Please respect the copyright from the Internet. Пожалуйста, уважайте авторское право в Интернете. 來源于互聯網, 請尊重版權. 所發資源全部來自對互聯網公共資源的收集和整理,僅供學習之用,請于下載后24小時自行刪除! Issued by all the resources of public resources from the Internet to collect and collate, study purposes only, please delete themselves 24 hours after downloading! Выпущено всеми ресурсами государственных ресурсов из Интернет а на сбор и обобщение, изучение целей, пожалуйста, удалите себя 24 часов после скачивания! You can Google.
Программное обеспечение выпуска и Windows Crack Обучение Нам-Dabei Guanyin Бодхисаттва Нам без митабха
Please respect the copyright from the Internet. Пожалуйста, уважайте авторское право в Интернете. 來源于互聯網, 請尊重版權. 所發資源全部來自對互聯網公共資源的收集和整理,僅供學習之用,請于下載后24小時自行刪除! Issued by all the resources of public resources from the Internet to collect and collate, study purposes only, please delete themselves 24 hours after downloading! Выпущено всеми ресурсами государственных ресурсов из Интернет а на сбор и обобщение, изучение целей, пожалуйста, удалите себя 24 часов после скачивания! You can Google.
Программное обеспечение выпуска и Windows Crack Обучение Нам-Dabei Guanyin Бодхисаттва Нам без митабха
Currently - is in a late beta stage It is similar to IL-Spy but this has a focue on edit/attack. GrayWolf was a tool I created to carry out research. The focus is on editing applications to make change quickly.
What can it do: DE-ObfuScatE Edit IL(Live) Add payloads Edit attributes(public/privet) Copy strong names signing on EXE/DLL
ToDo: Advanced Code Navigation Integration with GrayDragon It is currently not open source, but Enjoy
ByteMe v1.5 By Furious [repost from board.b-at-s.info]
Whats new? -Fixed a critical bug with deassemblying some bytes with size 2 and simliar op codes. -Fixed a bug with trying to decompile some methods. -Now instruction # shown as hex -Ability to modify bytes as op codes or as bytes -Added a Goto module constructor -Added hotkey delete automatically fill byte's with NOP -Added double click modify OP code -Added parameters and return type for methods Future plans -Ability to follow calls -Highlighting of user selected opcodes -Add search function
ByteMe v1.5 By Furious [repost from board.b-at-s.info]
Whats new? -Fixed a critical bug with deassemblying some bytes with size 2 and simliar op codes. -Fixed a bug with trying to decompile some methods. -Now instruction # shown as hex -Ability to modify bytes as op codes or as bytes -Added a Goto module constructor -Added hotkey delete automatically fill byte's with NOP -Added double click modify OP code -Added parameters and return type for methods Future plans -Ability to follow calls -Highlighting of user selected opcodes -Add search function
What's new?
-OpCode highlighting
-Code decompilation fixes with generic parameters (doesn't work with all assemblies I tested but works with the confuser sample I had)
-Now you can nop multiple OpCodes
-Search function added, should be fully functional but didn't test it that much.
What's next?
-Ability to modify the bytes in OpCodes rather than bytes (yes, I know I have said that sine version 1.0 but it was much harder than I thought)
-Built in renaming engine, this might seem weird but I was thinking about renaming engine that doesn't use cecil, I'm not entirely sure if this was gonna work but I will have to test it.
-Scripting language, I would like to hear your suggestions about it some examples for it would be like:
patch 246D 002A (instruction rva, new bytes to write)
wipe 245b (method rva/method token)
Some of you asked me for the source code, don't worry once I fully make it
bug free and finish the future plans I will release it, the code is really messy right now.
ByteMe v2.4
Не финальная версия (получил в индивидуальном порядке).
* Now you can modify opcodes in IL too instead of only bytes.
* Now when you refresh an assembly it will navigate back to the method you were on.
* Added a close button so it would be much easier to make any changes in the assembly.
* Added a reverse branch function, now you can right click on any branch and reverse it. Ex: 2C99 will be reversed to 2D99
* Added a scripting language, current commands:
modify rva newbytes modifies your defined rva with those bytes
nop rva nopes your defined rva
revbran rva reverses a branch with the defiend rva
wipe rva wipes method rva (changes all the instructions to nop and last instruction to ret)
get_all_#OPCODE# rva var gets all the rva addresses for your defined rva in your defined method and stores them in the var, example usage: get_all_call 2090 call : nop call10. this nops the 10th call in the method rva
nop_all_#OPCODE# rva nops all the defined OPCODE in the defined methodrva example : nop_all_call 2090
# for comments, all comments will be ignored.
I added a scripting language in this release hopefully it will be used more often and I will be updating it with new commands and such.
What's new?
* Now you can modify opcodes in IL too instead of only bytes.
* Now when you refresh an assembly it will navigate back to the method you were on.
* Added a close button so it would be much easier to make any changes in the assembly.
* Added a reverse branch function, now you can right click on any branch and reverse it. Ex: 2C99 will be reversed to 2D99
* Added a scripting language, current commands:
modify rva newbytes , modifies your defined rva with those bytes
nop rva nopes , your defined rva
revbran rva , reverses a branch with the defiend rva
wipe rva wipes method rva , (changes all the instructions to nop and last instruction to ret)
get_all_#OPCODE# rva var , gets all the rva addresses for your defined rva in your defined method and stores them in the var, example usage: get_all_call 2090 call : nop call10. this nops the 10th call in the method rva
nop_all_#OPCODE# rva , nops all the defined OPCODE in the defined methodrva example : nop_all_call 2090
#[/b] for comments, all comments will be ignored.
What's next?
Add token support for the scripting language
I'm thinking of adding a new node which tells you the information about the assembly ex: packer, ilonly(mixed mode), .net version.
Here is a screenshot of how I done so far:
The ability to modify is limited for now for only opcodes without operands,
the reversebranch should be fully functional and it will help a lot while trying to patch some checks.
About the scripting language, I don't except it to be of any use right now as it is still developing but with your feedback it will help a lot.
I added some scripts for .net shrink and confuser. The .net shrink script kills all the nags I also have 2 scripts for it but the second method is more reliable. Confuser script patches the antidump and antidebug calls but for a certain encryption method.
I also added a simple evaluator for commands for example as you see in scripts calls4 + 10, which gets the call number 4 rva - 10.
ByteME v3.0 by Furious
What's new?
* Fixed a bug with decompiling empty type names (CodeCracker's Obfuscator)
* Fixed a bug while trying to modify a non selected item
* Fixed "Goto Entrypoint" bug with few assemblies
* Fixed a critical bug with locating the wrong metadata section
* Added error reporting
* Added the ability to trace methods
* Added assembly info node which includes: Version, Compiler version, Obfuscator, IL Only flag, PublicKeyToken, entrypoint token
* Added token support for scripting language, now you can use tokens like: nop_all_br t6000001
* Added a var "ep" for the scripting language, can be used like this: nop_all_call ep
* Added new command "get_all_inner_call" same function as "get_all_call" except it only adds the calls that is located in the assembly (non referenced calls)
* Removed script writer
What's next?
Mainly I will be focusing on optimizing the code and fixing bugs.
If you have any suggestions please post below.
This version had some important bug fixes, the problem with locating the wrong metadata section was deadly and had to be fixed asap.
Also the token support new feature for the scripting language should make it more useful and easier to locate methods.
Now for the info obfuscator detector, I only added confuser 1.9-1.4, DNGuard, Eazfuscator, .Net shrink, Agile.Net, Rummage, Smart Assembly
As those are the most used right now plus the others are really low on quality so didn't bother adding them, although if you have a suggestion
for a obfuscator please post in the thread and I might add it.
Note that the error reporting will only keep your last report to avoid flooding.