Programming and Coding
Programming and coding tips, help and solutions...
1,894 topics in this forum
-
-
Hey guys, I'm searching for nice Name Patcher source code in asm. When anybody have sources i would be very happy if this person could share Ty
-
Hi everyone, Instead of writing IDC script with IDApro, i would like to integrate what IDApro can do into a simple c++ interface using TitanEngine. TitanEngine is a good tool with detailed SDK which can perform disassembling, PE modification, hooking etc. I would like to know how i can retrieve all the addresses of user-defined functions in a C++ .exe program using TitanEngine. If i am to create a dummy c++ file with 3 functions: void func1(), void func2(), void func3(), which API can i use to retireve the 3 functions after disassembling with TitanEngine? IDAPRO has flirt signature and name view which automate the analyzing of all user-defined functions... Is there a byt…
-
Ummm... i wrote a simple callback project in Delphi just to see how it looks like inside Olly when it goes inside a callback, does it look like this ? (btw, it's not a normal CALL) The "Arg 1" is what i'm talking about... here's the source code: unit Unit1; interface uses System.SysUtils, System.Types, System.UITypes, System.Classes, System.Variants, FMX.Types, FMX.Controls, FMX.Forms, FMX.Dialogs; type TForm1 = class(TForm) Button1: TButton; procedure Button1Click(Sender: TObject); private procedure myCallback (s: string); public { Public declarations } end; type TCallbackFunction = procedure (s: string) of object; var Form1: TForm1; implementation {$R *.fmx} pro…
-
-
Hi, Does anyone know of a fast brute force algorithm they are willing to share? I'm looking for something preferably written in C or x86 assembler. My aim is to brute force a 40-bit key. I tried using the brute force function given in a tutorial titled "the art of password brute forcing". It counts predictably up to FF FE FE FF 00, it then displays FF FE FF 00 00 as the next key in the sequence instead of the expected FF FE FE FF 01. The document I am referring to can be found here :Link I can't seem to find why it behaves this way. I though I would share it in case someone can see how to fix it. Thanks for any help, Mondo. edit : It would help if I sh…
-
Hi guys, i am trying to add new code or data section to an existing PE file. for eg: calc.exe from windows7 I am doing this for education research. I discovered PELIB opensource library but it is not updated and there's a limit to what it can do. I have no problem adding section for c++ console applications but it doesnt add new section for calc.exe due to limited header size. I was wondering if anyone have any other open source and useful PE editor or PE maker... i need the library and not the tools. something i can code with. PE EDITOR 1.7 - yoda CFF explorer Both are great tools but i need the library to perform my own calls. help please. Thanks in advance.
-
I'm looking for an example keygen in any language that has RNG used in a functional part of the key.
-
Hey every one, I'm experiencing a coding problem with ollydbg. When i call an animation function from main plugin thread, it works. (of course it will work ). and here is a piece of correctly working code: void ODBG_Pluginaction(int Origin, int Action, void* pItem) { if(Origin == PM_DISASM) { switch(Action) { case 0: Go(Getcputhreadid(), 0, STEP_OVER, false, true); break; } } } but if i call the same function from a thread it doesn't work (and here's a non working code): DWORD WINAPI ThreadFunc(LPVOID dd) { Go(Getcputhreadid(), 0, STEP_OVER, false, true); return TRUE; }void ODBG_Pluginaction(int Origin, int Action, void* pItem) { DWORD …
-
-
Hi. Coders and also Reversers... I am coding a kernel hook for cd-dvd system driver for monitoring that device. I need all functions that deal and work with this device... I have (and know some) functions but maybe incomplete... functions like: deviceiocontrol , getdrivetype , ... Regards...
-
Hi, After reading and playing lots of pages and tools ( I am sure this is nothing ) ) as a newbie I am very confused ! I have .net dll trying to delete the time limit but even could not start doing it, because every new report I see a new protection system which seems to me logical that my ddl has it !! So; Is there any doc that systematically deals , helps to understand which protection methods are used in the dll ? Also if these systems resembles to can you guide to a way ? As far as I can see ; StrongName + obfuscate + string / all encoding is present. Thanks,
-
Hello ! I want to fully understand Windows API hooking and everything about ring0, ring1(never heard about), ring2(never heard about), ring3 and also any ring it could be. I wish a book for API hooking or a video or something to help me to fully understand these concepts. Thank you very much ! LE: Forgot to say, I want to know everything about API detouring and any other kind of API intercepting also.
-
Hello guys. Maybe same question has been asked before, although i couldnt find any useful thing while searching. I am looking for a SIMPLE search+replace patcher src in C. And I'm not a C coder so please do not offer to code it on my own p.s: do not offer dup SnR engine.
-
Can any one give some Source Code for Crackme in ASM/MASM?
-
Where can i get the source code Milk drop for delphi? thx b4.
-
Was messing around in Java and wrote this up. Improvements? public final class KeyDecoder { private static int CalculateHash(String licenseName) { int hash = 0; for (int i = 0; i < licenseName.length(); i++) { int xorValue = licenseName.charAt(i); int rotateSequence = xorValue; for (int j = 0; j < 4; j++) { int rotateLeft = rotateSequence & 0x3; int shiftLeft = rotateLeft; int shiftRight = 32 - rotateLeft; int rotatedBits = hash >>> shiftRight; hash = hash << shiftLeft | rotatedBits; hash ^= xorValue; rotateSequence >>= 2; } } return hash + 1 & 0xFFFF; } public static short[] getInfoArray(String regis…
-
-
Hi, I am having troubles with getting BeaEngine to work. i am using the files (lib+.dll) given in "\beaengine-win32\Win32\Dll\" and this code: #include <Windows.h> #include <stdio.h> #include <string.h> //#define BEA_ENGINE_STATIC /* specify the usage of a static version of BeaEngine */ #define BEA_USE_STDCALL /* specify the usage of a stdcall version of BeaEngine */ #include "BeaEngine.h"#pragma comment(lib, "BeaEngine.lib")int main() { DISASM di; ZeroMemory(&di,sizeof(di)); di.EIP = (UIntPtr)main; di.EIP = (UIntPtr)0x00412130; //! int len; for(int i=0; i<20; i++) { len = Disasm(&di); di.EIP += len; } Sleep(10000); } It`s supp…
-
Author : me release data : nov.13.2007 target : Registry Easy 4.0 Src_by_IMPosTOR.zip
-
Please give me some tutorial make keygen with winasm ???? Please?????
-
Hello There anyone here can help me how to use alphablend library in c language i found it in patchlib but i dont want to use patchlib and some times i cannot use patchlib with my weired apps too there are 3 functions but dont know how to use them VOID AlphaBlend2(ULONG,HBITMAP,ULONG,ULONG,ULONG,ULONG,HBITMAP,ULONG,ULONG,BOOL);VOID AlphaBlendScroller(ULONG,HBITMAP,ULONG,ULONG,ULONG,ULONG,HBITMAP,ULONG,ULONG,BOOL,ULONG,ULONG,ULONG);VOID PaintText(HDC,HBITMAP,HDC,HBITMAP,const LPCSTR strText,ULONG,ULONG); Alphablend Library : http://uppit.com/xxti9x3w817y/alphablend.zip Please Help Thanks in advance Mike.X.
-
Hey guys, Not too often that I come by here but when I do I always take a look through my archives to see if I've anything interesting to contribute. I totally found something interesting stashed away today! This is an KeygenMe I wrote a while back. It's designed to be more educative than it is challenging, I wanted to demonstrate some common protection techniques used by executable protectors such as ASProtect and Enigma, alongside showing how a more complex license key system would work. For this reason, strings are not encrypted and the KeygenMe has been made intentionally verbose for ease of debugging and understanding. So what protection does this thing employ? …
-
It is well known that there are various methods of hooking and anti-hooking and so on. I want to hook an application which is very possible that it has implemented all anti-hooking methods. Also it is very possible that once connected to its online server that server to verify if it is hooked or not and/or if its code is modified or not by doing its md5/crc checksum etc. It must connect to the server and it is very important to be connected to the server because it is an online game. Now, theory: 1. There are more than one API hooking methods. 2. There also could be more than one anti-API hooking methods which detects if your app is hooked or not and/or unhook it. 3. Very…
-
has anyone got a function or procedure for adding a new section to a pe, using inline assembler for delphi thanks