Forums

  1. General Discussions and Site Issues

    1. The Board Rules & Frequently Asked Questions   (94,279 visits to this link)

      Very important! Please read before posting...

    2. General Discussions and Off Topic

      General and off-topic conversations and discussions here...

      9,022
      posts
    3. Site Bug Reports and Technical Issues

      Bugs and issues regarding this website and board...

      1,879
      posts
  2. Reverse Code Engineering

    1. Challenge of Reverse Engineering

      Try a challenge or contribute your own, any platform or operating system...

      11,467
      posts
    2. Hardware Reverse Engineering

      Reverse engineering of hardware, firmware and industrial controllers...

      114
      posts
    3. Internet and Network Security

      Discussions on network security, holes, exploits and other issues...

      360
      posts
    4. Malware Reverse Engineering

      Debug, disassemble and document interesting trojans, virus', malware, etc.

      1,211
      posts
    5. Reverse Engineering Articles

      Share links to an interesting blog, news page or other RE related site...

      1,036
      posts
    6. Employment and Job Vacancies

      Discussions and employment opportunities in your field of expertise...

      128
      posts
    7. Search On Tuts 4 You   (34,296 visits to this link)

      Use the search engine on the main page as an additional resource...

  3. Developers Forums

    1. Programming and Coding

      Programming and coding tips, help and solutions...

      10,011
      posts
    2. Programming Resources

      Share links and information to external blogs, articles and other resources...

      205
      posts
    3. Programming Puzzles

      Challenge for the shortest possible code and other coding puzzles...

      22
      posts
    4. Software Security / Engineering

      Discussions on developing software and security against reverse engineering...

      471
      posts
  4. Community Projects

    1. TitanEngine Community Edition

      The next generation reverse engineering framework...

      267
      posts
    2. Scylla Imports Reconstruction

      Development and support forum for the Scylla project...

      459
      posts
    3. x64dbg

      An open-source x64/x32 debugger for windows...

      842
      posts
    4. Future Community Projects

      Looking for support and interested partners for a future project?

      103
      posts
    5. Community Projects Archive

      Old and inactive projects moved to long term support...

      506
      posts
  5. The Demoscene

    1. Scene Artists / Demoscene

      Share your graphics, ASCII, module, demo, intro ideas and works...

      7,284
      posts
  • Posts

    • Hacktreides
      Thank, i will take a look 
    • FeliXW
      This file is so easy, i finded oep, fixed enigma iat virtualization, dumped, and fixed. Works fine, exe optimized to 3 mb If you have some questions about unpacking enigma, cisc vm dumping and risc vm dumping, contact my by using:
      Jabber: julia.pcret@exploit.im
      Telegram: @julia_pcret (https://t.me/julia_pcret) P.S. All functions in file works fine, tested on Windows XP project1_protected_dumped.exe
    • FeliXW
      Well, in this version only new enigma hardware id protection, function is virtualized by CISC, old pattern don't works. After trace, i founded block, where are register save value under cisc virtualization, patched it, and nag go down. 1) Finding CISC block for bypass hardwareid.
      2) Hooks enigma api logger for restore api emulation.
      3) Go to oep, by using static signature in stub.
      4) Fixing vm imports, this is same older versions.
      5) Reslocating all imports outside by UIF and dumping process and memory.
      6) Attaching memory with imports, and fixing exe file.
      7) Fixing Enigma API code, redirect under OEP, with patch.
      8) Cleaning all trash from file, my file is 400 Kb of code. If you have some questions about unpacking enigma, cisc vm dumping and risc vm dumping, contact my by using:
      Jabber: julia.pcret@exploit.im
      Telegram: @julia_pcret (https://t.me/julia_pcret) P.S. Can you give risc virtualized target? unprotectme_dumped_fixed.exe
  • Blog Comments

    • 0xNOP
      *Updated 3/6/2017* Added Support to detect three major security products, some little things in the code like `getAv()` is now `getProduct()`.
    • 0xNOP
      Oh well sorry for the late reply!   I just wanted to do it and expose the methods malware writers use often to create their malwares, I just did in PureBasic since I was working on it and found it's a really great and fun language to work with And btw you can work with kernel mode from PureBasic also, you can even create your own Drivers, there's a suit that allows you to do that: http://www.purebasic.fr/english/viewtopic.php?p=404607   Thanks for writing!
    • kuqadk3
      For someone like us,there are not much choice  And this is the best choice which make us feel happy  Atleast for a moment
  • File Comments

  • Image Comments

  • Download Statistics

    • Files
      984
    • Comments
      60

    Latest File
    By Caliber.

    5    0

  • Gallery Statistics

    • Images
      322
    • Comments
      159

    Latest Image
    0
    By alfares · 02/25/2016 10:07 PM