All Activity
- Past hour
-
333 joined the community
-
BLOACKC0DE joined the community
- Today
-
lixu joined the community
-
osmanaga joined the community
-
lovejoy226 started following was._it_.me
-
lovejoy226 started following EAZFuscator .NET 2022.2 Max Preset (BlackHat) - Updated 04/06/22
- Yesterday
-
catalina joined the community
-
shane joined the community
-
blabla joined the community
-
EAZFuscator .NET 2022.2 Max Preset (BlackHat) - Updated 04/06/22
0xman replied to BlackHat's topic in UnPackMe (.NET)Here is little video i can make. tool I use.rar
- Last week
-
Flare-On 12
Torraske replied to Washi's topic in Reverse Engineering ArticlesYes unbelievable... what happened this year?
-
CSL Course - Cracking Software Legally (CSL) & CSP Course - Cracking Software Practicals (CSP)
daliaimperialis replied to usarmy's topic in Reverse Engineering Articlesdamn it's already been taken down :/ thank you for trying to upload it anyways!
-
The Enigma Protector v7.70 (x32 & x64)
NorthernLight replied to lengyue's topic in UnPackMeHighly appreciate if someone could upload a video tutorial regarding this topic. So that newbies like can at least pick up few ideas how things work. Thank you very much
-
OEP analysis
fu1grim posted a topic in x64dbgWhat is the fastest way of finding OEP? Are there any specific techniques you guys use for this?
-
xlatb changed their profile photo - Earlier
-
Flare-On 12
xdbruh1234 replied to Washi's topic in Reverse Engineering Articlesthe prize is a fornicationin tote bag T.T hell nah
-
xetsu changed their profile photo -
Flare-On 12
Torraske replied to Washi's topic in Reverse Engineering ArticlesLook at how it checks if the order is correct
-
Flare-On 12
adicto replied to Washi's topic in Reverse Engineering ArticlesFor challenge 9. Any tips on how to find out dll load order?
-
Reverse Engineering Denuvo in Hogwarts Legacy
fu1grim replied to Teddy Rogers's topic in Reverse Engineering ArticlesAwesome analysis, would like to see more. I'm myself into the water of reversing, hopefully cracking denuvo.
-
Flare-On 12
dbrown replied to Washi's topic in Reverse Engineering Articlestry to do all with python 3.12
-
Flare-On 12
Washi replied to Washi's topic in Reverse Engineering ArticlesHey! Some rabbit holes are fun to dive into. And sometimes you also don't realize you are in a rabbit hole 🙃 (Definitely guilty of that myself here 😅) -
NuMega SmartCheck
maracucho commented on Teddy Rogers's file in Tools & Utilities
-
Flare-On 12
kao replied to Washi's topic in Reverse Engineering Articles@Rurik : riiight! 😂 Some people leave no stone unturned and analyze each challenge in details. Good for them. 👍 But me, I've lost count how many easter eggs I did not find over the years... -
Flare-On 12
Rurik replied to Washi's topic in Reverse Engineering ArticlesTIL people actually 'solved' four instead of it solving itself -
Flare-On 12
kao replied to Washi's topic in Reverse Engineering Articles@Pau1 : random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. You went in the wrong direction. -
Flare-On 12
Pau1 replied to Washi's topic in Reverse Engineering ArticlesI'm a bit stuck on ch4 I've reversed the .exe and found the part where it takes the file version, XORs it with 0x6746, and then runs it through an LCG and a modulo operation. This seems to generate a file index and a value to XOR with that file. I've already generated the results for the 100 versions after 150, but I'm still not seeing the connection to the flag. I feel like I'm missing something obvious. Could you give me a nudge in the right direction? Any help would be appreciated, thanks!
-
Anticataclyst changed their profile photo -
Spoiler text not hidden in the sidebar "Posts" block
kao replied to kao's topic in Site Bug Reports and FeedbackAt least search results are not featured prominently at the top of the main page.. 😄 Hopefully it all will be resolved someday.. Thanks Ted! -
Flare-On 12
Rurik replied to Washi's topic in Reverse Engineering Articles@NoHayShark Sometimes malware does silly things that don't make sense. Assume the operator is dumb. -
Flare-On 12
NoHayShark replied to Washi's topic in Reverse Engineering ArticlesI think I'm in the same boat with 75%. I see where a value could potentially be changed, but it looks like it's being set to the same exact thing. Would you mind giving me a nudge?
-
Spoiler text not hidden in the sidebar "Posts" block
Teddy Rogers replied to kao's topic in Site Bug Reports and FeedbackThis is a known issue, and there is an open bug report with the Invision team to have it resolved. Spoiler contents are also visible in search results too... Ted. -
Spoiler text not hidden in the sidebar "Posts" block
kao posted a topic in Site Bug Reports and FeedbackWhen we put a text into spoiler block, the natural assumption would be that it's hidden until someone intentionally clicks to open it. Currently, it doesn't work like in the sidebar: -
Flare-On 12
kao replied to Washi's topic in Reverse Engineering Articles@lpu random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. random text so that spoiler actually works. You shouldn't be making any assumptions - it's a crypto problem, not a guessing game. You were given all the data you need to solve it. -
Flare-On 12
lpu replied to Washi's topic in Reverse Engineering ArticlesCould really do with a nudge in the right direction for ch6, been working at it for a few days now and feel like I'm very close but missing something critical. I'm 99% certain I understand the logic and have re-implemented locally off-chain and can decrypt my own conversations for both modes but it won't work for the provided logs (seems a few people have hit this point). I've also adjusted my code in a few different ways based on assumptions about the chat logs being a two way conversation, e.g. the message count may vary at each end of the convo as would the conversation time, there might be two rsa keys etc, but still not having any success. At this stage I'm looking at trying to derive the lcg parameters, assuming none of the given states in the chat logs are actually the seed, but that seems to be mathematically very difficult.
-
EAZFuscator .NET 2022.2 Max Preset (BlackHat) - Updated 04/06/22
naveenkancharla replied to BlackHat's topic in UnPackMe (.NET)can you please share devirtualization working tool for dotnet reactor
-
AT4RE Power Loader