All Activity
- Today
-
CKeyP8 joined the community
-
lovejoy226 started following Evil
-
@kaoWell it is not easy to understand this internet . But your writeups are great . Learnt few things
-
Is the Charm
- Yesterday
-
mkbl92 joined the community
-
...because cloning git repo, or just clicking on anonfiles.com_d1D7M7q9z4_vmpsrc.zip is so f*ing complicated. You don't need VMProtect sources. What you need is a basic understanding of this magical thing called "the internet".
-
wow! someone is cheating with us here! (sneaky snitch) 2nd time https://www.sendspace.com/file/51jvil
-
This file has been banned
-
copy from pixadrain - https://workupload.com/file/MqvBWJnEM9K
-
erger joined the community
-
gigachadunpacker joined the community
-
https://github.com/jmpoep/vmprotect-3.5.1.git. DMCA https://huihui.cat/mirrors/vmprotect-3.5.1 - There are download options but they all hang https://git.nadeko.net/Fijxu/vmprotect-source - No options to download https://pixeldrain.com/u/fKn1dZqK - too many connections. I tried few days
-
ILYES-GIGGS joined the community
-
there are 3 options above, which one failed for you? how about trying others....
-
bandan joined the community
-
I am not able to download. is there any other way?
-
diyonizos joined the community
-
wizard joined the community
-
cdwayne foremost started following Abhinab
-
Loader937 started following jackyjask
- Last week
-
DeLuks changed their profile photo
-
DeLuks started following Fatmike
-
lovejoy226 started following Deobfuscation of Packed and Virtulazation-Obfuscated Protected Binaries
-
collins started following koolk
-
lovejoy226 started following wowsret
-
wowsret started following lovejoy226
-
wowsret started following X0rby
-
This project is mirrored from https://github.com/jmpoep/vmprotect-3.5.1.git. https://huihui.cat/mirrors/vmprotect-3.5.1 https://git.nadeko.net/Fijxu/vmprotect-source (someone is fighting and DMCA-ing (removing) all VMP related repos on github!) and a downloadable copy https://pixeldrain.com/u/fKn1dZqK
-
Can I have this source code back, my friend?
-
View File .NET Reactor v7.3 (Embedded DLL's) File protected by .NET Reactor v7.3 having Code Virtualization enabled. By nature the application using Dependency Injection (this time heavily developed), the 3rd party files embedded to main exe (see shot2), in addition System.Data.SQLite.dll lying near application. Find registration combination and reply it with the success message! Custom antidebugger Submitter whoknows Submitted 06/26/2025 Category UnPackMe (.NET)
-
- 1
-
-
11 downloads
File protected by .NET Reactor v7.3 having Code Virtualization enabled. By nature the application using Dependency Injection (this time heavily developed), the 3rd party files embedded to main exe (see shot2), in addition System.Data.SQLite.dll lying near application. Find registration combination and reply it with the success message! Custom antidebugger - Earlier
-
@CreateAndInject WindowsFormsApplication37-src.rar
-
-
Why the code seems strange? What is Dependency Injection? Which the 3rd party files does the unapckme use? uint num = interface4_0.imethod_0();
-
View File Eazfuscator.NET v2025.1 File protected by Eazfuscator.NET v2025.1 having Code Virtualization enabled. By nature the application using Dependency Injection, the 3rd party files embedded to main exe. Find registration combination and reply it with the success message! Codebase improved a little bit versus reactor73 target. Submitter whoknows Submitted 06/24/2025 Category UnPackMe (.NET)
-
11 downloads
File protected by Eazfuscator.NET v2025.1 having Code Virtualization enabled. By nature the application using Dependency Injection, the 3rd party files embedded to main exe. Find registration combination and reply it with the success message! Codebase improved a little bit versus reactor73 target. -
@CreateAndInject A small tut of how you did it?
-
its ldstr handler from the virtualization
-
How did the string "E1CEE6FBE9ACOC" come about?
-
> WindowsFormsApplication37_Slayed.exe!WindowsFormsApplication37.Internal.PolicyFinalizer.VisualContainerPolicy.CombineTransaction(WindowsFormsApplication37.Internal.PolicyFinalizer.ArgumentViewer instance) (IL=0x2260, Native=0x091A0040+0x6B85) case (PolicyFinalizer.NotificationCall)128: if (PolicyFinalizer.m_PolicySenderList.Count == 0) { Module module = typeof(PolicyFinalizer).Module; this.m_ClientEvaluator.IncludeManager(new PolicyFinalizer.PolicyFinder(module.ResolveString((int)this.m_CustomDecryptorPolicyObj | 1879048192))); return; } 70000000 metadataToken 0x7000174A int - metadataToken of good string: 0x700016DE but it is not easy as replacing a string- it is not working after changing string.
-
View File .NET Reactor v7.3 File protected by .NET Reactor v7.3 having /Code Virtualization/ enabled. By nature the application using /Dependency Injection/, the 3rd party files embedded to main exe (see shot2). Find registration combination and reply it with the success message! Submitter whoknows Submitted 06/22/2025 Category UnPackMe (.NET)
-