Jump to content
Tuts 4 You

All Activity

This stream auto-updates     

  1. Today
  2. Hello i'm need source code Patching template delphi/visual studio
  3. Achzanu Wibowo

    Delphi patch template 10 by [SST] source code

    reupload plis
  4. Yesterday
  5. The online aspects of this game were probably managed by Steam's API since it is a Steam release for the PC. This generally means it's tied to using Steam's API within steam_api.dll. There are tons of emulations for this that can fully emulate all aspects of Steam (match making, DLC access, online/offline modes, etc.) which you can find on sites like cs.rin.ru.
  6. atom0s

    Denuvo - In The News

    The market for modding/cheating/botting is not really in the same realm as cracking/piracy/leaking of the actual property. Publishers and developers have to make the decision to go after modders/cheaters if they feel there is a suitable case against them. Generally this involves having to prove damages or other hard-to-prove things such as infringement or similar. There is a reason this is rarely something that happens to the cheating/modding scene because it is hard to prove. There's only been a small handful of cases that ever even make it to court, and even smaller where things were won in favor against the cheater. There is no law or enforcement by the governments in the world that protect this kind of thing either. It is solely up to the developer/publishers to protect their intellectual property and seek legal action if they feel its being damaged or infringed upon.
  7. https://twitter.com/DDoSecrets/status/1195899716653010945
  8. chickenbutt

    Denuvo - In The News

    The feds likely already have a lot of the active pseudonyms and are using them to correlate data without any leaks..... Also, I've accidentally ended up on the RELOADED IRC and distro servers before, and I can be to where the oldest razor1911 members live in minutes(I've never attempted to learn anything about razor1911)... Scene team OPSEC has always been a dumpster fire... I would also argue authorities interest in crackers is way over exaggerated.. Even current AAA protector vendors only take interest if you regularly release and game publishers and studios don't show any interest at all unless you worm their consumers or something... There is an entire stable industry for for-sale MMO modding and botting that runs over regular DNS....
  9. chickenbutt

    How to make a game appear online?

    Older thread but I'll add to save space I made "The Hunter"(now a big famous AAA franchise) completely offline as well as a bunch of games from a seedy company called ThriXXX. The latter used TheMida when there were basically no Oreans tools or tutorials anywhere and got defeated by me and one team using injection and inlining.. If it's not PVP stuff you can usually emulate it by storing assets locally and inlining over some auth and request garbage... PVP is almost always UDP streaming protocols that fills large asset structs; you can even make that offline*(or online) if you want to spend forever writing an engine and using a DLL...
  10. I predict streaming keys and code in to encrypted VM engines(which implement all the old anti-RE schemes as well) will be the final attempt at DRM. Why? Because other than implementing a TPM or SEE in such a system there is really nothing else you can do without chip makers stepping in and basically rolling out gaming console type schemes.. Even the Xbox One is basically Signed-bootrom+Windows 10+UWP+Hypervisor, though; encrypted RAM and the ARM TPM are just Zen&Ryzen features and don't actually mitigate memory corruption attacks or patching code... One day you will see crypto in MMUs that makes a lot of things obsolete(like stack and heap corruption); especially when combined with a bug free signed boot chain and glitching mitigation.. This is actually what I'm waiting for..
  11. Last week
  12. MulaB

    Javascript Puzzle

    Cleaned the script, was a nice one. It only contained this pastebin link, the rest of the strings in the array we're just to fill the other parts of the code with junk. Clean puzzle.js
  13. This one is good to use on your TV's browser - instead of using the default YouTube app - to get around all the annoying ads... Ted.
  14. https://invidio.us/ src - https://github.com/omarroth/invidious
  15. jimmy jones

    Javascript Puzzle

    Hi, so i was give a puzzle in which i was sent some javascript code in a text file and was told to get two words out of it. when running the js it outputs a pastebin link with the word apple now my challenge is finding the second word Thanks you puzzle.txt
  16. To my luck the 1st program I want to use with X64BDG has issues. It seems that the program cannot open without also opening an INI setting file which might be the reason it does not run from within the program. I am new to it so I am not sure what I am doing. I tried attaching a process and DLL and a process to get it to open but with no luck. Please find below the link to the small program. https://www.sordum.org/7941/askadmin-v1-6/ Please assist.
  17. I was debugging an application that loads many DLLs Trying to search for a pattern pops up this dialog after 2 or 3 seconds I'm using this snapshot : snapshot_2019-11-13_01-33
  18. dudeme

    x64dbg crashing randomly when running a script

    mrexodia, thanks for fixing it and for making this wonderful tool! Now I'm using the new memcpy command! :)
  19. Earlier
  20. mrexodia

    x64dbg crashing randomly when running a script

    Thanks for your great reproduction steps! The issue has been fixed and a new snapshot should be out soon.
  21. Hi, I made a simple x64dbg script that copies DWORD values from source to a destination buffer. The problem is that it crashes the debugger with EXCEPTION_ACCESS_VIOLATION. It doesn't happen all the times though, but it's pretty often. If I debug the script (using TABs) the crash does not occur. Increasing the size of the buffer seems to increase the probability of occuring the problem. Anybody else having the same problem? More infos below. Script: ; HOWTO: Open any target in the debugger, open this script, and run it. ; Repeat this process many times to ensure it's (not) working. ; I used cip as the src, but the problem happens with any other inputs too. src = cip size = 900 alloc size dest = $result offset = 0 LB_COPY: cmp offset, size jge LB_COPY_END [dest + offset] = [src + offset] add offset, 4 jmp LB_COPY LB_COPY_END: log "Finished free dest ret Exception info: Platform info: x64dbg (32bit), Windows 7 x64 Snapshot: snapshot_2019-11-11_22-25. The problem seems to be present in older versions too. EXCEPTION_DEBUG_INFO: Module Name: x32dbg.dll dwFirstChance: 1 ExceptionCode: C0000005 (EXCEPTION_ACCESS_VIOLATION) ExceptionFlags: 00000000 ExceptionAddress: 722A4B65 x32dbg.722A4B65 (offset: 00074b65) NumberParameters: 2 ExceptionInformation[00]: 00000000 Read ExceptionInformation[01]: 0000000C Inaccessible Address First chance exception on 722A4B65 (C0000005, EXCEPTION_ACCESS_VIOLATION)! Disassembly code where the exception occurs: ; The exception occurs inside x32dbg.dll on the "rep movsd" instruction, which is located at the address 722A4B6 below: 722A4AC | 55 | push ebp | 722A4AC | 8BEC | mov ebp,esp | 722A4AC | 6A FF | push FFFFFFFF | 722A4AC | 68 A86E2F72 | push <x32dbg.sub_722F6EA8> | 722A4AC | 64:A1 00000000 | mov eax,dword ptr fs:[0] | 722A4AD | 50 | push eax | 722A4AD | 83EC 08 | sub esp,8 | 722A4AD | 53 | push ebx | 722A4AD | 56 | push esi | 722A4AD | 57 | push edi | 722A4AD | A1 74CC3672 | mov eax,dword ptr ds:[7236CC74] | 722A4AD | 33C5 | xor eax,ebp | 722A4AD | 50 | push eax | 722A4AD | 8D45 F4 | lea eax,dword ptr ss:[ebp-C] | 722A4AE | 64:A3 00000000 | mov dword ptr fs:[0],eax | 722A4AE | 803D A1643872 00 | cmp byte ptr ds:[723864A1],0 | 722A4AE | 8B1D ACD12F72 | mov ebx,dword ptr ds:[<&GetCurrentThreadId>] | 722A4AF | 74 17 | je x32dbg.722A4B0E | 722A4AF | FFD3 | call ebx | 722A4AF | 3905 F0643872 | cmp dword ptr ds:[723864F0],eax | 722A4AF | 74 18 | je x32dbg.722A4B19 | 722A4B0 | 68 FC653872 | push x32dbg.723865FC | 722A4B0 | FF15 046A3872 | call dword ptr ds:[<&RtlAcquireSRWLockShared>] | 722A4B0 | EB 0B | jmp x32dbg.722A4B19 | 722A4B0 | 68 48673872 | push x32dbg.72386748 | 722A4B1 | FF15 A8D12F72 | call dword ptr ds:[<&RtlEnterCriticalSection>] | 722A4B1 | C645 F3 01 | mov byte ptr ss:[ebp-D],1 | 722A4B1 | 8B4D 0C | mov ecx,dword ptr ss:[ebp+C] | 722A4B2 | 8B55 08 | mov edx,dword ptr ss:[ebp+8] | 722A4B2 | C745 FC 00000000 | mov dword ptr ss:[ebp-4],0 | 722A4B2 | 85C9 | test ecx,ecx | 722A4B2 | 74 10 | je x32dbg.722A4B3E | 722A4B2 | 6905 585D3872 08010000 | imul eax,dword ptr ds:[72385D58],108 | 722A4B3 | 8901 | mov dword ptr ds:[ecx],eax | 722A4B3 | 85D2 | test edx,edx | 722A4B3 | 74 4D | je x32dbg.722A4B8B | 722A4B3 | A1 545D3872 | mov eax,dword ptr ds:[72385D54] | 722A4B4 | 8945 EC | mov dword ptr ss:[ebp-14],eax | 722A4B4 | 8B18 | mov ebx,dword ptr ds:[eax] | 722A4B4 | 3BD8 | cmp ebx,eax | 722A4B4 | 74 39 | je x32dbg.722A4B85 | 722A4B4 | 8D8A 00010000 | lea ecx,dword ptr ds:[edx+100] | 722A4B5 | 894D 0C | mov dword ptr ss:[ebp+C],ecx | 722A4B5 | 8D43 0C | lea eax,dword ptr ds:[ebx+C] | 722A4B5 | 8DB9 00FFFFFF | lea edi,dword ptr ds:[ecx-100] | 722A4B5 | 8BF0 | mov esi,eax | 722A4B6 | B9 42000000 | mov ecx,42 | 42:'B' 722A4B6 | F3:A5 | rep movsd | << Exception occurs here! >> 722A4B6 | 50 | push eax | 722A4B6 | E8 8373FFFF | call <x32dbg.sub_7229BEF0> | 722A4B6 | 8B4D 0C | mov ecx,dword ptr ss:[ebp+C] | 722A4B7 | 83C4 04 | add esp,4 | 722A4B7 | 0101 | add dword ptr ds:[ecx],eax | 722A4B7 | 81C1 08010000 | add ecx,108 | 722A4B7 | 8B1B | mov ebx,dword ptr ds:[ebx] | 722A4B7 | 894D 0C | mov dword ptr ss:[ebp+C],ecx | 722A4B8 | 3B5D EC | cmp ebx,dword ptr ss:[ebp-14] | 722A4B8 | 75 D0 | jne x32dbg.722A4B55 | 722A4B8 | 8B1D ACD12F72 | mov ebx,dword ptr ds:[<&GetCurrentThreadId>] | 722A4B8 | 803D A1643872 00 | cmp byte ptr ds:[723864A1],0 | 722A4B9 | C745 FC FFFFFFFF | mov dword ptr ss:[ebp-4],FFFFFFFF | 722A4B9 | 74 29 | je x32dbg.722A4BC4 | 722A4B9 | FFD3 | call ebx | 722A4B9 | 3905 F0643872 | cmp dword ptr ds:[723864F0],eax | 722A4BA | 74 2A | je x32dbg.722A4BCF | 722A4BA | 68 FC653872 | push x32dbg.723865FC | 722A4BA | FF15 0C6A3872 | call dword ptr ds:[<&RtlReleaseSRWLockShared>] | 722A4BB | B0 01 | mov al,1 | 722A4BB | 8B4D F4 | mov ecx,dword ptr ss:[ebp-C] | 722A4BB | 64:890D 00000000 | mov dword ptr fs:[0],ecx | 722A4BB | 59 | pop ecx | 722A4BB | 5F | pop edi | 722A4BB | 5E | pop esi | 722A4BB | 5B | pop ebx | 722A4BC | 8BE5 | mov esp,ebp | 722A4BC | 5D | pop ebp | 722A4BC | C3 | ret | 722A4BC | 68 48673872 | push x32dbg.72386748 | 722A4BC | FF15 A4D12F72 | call dword ptr ds:[<&RtlLeaveCriticalSection>] | 722A4BC | B0 01 | mov al,1 | 722A4BD | 8B4D F4 | mov ecx,dword ptr ss:[ebp-C] | 722A4BD | 64:890D 00000000 | mov dword ptr fs:[0],ecx | 722A4BD | 59 | pop ecx | 722A4BD | 5F | pop edi | 722A4BD | 5E | pop esi | 722A4BD | 5B | pop ebx | 722A4BD | 8BE5 | mov esp,ebp | 722A4BE | 5D | pop ebp | 722A4BE | C3 | ret | copy-crash-script.txt
  22. N0P/ribthegreat99

    Unpack Challenge (Agile.NET)

    JitDumperv4.rar
  23. Hi all: Recently I've analyzed a VB malware sample. This VB injector runs on physical analyzer machine (Win7 x86) and virtual machines (Win7 x64 and Win XP) without injection behavior. But when I upload the sample to the online sandbox, it appears to inject iexplorer.exe and sends DNS request to C&C server. By the way, the VC runtime library and .NET framework 2&4 are already installed on the virtual machine. I have not found any way to make the sample appear any injection behavior by checking Process Monitor yet. Can anyone figure out the reason, it's welcome to communicate, or is there anyone who can dump out its Trojan body, please let me know, thks a lot... The password of the sample zip package is "infected". Do not run or debug on the real machine! ANY.RUN report (PC-side access): https://app.any.run/tasks/2be96389-5c11-4541-b3b2-bb027f445add/ Hybrid Analysis report: https://www.hybrid-analysis.com/sample/0e0a3f5fa2d7e092dbb9e31b55e8f1dc6879673d9af92735577522dc504e7af9?environmentId=120 VB_Injector_password_infected.zip
  24. CodeExplorer

    Cuda force use mad.lo.u32 for ROTATE_LEFT

    This optimization won't work: https://docs.nvidia.com/gameworks/content/developertools/desktop/analysis/report/cudaexperiments/kernellevel/achievediops.htm ADD Weighted sum of all executed integer additions (IADD). The default weight is 1. MUL Weighted sum of all executed integer multiplications (IMUL). The default weight is 1. MAD Weighted sum of all executed integer multiply-add (IMAD) instructions. The default weight is 2. 1(add)+1(mul) = 2 (mad) so there is no speed improvement.
  25. Cuda force use mad.lo.u32 for ROTATE_LEFT ??? Compute Capability 1.2 __global__ void fun(unsigned int * mem) { int a = 3; int b = 5; int c = 6; int d; asm("mad.lo.u32 %0, %1, %2, %3;": "=r"(d) : "r"(a), "r"(b), "r"(c) : ); // d = a*b+c *mem = d; } This produce good result, anyway when I define (try): #define ROTATE_LEFT2(x, n) (int)x*(1>>(32-n))+(x<<(int)n) there is no mad instruction. References: https://www.openwall.com/lists/john-dev/2012/03/22/7 https://devtalk.nvidia.com/default/topic/489750/ptx-assembly-help-33-/ https://devtalk.nvidia.com/default/topic/478578/integer-mad-instruction/ https://www.blackhat.com/presentations/bh-usa-09/BEVAND/BHUSA09-Bevand-MD5-SLIDES.pdf
  26. ElektroKill

    Unpack Challenge (Agile.NET)

    Could you provide a download for JitDumper ? I can’t find it any where
  27. N0P/ribthegreat99

    Unpack Challenge (Agile.NET)

    I have unpacked most of the protections just need someone to complete the last part of it, the calls/delegates!! Instructions: 1. Jit-dump the executable with JitDumper3/4 enable the checkbox (Dump MD). 2. Clean the (String And Flow) with SimpleAssemblyExplorer(SAE) checking the checkbox (Delegates} as well. 3. De4dot. Files.rar
  28. h4sh3m

    My first CrackMe (Very Hard)

    https://www.virustotal.com/gui/file/279a3b9c15611f6198122c6d346a4560788760829e9e7fda224097156cf55639/detection
  29. SuperKungsMan

    My first CrackMe (Very Hard)

    Language : Delphi Platform : Windows OS Version : Windows 7,8,8.1,10 Packer / Protector : VM Description A Simple CrackMe Solve the missing key. The key is just a number. After you done it, post a simple write-up plz. I upload the file to my github because of the file size. Good Luck XD KungsCrackMe.exe (7.68MB)
  1. Load more activity
×
×
  • Create New...