首页
社区
课程
招聘
the aPE v.0.0.9beta by ap0x
发表于: 2005-11-27 18:58 3774

the aPE v.0.0.9beta by ap0x

2005-11-27 18:58
3774
v.0.0.9beta
+ Public release [protection myDeFeNCe/alfa NOT cracked, yet!]
+ Released on: 11/27/2005
- Fixed a bug with shell extensions [thanks to Vrane]
- Updated .rc template files to support MASM 8.2
- Added code to handle errors in .asf scripts
- Updated CRC update code in GImP, made it faster
- Added GUI for adding/editing patch data in Add patch data window
- Added Info button which will show info about inline patching of selected packer
- Added SPLayer 0.08 inline patching support via GImP
- Added tELock 0.4x - 0.92 inline patching support via GImP
- Updated xComparePeFiles 1.1 dll module for fast PE compareing [MASM compiled file/3.5kb/]
- Tested aPE on DotFix Fake Signer 3.3 [on unregistered version use normal patching, on registered use GImP]
- Fixed some asf2asm issues with patch and query .asf instructions
- Added ARM Protector 0.1 inline patching metod, via .dll plugin [+source]
- Updated PDK to 1.1, added new function QueryValue [see PDK]
- Added Create Loader option in Generate patch tab [via dUP loader stub]
- Added PUNiSHER 1.5 inline patching support via GImP [small GImP update]
- Added support for newest dUP patcher version by diablo2002
- Released beta test on Reversing Labs
- Added y0da`s Protector 1.03.2 inline patching support via GImP [slow but it works]
- Unlocked y0da`s Protector 1.02, now available in public version!
- Updated GImP and made it support CRC checking
- Fixed NWCC inline pathing support
- Added PolyCrypt PE 2.1.5 inline patching support
- Added SLVc0deProtector 1.11 inline patching support via .asf script
- Added new UPX inline patching metod, adding section via .dll plugin [+source]
- Added Software Compress 1.2 (lite stub) inline patching support via .asf script
- Coded and documented PDK, released MASM plugin example
- Updated some minor GUI details
- Added eXpressor 1.4.5.1 (lite stub) inline patching support
- Fixed .asf command eip matematical commands [e.g. add eip,1 ... sub eip,1 etc.]
- Updated Simple UPX scrambler script to follow .asf standard
- Removed Advanced UPX scrambler script because it does not follow .asf standard!
- Made .asf script execution much faster
- Added nSPack 3.x inline patching support
- Added xComparePeFiles 1.0 dll module for fast PE compareing [MASM compiled file/3.5kb/]
- Added nSPack 2.3 - 2.9 inline patching support [now fully supporting versions greather than 2.3]
- Added UG Cruncher 0.x inline patching support
- Added OEP Section info in PEiDentify module
- Recoded RVA2Offset and Offset2RVA converting functions [there was a small bug in 0.0.2]

down1:

http://ap0x.headcoders.net/aPE.public.version_0.0.9beta_release.rar

down2:

qtintf70.dll :x:\Windows\System32

http://ap0x.headcoders.net/qtintf.v70.runtime.dll.rar

[培训]《安卓高级研修班(网课)》月薪三万计划,掌握调试、分析还原ollvm、vmp的方法,定制art虚拟机自动化脱壳的方法

收藏
免费 1
支持
分享
最新回复 (4)
雪    币: 442
活跃值: (1216)
能力值: ( LV12,RANK:1130 )
在线值:
发帖
回帖
粉丝
2
牛X ,下一个
2005-11-27 19:28
0
雪    币: 215
活跃值: (40)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
3
ThanX!
2005-11-27 20:20
0
雪    币: 93908
活跃值: (200199)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
4
ap0x 作了一个小修改,下载:

http://ap0x.headcoders.net/download/xcmp.rar 文件覆盖原Plugins目录中的文件.

出错的问题是diablo2002发现的,如下:

when i compare two PE files with differences outside the section i get this error:

The aPE

Access violation at address 00566C1B in module 'aPE.exe'. Read of address 00000000.

OK  
2005-11-28 08:01
0
雪    币: 200
活跃值: (78)
能力值: ( LV2,RANK:10 )
在线值:
发帖
回帖
粉丝
5
最初由 linhanshi 发布
ap0x 作了一个小修改,下载:

http://ap0x.headcoders.net/download/xcmp.rar 文件覆盖原Plugins目录中的文件.

出错的问题是diablo2002发现的,如下:
........


0.0.9beta的内置了这个文件
2005-12-1 13:19
0
游客
登录 | 注册 方可回帖
返回
//