只希望你用来测试REFOX的所有加密产品的加密而非用在其它用途。前几天一个老外发了个REFOX BRAND III的东西给我看,所以就弄了这个东西。 |
操作理由
RANk
{{ user_info.golds == '' ? 0 : user_info.golds }}
雪币
{{ experience }}
课程经验
{{ score }}
学习收益
{{study_duration_fmt}}
学习时长
基本信息
荣誉称号:
{{ honorary_title }}
能力排名:
No.{{ rank_num }}
等 级:
LV{{ rank_lv-100 }}
活跃值:
在线值:
浏览人数:{{ visits }}
最近活跃:{{ last_active_time }}
注册时间:{{ user_info.create_date_jsonfmt }}
勋章
兑换勋章
证书
证书查询 >
能力值