Jump to content
View in the app

A better way to browse. Learn more.

Tuts 4 You

A full-screen app on your home screen with push notifications, badges and more.

To install this app on iOS and iPadOS
  1. Tap the Share icon in Safari
  2. Scroll the menu and tap Add to Home Screen.
  3. Tap Add in the top-right corner.
To install this app on Android
  1. Tap the 3-dot menu (⋮) in the top-right corner of the browser.
  2. Tap Add to Home screen or Install app.
  3. Confirm by tapping Install.

All Activity

This stream auto-updates

  1. Past hour
  2. m!x0r
    m!x0r commented on m!x0r's file in Tools & Utilities
    Now I Understood your issue ! Are you trying to make patch only on dll but you got error when import 1337 file ? If this your case you must add even a Fake patch on the main EXE Example: Entry point rva of my exe F270 first byte 55 I want make change on my dll rva 4C680 byte 75 to EB Then you MUST enter loader data like this main:F270:55:0; Myfile.dll:4C680:EB:0 Opcode=55 The loader cannot handle DLL direct must handle Exe first then dll And as you see i did not make change on exe but dll yes By this way the loader will work!
  3. Yesterday
  4. kikime
    kikime joined the community
  5. triz-
    triz- joined the community
  6. adsvqwer44
    adsvqwer44 joined the community
  7. decode
    decode commented on m!x0r's file in Tools & Utilities
    I understand it only supports .exe files. Would you like to support applying patch.1337 to DLL files?
  8. lon
    lon joined the community
  9. regbob
    regbob joined the community
  10. doge
    doge joined the community
  11. Rubx
    Rubx joined the community
  12. Open123
    Open123 joined the community
  13. snack
    snack joined the community
  14. devsat-dz
    devsat-dz replied to mrexodia's topic in TitanEngine CE
    After searching, the problem was solved by adding bcdedit /set testsigning on Thank you.
  15. m!x0r
    m!x0r commented on m!x0r's file in Tools & Utilities
    1337 File Already Compatible with x32,x64 ! Can you explain your issue ?
  16. Last week
  17. HostageOfCode
    HostageOfCode replied to Arting's topic in UnPackMe
    This is my version of unpacked. Just used fixed this github repo: https://github.com/colby57/VMP-Imports-Deobfuscator Here is my fixed version to unpack this file: https://github.com/pulpgit/Themida-Imports-Deobfuscator-main UnpackMe_cleaned.7z
  18. Ligetree started following Lena's Reversing for Newbies
  19. decode
    decode commented on m!x0r's file in Tools & Utilities
    @m!x0r Please make patch.1337 compatible with both 32-bit and 64-bit DLL files. I really need it.
  20. Visual Studio
    Visual Studio posted a topic in UnPackMe (.NET)
    DNGuard HVM v4.94 Hey, Dropping my second UnpackMe challenge, made just for fun. This one’s a bit tougher than my first, but still very doable. The goal is to unpack and analyze the binary and reach the success message. Cracking it is extra, not required. It’s a simple .NET WinForms app that asks for a password and shows “Access granted” when the condition is met. The UI is trivial, the focus is on what’s happening once protections kick in. Protected with DNGuard HVM Enterprise. Source code, compiler-generated code, constructors, strings, managed resources, and blob heaps are encrypted. HVM and HVM II are both enabled at level 5, with proxy methods and additional runtime protections. Metadata is obfuscated, name heaps are destroyed, automatic renaming and dynamic control flow obfuscation are enabled, and basic anti-dump and anti-static measures are in place. The password is not stored in plaintext. Verification is done against a SHA-256 hex hash (PasswordSha256Hex). If you want to reverse or bypass that, that’s the crack portion and optional. Screenshots show the app and protection settings used. File Information Submitter Visual Studio Submitted 12/13/2025 Category UnPackMe (.NET) View File
  21. Visual Studio
    Visual Studio posted a file in UnPackMe (.NET)
    • 0 downloads
    Hey, Dropping my second UnpackMe challenge, made just for fun. This one’s a bit tougher than my first, but still very doable. The goal is to unpack and analyze the binary and reach the success message. Cracking it is extra, not required. It’s a simple .NET WinForms app that asks for a password and shows “Access granted” when the condition is met. The UI is trivial, the focus is on what’s happening once protections kick in. Protected with DNGuard HVM Enterprise. Source code, compiler-generated code, constructors, strings, managed resources, and blob heaps are encrypted. HVM and HVM II are both enabled at level 5, with proxy methods and additional runtime protections. Metadata is obfuscated, name heaps are destroyed, automatic renaming and dynamic control flow obfuscation are enabled, and basic anti-dump and anti-static measures are in place. The password is not stored in plaintext. Verification is done against a SHA-256 hex hash (PasswordSha256Hex). If you want to reverse or bypass that, that’s the crack portion and optional. Screenshots show the app and protection settings used.
  22. 1346
    1346 posted a topic in CrackMe
    Custom Python Obfuscator (CM) Decryption doesn't involve modifying the Python interpreter; everything is done through code obfuscation. Password verification is performed via hash comparison—finding the correct hash to compare against counts as success. My custom obfuscator has just been released—come and give it a try! It includes techniques such as control-flow obfuscation, string encryption, virtualization, and C++ white-box implementation. File Information Submitter 1346 Submitted 12/13/2025 Category CrackMe View File
  23. 1346
    1346 posted a file in CrackMe
    • 2 downloads
    Decryption doesn't involve modifying the Python interpreter; everything is done through code obfuscation. Password verification is performed via hash comparison—finding the correct hash to compare against counts as success. My custom obfuscator has just been released—come and give it a try! It includes techniques such as control-flow obfuscation, string encryption, virtualization, and C++ white-box implementation.
  24. lovejoy226 started following HallarHack
  25. lovejoy226 started following Salin
  26. lovejoy226 started following NAMITAKE Crackme
  27. HallarHack started following jackyjask
  28. Nooboy
    Nooboy replied to lovejoy226's topic in UnPackMe
    <font dir="auto" style="vertical-align: inherit;"><font dir="auto" style="vertical-align: inherit;">SEKeygen.rar</font></font>HWID hash: 83A5249484F096DB700F771CF0A5F51B Decoded value 8A357B71C2ECFA5F7FC3275B5DBF9F61D4F98CA089470FCF390DFC0BC125917C92D667ACA678A0D485F7566FBBA52233 Reg SOFTWARE\Classes\Interface\{19335D77-1E2D-1337-146B-19F5CABF57A8} KeySize: 1024 E: 65537 CPU MAC BIOS HDD HWID
  29. CodeExplorer
    CodeExplorer replied to whoknows's topic in UnPackMe (.NET)
    https://limewire.com/d/ms51G#Mpzupr348q https://fileroy.com/M2BGwO2XGj40/file https://zippyshare.day/EbxBhxDZZZbrlIH/file
  30. decode
    decode replied to whoknows's topic in UnPackMe (.NET)
    A huge thank you, I appreciate your many years of service, master. However, the link is broken; is there any chance you could re-upload it? I couldn't download it.
  31. iced
    iced replied to Salin's topic in CrackMe
    Very nice crackme Salin! Noticed couple of things and gave it a try,its using a recrusive function that looked like Fbonacci but with a twist - when n equals 8 it returns the first character of my input XORed with 0x78 instead of the normal Fibonacci value. Code computes fib(14) and compares it against specific values in a switch statement. I knew standard fib(14) is 377 which equals 0x179. Working backwards since fib(8) gets replaced with char[0] ^ 0x78 , i needed to figure out what value makes the sequance land on 377. Turns out fib(8) needs to be 21 for this to work. So char[0] ^ 0x78 = 21 which means char[0] = 21 ^ 0x78 = 0x6D = 'm' There's a loop that validates characters 3 through 9 using a table at byte_411BFC. The validation formula : fib(i+8) - fib(i+6) == byte_411BFC[i] ^ char[3+i] Just rearranged it to solve for each character and u get : a, m, b, i, q, u, e. Now characters 1 and 2 were trickier. Character 1 determines a value dl through another Fibonacci call and character 2 gets XORed with that. There's a secondary check involving fib(17) that needs to equal 1597. After some trial and error found that char[1] = 'o' gives the right Fibonacci value, and char[2] = 'z' satisfies the XOR constraint. And if we finally put it all together we get a valid serial for this amazing crackme which is : mozambique I ran it through checksum calculation and got 0x12D4. Some code where it compares : 0040134B | 893D 20434100 | mov dword ptr ds:[414320],edi | 00401351 | 81FF D4120000 | cmp edi,12D4 |
  32. 0xman
    0xman replied to whoknows's topic in UnPackMe (.NET)
    @CodeExplorer please check Private message.
  33. CodeExplorer
    CodeExplorer replied to whoknows's topic in UnPackMe (.NET)
    Here we go, after the above step with slayer - Decrypt Methods unckecked; // Token: 0x0600081D RID: 2077 RVA: 0x0006E2E8 File Offset: 0x0006C4E8 [MethodImpl(MethodImplOptions.NoInlining)] internal unsafe static void qp1d5IbOJ() { Just fill at 006C4E8 with 062A so will change the body of method qp1d5IbOJ to a simple ret. after that we have a working file and we can deobfuscate with BabelDeobfuscator. Here is working unpacked file: https://workupload.com/file/3JqMck9ZtYR
  34. decode
    decode replied to whoknows's topic in UnPackMe (.NET)
    Thank you for your interest. I need the working file, so I think I need to report this to Slayer. It seems like there's no other way to fix it. I'll report this to Slayer, but I don't think they're actively updating it.
  35. CreateAndInject
    CreateAndInject replied to whoknows's topic in UnPackMe (.NET)
    You can post in the thread of target protector(eg. https://forum.tuts4you.com/topic/43240-netreactorslayer/ for your target) Rename it to 1.exe or test.exe to let people believe it's just a sample or demo rather than commercial software, and claim the unpacker doesn't work. Maybe they will update the unpacker to support your target.
  36. CodeExplorer
    CodeExplorer replied to whoknows's topic in UnPackMe (.NET)
    Protected by Unregistered version of Reactor. It has file integrity check. First unpack by SMD_FOR_AGILE https://forum.tuts4you.com/topic/41297-smd-for-agile/page/16/#comment-228021 Then use this new sheet: for reactor: https://workupload.com/file/42W8w5WAUMj specify file to decrypt as SysEventServiceV298_msil.exe and as original file SysEventServiceV298.exe the unpacking works fine. Note however that file still doesn't run as Babel obfuscation is still there.
  37. decode
    decode replied to whoknows's topic in UnPackMe (.NET)
    I'm sorry, I tried everything I had for Babel and Reactor but it was unsuccessful.
  38. CreateAndInject
    CreateAndInject replied to whoknows's topic in UnPackMe (.NET)
    .NET Reactor + Babel.NET
  39. HallarHack started following Sh4DoVV
  40. richa
    Am looking for Maldev Academy: malware Development 2025 update .
  41. decode
    decode replied to whoknows's topic in UnPackMe (.NET)
    @CreateAndInject Do you have a chance to deal with this?
  42. decode
    decode replied to whoknows's topic in UnPackMe (.NET)
    @CodeExplorer https://gofile.io/d/5hzUgS Hello, do you have a solution for this? Because I've tried your other Slayer fix versions, the code isn't fully decoded, and unfortunately, the executable doesn't work.
  43. Tundxator
    Tundxator replied to whoknows's topic in UnPackMe (.NET)
    I agree. He never explains step by step how he did it. Why is it approved?

Configure browser push notifications

Chrome (Android)
  1. Tap the lock icon next to the address bar.
  2. Tap Permissions → Notifications.
  3. Adjust your preference.
Chrome (Desktop)
  1. Click the padlock icon in the address bar.
  2. Select Site settings.
  3. Find Notifications and adjust your preference.