首页
社区
课程
招聘
[转帖].net Protectors List (. Чистая Защитники список)
发表于: 2011-8-11 17:52 16832

[转帖].net Protectors List (. Чистая Защитники список)

2011-8-11 17:52
16832
.net Protectors List
. Чистая Защитники список

From:BSF JeRRy
Aldaray Rummage Obfuscator
http://www.aldaray.com/Rummage/Features
Babel Obfuscator
http://www.babelfor.net/
CliSecure
http://www.secureteam.net/index.aspx
CodeFort Obfuscator
http://codefort.org/
CodeWall Protector
http://www.codewall.com/
Confuser
http://confuser.codeplex.com/
CryptoObfuscator/CryptoLicensing
http://www.ssware.com/cryptoobfuscator/obfuscator-net.htm
DeepSea Obfuscator
http://www.deepseaobfuscator.com/
Demeanor for.NET
http://www.wiseowl.com/products/products.aspx
DeployLX Codeveil/Licensing
http://xheo.com/products/code-protection
DevExtras .NET Obfusasm
http://www.devextras.com/
DNGuard HVM
http://www.dnguard.net/index.aspx
DotFuscator
http://www.preemptive.com/
DotNetSpin
http://www.pespin.com/
Eazfuscator.net
http://www.foss.kharkov.ua/g1/projects/eazfuscator/dotnet/Default.aspx
Goliath .NET Obfuscator
http://www.cantelmosoftware.com/eng/obfuscator.html
Manco Obfuscator/Licensing
http://www.mancosoftware.com
MaxtoCode
http://www.maxtocode.com/
NET Reactor/Intellilock
http://www.eziriz.com/
Ntoolbox Yano
http://www.ntoolbox.com/
Obfuscator.NET 2009
http://www.macrobject.com/en/obfuscator/index.htm
PVLOG dotNet Protector
http://www.pvlog.com/
Phoenix Protector
http://www.ntcore.com/phoenix.php
Salamander .NET Obfuscator
http://www.remotesoft.com/salamander/obfuscator.html
Skater .net Obfuscator
http://www.rustemsoft.com/
SmartAssembly
http://www.red-gate.com/products/dotnet-development/smartassembly/
Spices.NET Obfuscator
http://www.9rays.net/Category/55-spicesnet-obfuscator.aspx

[招生]科锐逆向工程师培训(2024年11月15日实地,远程教学同时开班, 第51期)

上传的附件:
收藏
免费 1
支持
分享
最新回复 (67)
雪    币: 98745
活跃值: (201039)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
2
More obscure ones:

Aspose.Obfuscator (discontinued) - http://www.aspose.com/
Bithelmet - http://bithelmet.com/
Deploy.NET (discontinued) - http://www.junglecreatures.com/
Desaware QND Obfuscator (discontinued) - http://desaware.com/products/books/net/obfuscating/index.aspx
NCloak (opensource) - http://code.google.com/p/ncloak/
SecureLM.CodeProtector - (company was bought by Microsoft)
SharpObfuscator (opensource) - http://sharpobfuscator.codeplex.com
Xenocode/Spoon.NET - http://spoon.net

Welcome forum.forum is a home.

Please respect the copyright from the Internet.
Пожалуйста, уважайте авторское право в Интернете.
來源于互聯網, 請尊重版權.
所發資源全部來自對互聯網公共資源的收集和整理,僅供學習之用,請于下載后24小時自行刪除!
Issued by all the resources of public resources from the Internet to collect and collate, study purposes only,
please delete themselves 24 hours after downloading!
Выпущено всеми ресурсами государственных ресурсов из Интернет
а на сбор и обобщение, изучение целей, пожалуйста, удалите себя
24 часов после скачивания!
You can Google.

Программное обеспечение выпуска и Windows Crack Обучение
Нам-Dabei Guanyin Бодхисаттва Нам без митабха
2011-8-11 17:53
0
雪    币: 98745
活跃值: (201039)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
5
貼刪除 有更新補充.

Welcome forum.forum is a home.

Please respect the copyright from the Internet.
Пожалуйста, уважайте авторское право в Интернете.
來源于互聯網, 請尊重版權.
所發資源全部來自對互聯網公共資源的收集和整理,僅供學習之用,請于下載后24小時自行刪除!
Issued by all the resources of public resources from the Internet to collect and collate, study purposes only,
please delete themselves 24 hours after downloading!
Выпущено всеми ресурсами государственных ресурсов из Интернет
а на сбор и обобщение, изучение целей, пожалуйста, удалите себя
24 часов после скачивания!
You can Google.

Программное обеспечение выпуска и Windows Crack Обучение
Нам-Dabei Guanyin Бодхисаттва Нам без митабха
2011-8-16 20:52
0
雪    币: 209
活跃值: (11)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
6
谢谢你,十分受益
2011-8-25 23:08
0
雪    币: 166
活跃值: (12)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
7
林版你太牛了,谢谢谢谢。
2011-9-8 09:24
0
雪    币: 5467
活跃值: (3854)
能力值: ( LV13,RANK:283 )
在线值:
发帖
回帖
粉丝
8
Thank you for sharing!!!
2011-11-18 15:08
0
雪    币: 200
活跃值: (10)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
9
MarkMarkMark
2012-1-6 21:59
0
雪    币: 278
活跃值: (10)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
10
很齐全  谢谢 收藏了
2012-1-19 23:10
0
雪    币: 98745
活跃值: (201039)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
11
Dot Net String Decoder
progress-tools.x10.mx/dnsd.html
2012-9-30 17:39
0
雪    币: 98745
活跃值: (201039)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
12
.NET Reactor Decryptor 1.7 (от 23 июня 2012)
What's new:
- Dll suport - the LoadAssembly option
上传的附件:
2012-9-30 17:42
0
雪    币: 98745
活跃值: (201039)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
13
de4dot 1.9.1
New version: 1.9.1
Supports the latest CryptoObfuscator build
Fixed some Mono.Cecil antis and bugs
上传的附件:
2012-9-30 17:46
0
雪    币: 98745
活跃值: (201039)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
14
GrayWolf
http://digitalbodyguard.com/DATA/GrayWolf%20v1.88.zip

Currently - is in a late beta stage It is similar to IL-Spy but this has a focue on edit/attack.
GrayWolf was a tool I created to carry out research. The focus is on editing applications to make change quickly.

What can it do:
DE-ObfuScatE
Edit IL(Live)
Add payloads
Edit attributes(public/privet)
Copy strong names signing on EXE/DLL

ToDo:
Advanced Code Navigation
Integration with GrayDragon
It is currently not open source, but Enjoy

http://digitalbodyguard.com/graywolf.html
2012-10-1 01:13
0
雪    币: 98745
活跃值: (201039)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
15
From:SND
by:Ali.Dbg
Download .Net Reflector Latest Version
http://www.reflector.net/download/latest/

Download Reflexil Latest Version
http://sourceforge.net/projects/reflexil/files/latest/download

Download KeyGen + Tutorial
http://www.crack.ms/cracks/crack.ms?id=2589041

NOTE: Disconnect Internet for disable online license checking!

Reflector_7.x_KeyGen_Lz0.zip
上传的附件:
2012-10-6 05:33
0
雪    币: 19
活跃值: (10)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
16
不错,要是能再详细的说明一下。
帖子里的东西是干什么的就好了
我发现楼主所有的帖子都是直接贴内容。
搞得我都不知道是什么东东。
我相信很多人也有这样的感觉吧!
2012-10-19 22:08
0
雪    币: 98745
活跃值: (201039)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
17
24小時我都在線,你說的我個人的確有困難.
上传的附件:
2012-10-20 02:37
0
雪    币: 98745
活跃值: (201039)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
18

Understand and debug any .NET code
http://www.reflector.net/
上传的附件:
2012-10-21 03:25
0
雪    币: 98745
活跃值: (201039)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
19
ByteMe v1.5 By Furious [repost from board.b-at-s.info]
Whats new?
-Fixed a critical bug with deassemblying some bytes with size 2 and simliar op codes.
-Fixed a bug with trying to decompile some methods.
-Now instruction # shown as hex
-Ability to modify bytes as op codes or as bytes
-Added a Goto module constructor
-Added hotkey delete automatically fill byte's with NOP
-Added double click modify OP code
-Added parameters and return type for methods
Future plans
-Ability to follow calls
-Highlighting of user selected opcodes
-Add search function

http://www.mediafire.com/?6170913cx5a666d

上传的附件:
2012-10-22 17:18
0
雪    币: 98745
活跃值: (201039)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
20
ByteMe v1.5 By Furious [repost from board.b-at-s.info]
Whats new?
-Fixed a critical bug with deassemblying some bytes with size 2 and simliar op codes.
-Fixed a bug with trying to decompile some methods.
-Now instruction # shown as hex
-Ability to modify bytes as op codes or as bytes
-Added a Goto module constructor
-Added hotkey delete automatically fill byte's with NOP
-Added double click modify OP code
-Added parameters and return type for methods
Future plans
-Ability to follow calls
-Highlighting of user selected opcodes
-Add search function

http://www.mediafire.com/?6170913cx5a666d
2012-10-22 17:18
0
雪    币: 98745
活跃值: (201039)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
21
Telerik Just Decompile обновился до 2012.3.1016.8
http://rghost.ru/private/41143519/0e4c66e67f1b17c28618dd41bebb97a2

上传的附件:
2012-10-25 23:23
0
雪    币: 98745
活跃值: (201039)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
22
ByteMe v2.0

What's new?
-OpCode highlighting
-Code decompilation fixes with generic parameters (doesn't work with all assemblies I tested but works with the confuser sample I had)
-Now you can nop multiple OpCodes
-Search function added, should be fully functional but didn't test it that much.

What's next?
-Ability to modify the bytes in OpCodes rather than bytes (yes, I know I have said that sine version 1.0 but it was much harder than I thought)
-Built in renaming engine, this might seem weird but I was thinking about renaming engine that doesn't use cecil, I'm not entirely sure if this was gonna work but I will have to test it.
-Scripting language, I would like to hear your suggestions about it some examples for it would be like:
patch 246D 002A (instruction rva, new bytes to write)
wipe 245b (method rva/method token)

Some of you asked me for the source code, don't worry once I fully make it
bug free and finish the future plans I will release it, the code is really messy right now.

http://www.mediafire.com/?v6us99mng474s76

上传的附件:
2012-10-28 12:24
0
雪    币: 98745
活跃值: (201039)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
23
ByteMe v2.4
Не финальная версия (получил в индивидуальном порядке).

* Now you can modify opcodes in IL too instead of only bytes.
* Now when you refresh an assembly it will navigate back to the method you were on.
* Added a close button so it would be much easier to make any changes in the assembly.
* Added a reverse branch function, now you can right click on any branch and reverse it. Ex: 2C99 will be reversed to 2D99
* Added a scripting language, current commands:
modify rva newbytes modifies your defined rva with those bytes
nop rva nopes your defined rva
revbran rva reverses a branch with the defiend rva
wipe rva wipes method rva (changes all the instructions to nop and last instruction to ret)
get_all_#OPCODE# rva var gets all the rva addresses for your defined rva in your defined method and stores them in the var, example usage: get_all_call 2090 call : nop call10. this nops the 10th call in the method rva
nop_all_#OPCODE# rva nops all the defined OPCODE in the defined methodrva example : nop_all_call 2090
# for comments, all comments will be ignored.

Coded by Furious

http://www.mediafire.com/?ixbs2gjf2l8vz0x

上传的附件:
2012-10-29 03:28
0
雪    币: 98745
活跃值: (201039)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
24
А вот и финальная ByteMe v2.4

http://localhostr.com/4PspDdRnbMm0
http://www.mediafire.com/?kbdbuzacl9r7d24
http://www.youtube.com/watch?v=ETaiYGnQIig

I added a scripting language in this release hopefully it will be used more often and I will be updating it with new commands and such.

What's new?
* Now you can modify opcodes in IL too instead of only bytes.
* Now when you refresh an assembly it will navigate back to the method you were on.
* Added a close button so it would be much easier to make any changes in the assembly.
* Added a reverse branch function, now you can right click on any branch and reverse it. Ex: 2C99 will be reversed to 2D99
* Added a scripting language, current commands:
modify rva newbytes , modifies your defined rva with those bytes
nop rva nopes , your defined rva
revbran rva , reverses a branch with the defiend rva
wipe rva wipes method rva , (changes all the instructions to nop and last instruction to ret)
get_all_#OPCODE# rva var , gets all the rva addresses for your defined rva in your defined method and stores them in the var, example usage: get_all_call 2090 call : nop call10. this nops the 10th call in the method rva
nop_all_#OPCODE# rva  , nops all the defined OPCODE in the defined methodrva example : nop_all_call 2090
#[/b] for comments, all comments will be ignored.

What's next?
Add token support for the scripting language
I'm thinking of adding a new node which tells you the information about the assembly ex: packer, ilonly(mixed mode), .net version.
Here is a screenshot of how I done so far:

The ability to modify is limited for now for only opcodes without operands,
the reversebranch should be fully functional and it will help a lot while trying to patch some checks.
About the scripting language, I don't except it to be of any use right now as it is still developing but with your feedback it will help a lot.
I added some scripts for .net shrink and confuser. The .net shrink script kills all the nags I also have 2 scripts for it but the second method is more reliable. Confuser script patches the antidump and antidebug calls but for a certain encryption method.
I also added a simple evaluator for commands for example as you see in scripts calls4 + 10, which gets the call number 4 rva - 10.

Coded by Furious
上传的附件:
2012-10-30 22:42
0
雪    币: 98745
活跃值: (201039)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
25
ByteME v3.0 by Furious
What's new?
* Fixed a bug with decompiling empty type names (CodeCracker's Obfuscator)
* Fixed a bug while trying to modify a non selected item
* Fixed "Goto Entrypoint" bug with few assemblies
* Fixed a critical bug with locating the wrong metadata section
* Added error reporting
* Added the ability to trace methods
* Added assembly info node which includes: Version, Compiler version, Obfuscator, IL Only flag, PublicKeyToken, entrypoint token
* Added token support for scripting language, now you can use tokens like: nop_all_br t6000001
* Added a var "ep" for the scripting language, can be used like this: nop_all_call ep
* Added new command "get_all_inner_call" same function as "get_all_call" except it only adds the calls that is located in the assembly (non referenced calls)
* Removed script writer

What's next?
Mainly I will be focusing on optimizing the code and fixing bugs.
If you have any suggestions please post below.

This version had some important bug fixes, the problem with locating the wrong metadata section was deadly and had to be fixed asap.
Also the token support new feature for the scripting language should make it more useful and easier to locate methods.
Now for the info obfuscator detector, I only added confuser 1.9-1.4, DNGuard, Eazfuscator, .Net shrink, Agile.Net, Rummage, Smart Assembly
As those are the most used right now plus the others are really low on quality so didn't bother adding them, although if you have a suggestion
for a obfuscator please post in the thread and I might add it.
Note that the error reporting will only keep your last report to avoid flooding.

Links
https://lh.rs/tYd4Fm4IoUdv

上传的附件:
2012-11-3 14:24
0
游客
登录 | 注册 方可回帖
返回
//