Jump to content
Tuts 4 You

All Activity

This stream auto-updates

  1. Today
  2. extonoxt

    Leaked VMProtect sources

    @kaoWell it is not easy to understand this internet . But your writeups are great . Learnt few things
  3. extonoxt

    Leaked VMProtect sources

    Is the Charm
  4. Yesterday
  5. kao

    Leaked VMProtect sources

    ...because cloning git repo, or just clicking on anonfiles.com_d1D7M7q9z4_vmpsrc.zip is so f*ing complicated. You don't need VMProtect sources. What you need is a basic understanding of this magical thing called "the internet".
  6. jackyjask

    Leaked VMProtect sources

    wow! someone is cheating with us here! (sneaky snitch) 2nd time https://www.sendspace.com/file/51jvil
  7. extonoxt

    Leaked VMProtect sources

    This file has been banned
  8. jackyjask

    Leaked VMProtect sources

    copy from pixadrain - https://workupload.com/file/MqvBWJnEM9K
  9. extonoxt

    Leaked VMProtect sources

    https://github.com/jmpoep/vmprotect-3.5.1.git. DMCA https://huihui.cat/mirrors/vmprotect-3.5.1 - There are download options but they all hang https://git.nadeko.net/Fijxu/vmprotect-source - No options to download https://pixeldrain.com/u/fKn1dZqK - too many connections. I tried few days
  10. jackyjask

    Leaked VMProtect sources

    there are 3 options above, which one failed for you? how about trying others....
  11. extonoxt

    Leaked VMProtect sources

    I am not able to download. is there any other way?
  12. Last week
  13. jackyjask

    Leaked VMProtect sources

    This project is mirrored from https://github.com/jmpoep/vmprotect-3.5.1.git. https://huihui.cat/mirrors/vmprotect-3.5.1 https://git.nadeko.net/Fijxu/vmprotect-source (someone is fighting and DMCA-ing (removing) all VMP related repos on github!) and a downloadable copy https://pixeldrain.com/u/fKn1dZqK
  14. johny1

    Leaked VMProtect sources

    Can I have this source code back, my friend?
  15. View File .NET Reactor v7.3 (Embedded DLL's) File protected by .NET Reactor v7.3 having Code Virtualization enabled. By nature the application using Dependency Injection (this time heavily developed), the 3rd party files embedded to main exe (see shot2), in addition System.Data.SQLite.dll lying near application. Find registration combination and reply it with the success message! Custom antidebugger Submitter whoknows Submitted 06/26/2025 Category UnPackMe (.NET)  
      • 1
      • Like
  16. 11 downloads

    File protected by .NET Reactor v7.3 having Code Virtualization enabled. By nature the application using Dependency Injection (this time heavily developed), the 3rd party files embedded to main exe (see shot2), in addition System.Data.SQLite.dll lying near application. Find registration combination and reply it with the success message! Custom antidebugger
  17. Earlier
  18. whoknows

    Eazfuscator.NET v2025.1

    @CreateAndInject WindowsFormsApplication37-src.rar
  19. A.S.L

    Exeinfo PE

    v.0.0.9.1 exeinfope.zip
  20. CreateAndInject

    Eazfuscator.NET v2025.1

    Why the code seems strange? What is Dependency Injection? Which the 3rd party files does the unapckme use? uint num = interface4_0.imethod_0();
  21. whoknows

    Eazfuscator.NET v2025.1

    View File Eazfuscator.NET v2025.1 File protected by Eazfuscator.NET v2025.1 having Code Virtualization enabled. By nature the application using Dependency Injection, the 3rd party files embedded to main exe. Find registration combination and reply it with the success message! Codebase improved a little bit versus reactor73 target. Submitter whoknows Submitted 06/24/2025 Category UnPackMe (.NET)  
  22. whoknows

    Eazfuscator.NET v2025.1

    11 downloads

    File protected by Eazfuscator.NET v2025.1 having Code Virtualization enabled. By nature the application using Dependency Injection, the 3rd party files embedded to main exe. Find registration combination and reply it with the success message! Codebase improved a little bit versus reactor73 target.
  23. Ben_Dover

    .NET Reactor v7.3

    @CreateAndInject A small tut of how you did it?
  24. Mr-Toms

    .NET Reactor v7.3

    its ldstr handler from the virtualization
  25. Fatmik

    Safengine Licensor v2.4 (HWID Lock)

    How did the string "E1CEE6FBE9ACOC" come about?
  26. CodeExplorer

    .NET Reactor v7.3

    > WindowsFormsApplication37_Slayed.exe!WindowsFormsApplication37.Internal.PolicyFinalizer.VisualContainerPolicy.CombineTransaction(WindowsFormsApplication37.Internal.PolicyFinalizer.ArgumentViewer instance) (IL=0x2260, Native=0x091A0040+0x6B85) case (PolicyFinalizer.NotificationCall)128: if (PolicyFinalizer.m_PolicySenderList.Count == 0) { Module module = typeof(PolicyFinalizer).Module; this.m_ClientEvaluator.IncludeManager(new PolicyFinalizer.PolicyFinder(module.ResolveString((int)this.m_CustomDecryptorPolicyObj | 1879048192))); return; } 70000000 metadataToken 0x7000174A int - metadataToken of good string: 0x700016DE but it is not easy as replacing a string- it is not working after changing string.
  27. CreateAndInject

    .NET Reactor v7.3

  28. whoknows

    .NET Reactor v7.3

    View File .NET Reactor v7.3 File protected by .NET Reactor v7.3 having /Code Virtualization/ enabled. By nature the application using /Dependency Injection/, the 3rd party files embedded to main exe (see shot2). Find registration combination and reply it with the success message! Submitter whoknows Submitted 06/22/2025 Category UnPackMe (.NET)  
  29. whoknows

    .NET Reactor v7.3

    18 downloads

    File protected by .NET Reactor v7.3 having /Code Virtualization/ enabled. By nature the application using /Dependency Injection/, the 3rd party files embedded to main exe (see shot2). Find registration combination and reply it with the success message!
  1. Load more activity
×
×
  • Create New...