Jump to content
Tuts 4 You


  1. Teddy Rogers

    Teddy Rogers


    • Points


    • Content Count


  2. CodeExplorer



    • Points


    • Content Count


  3. Kurapica


    Full Member

    • Points


    • Content Count


  4. kao


    Full Member+

    • Points


    • Content Count


Popular Content

Showing content with the highest reputation since 04/28/2020 in all areas

  1. 6 points
  2. 5 points
    What's the point of this? You ran my file under de4dot and repost it? i can recognise my file ya know, i intentionally left this out (i haven't finished local types yet but i manually set the third local to int32) + i added 9 locals when only 3 get used
  3. 5 points
    It might have a few weird instructions since i'm new to this Crackme-cleaned-Devirtualized2.zip Info: This is the first version of eaz that i analyze so i can't say how 2019.x is different from 2020.1 but its definitely not uncrackable Steps i took (as i should have included since the beginning): 1 Learn how CIL works / CIL fundamentals (there are some nice ebooks that i can't link here ) 2 Learn how the assembly reader/writer of your choice works (dnlib for example) 3 Learn how a simple VM works ( https://github.com/TobitoFatitoNulled/MemeVM (the original creator of this vm left so this is a fork to keep the project alive)) 4 https://github.com/saneki/eazdevirt See how the previous devirt was made (and you could also check previous eazvm protected executables) 5 Practice your skills trying to make MemeVM Devirt, you can message me if you have any issues with this step (You can always disable renaming on memevm to make the process easier to understand). 6 Start renaming a EazVM test assembly (you can make your own with trial) with all the knowledge you got from the previous steps (and find how crypto streams are initialized, where opcodes are located & how they are connected to the handlers etc etc etc, things that you would find in a vm) Editing saneki's eazdevirt might be a good idea, though i was more comfortable making my own base.
  4. 3 points
    Is this a hidden feature of the protection or does the app just not work?
  5. 3 points
    New features, interesting. File correct? ggggg_cleaned.zip
  6. 3 points
    BinaryNinja has announced the new prices, and with no surprise are slowly also pushing themselves away from many users. https://binary.ninja/2020/05/11/decompiler-stable-release.html A personal (named) license is now $299 with the only 'new' thing being the not-so-exciting decompiler as seen above. They are starting to push themselves closer to IDA pricing, which is just plain stupid on their part. Ghidra's decompiler can be made to run anywhere, and thus, why would anyone pick BinaryNinja over IDA when it comes down to features? I don't feel like they are branding themselves well at all and are trying to target the wrong setups/situations. Their new blog post mentions things like: "Support for MacOS, Linux, and Windows. You’re not buying each platform separately." - Sorry but people that generally use this kind of software are users that stick to one primary OS for the most part. At most, people spin up a VM if they 'must' use a secondary OS for anything. This is not a selling point in my opinion at all. "Decompiler for all architectures." - Again, the decompiler is not impressive so far. Ghidra's can be made to run in BinaryNinja and IDA (along with anywhere else) and is 100% free. The value for this being a new reason to increase the price of BinaryNinja is just not there, at all. And sadly, like most other software companies, they still have this mindset that everyone is a student and consider their software "openly available for everyone" because they offer student pricing. Really wish companies would just stop with this nonsense. Price yourself better in general, don't selectively single out 1 small demographic. I'd wager most people in the RE scene are hobbyists, not students and are not directly in a career path that includes the use of these kinds of tools directly. The only thing BNinja has going for it that most people praise it for is a good API. Outside of that, you don't really hear anything else good/interesting about it. So this price jump is honestly a stupid move in my opinion.
  7. 3 points
    Hi , A disassembler is a software that coverts machine code (Hex) into assembly language mnemonic ex ( mov al,1) . A debugger is a program that allow you to detect and correct errors in other computer programs. A decompiler is a software which try to reverse the process of compilation to attempt to get the source code from a compiled executable . PS : try to use the google and the search button . Regards
  8. 2 points
    Here's the old content of Ubbelol.
  9. 2 points
    Who are you to say that it's shit? Have you made an unpacker for it? If you do, you are free to correct me but if you don't you shouldn't make these silly comments, in my opinion.
  10. 2 points
    View File Example CrackMe - Debug Blocker x64 This is an example for submitting a CrackMe in the Downloads section of the site. You can download the file and run Debug Blocker x64. Nothing too exciting will happen! The challenge here would be to patch the debug-blocker function so that it does not spawn a second process. Submitter Teddy Rogers Submitted 02/23/2020 Category CrackMe  
  11. 2 points
    This is a notification of intent to cease and close the Blogs section of the site in a months time. The reasons for the change are; lack of use, activity and popularity, and for the most part the forum categories have been and are more than capable to host similar blog like content in the future. This notification gives you the opportunity to copy any information from Blogs that you wish to retain and/ or repost in the appropriate forum... Ted.
  12. 2 points
    CCtor => 0x06000034 => Clean the antitamper => Clean cflow => clean string encryption and that's it Most cleans are done by tweaking some public cleaners. The right key is "Youdidit!"
  13. 2 points
    Hi it's because of your assembly code ! read about used instruction here(repne scasb) : https://c9x.me/x86/html/file_module_x86_id_287.html Fixed code : procedure TForm1.BitBtn1Click(Sender: TObject); var pointer_check, pointer_dummy: pointer; label bp_found, bp_not_found; begin pointer_check := @check_credentials; pointer_dummy := @Dummy; asm cld mov edi,pointer_check mov ecx,pointer_dummy sub ecx, pointer_check mov al,$CC repne scasb jz bp_found jmp bp_not_found end; bp_found: application.terminate; exit; //you will findout why you should use this bp_not_found: check_credentials('user', 'pass'); end; BR, h4sh3m
  14. 2 points
    Hi Finding start point of function is easy, you just need do something like this : var StartAddr : Pointer; begin StartAddr := @check_credentials; But for finding end of function, there is several ways: 1) search for "RET" instruction (C3, C2 xx) but if you're using "try/finally/except" statement your function will have several "RET(C3)" instruction. 2) You can define dummy function right after your function and get it's start address as end of your function ! function check_credentials(user : string; pass : string):boolean; begin if (user <> 'User') and (pass <> 'S3cret') then begin showmessage('Wrong Credentials'); end else showmessage('Congratulations'); result := true; end; procedure Dummy; assembler; asm end; procedure TForm1.BitBtn1Click(Sender: TObject); var StartAddr, EndAddr : Pointer; begin StartAddr := @check_credentials; EndAddr := @Dummy; Caption := IntToHex(NativeUInt(EndAddr) - NativeUInt(StartAddr)); //will get size of your function in byte (+1 byte for Dummy function) end; BR, h4sh3m
  15. 2 points
    There are jobs like security analyst out there too but they are generally protocol oriented with background in cryptography and mathematics. Government agencies in all countries also recruit top talent. Otherwise, as a career choice unless as a malware analyst or software protection analyst or something it's too much of a niche to talk about. I got into RE because I enjoyed the challenge, and liked learning at lower levels or under the hood of how things work. Having a deeper understanding is my style for everything. That shadowy world lurks out there too but it's as organized and controlled as anything. It is a whole package deal to take that route, a lifestyle even. And even then you cant lose sight of what is right and what is wrong and where the laws draw the boundary. Fortunately merely toying around with some RE stuff is not really an issue. Software businesses and RE community have an interesting relationship but it's mostly been win-win despite occasional spats. Best hobby you can have though IMO
  16. 2 points
    If the only reason you want to learn RE is to have a unique skill for your resume/job application, you're very mistaken. Don't even try that. Anyone can learn to write (crappy) JavaScript/PHP/CSS in a few weeks and call himself/herself a "freelance web developer". Not everyone can become a reverse engineer - it requires a specific mindset and dedication. As for job positions, it really depends where you live and what your area of expertise would be. Analyzing malware requires a totally different skillset than finding bugs in hardware chips. Entry level positions usually are paid similarly to entry level developer positions. However, as a developer, you will have a pretty well-defined career path. As a reverse engineer, the path is less defined and really depends on your talent and dedication. It is possible to freelance and make a good living out of it - but again, it depends on your area of expertise. One of the best recent examples that come to mind, is Azeria (https://twitter.com/Fox0x01) - her ARM reverse engineering skills are superb. And there are freelancers who make $100k/year on HackerOne - but that's quite an extreme example. And then there is "dark side" - reverse engineers that work on not-exactly-legit tasks. For example, the entire game hacking industry is based on those. If you're a superstar, the customers will wait in line and the money is great. If you're just starting, you won't be able to make more than few hundred bucks a month - as you'll be competing with hundreds of Indians, Filipinos and Vietnamese in a very crowded market. First step would be to define the area you want to explore. As I mentioned above, reverse engineering hardware chips is totally different from reversing Windows malware. Once you know exactly what you want to learn, it will be much easier to suggest a specific book or course. Hope this helps. kao.
  17. 1 point
    By seeing the number of imports on your screenshot and the ollydbg.exe in upper case i would guess you tried this on ollydbg v1.10, not on ollyv2 The description don't mention it here but that thing is for v2, if you look inside the readme of the archive, it says (in french) that the code has been rewrote for olly 2. So try with v2, or recompile the dll for v1. Also i'm checking the src and this can really be improved more. Especially for the v2 as if you rename ollydbg.exe to blabla.exe, then it will look for blabla.ini, but OllyPath2 will create only 'ollydbg.ini' as this string is in hard inside.
  18. 1 point
    File hashes are only used to get/recognize a sample that is already know. You can't really do the same with a mutex as there is probably tons of files having the same mutex already and they can be also generated on the fly by the malware so it would be unreliable 'alone'. If you know already the hash of a file (sha256 preferably) then you don't need more. Mutexes are only good to find new similar samples, but once again you need to couple that with some other indicators, otherwise you will get many false positives if you rely only on that.
  19. 1 point
    Have to agree with this here. As far as I know, tuts4you is a place for educational content, not a place for showing off. What's the point of sharing just the unpacked binary, other than for bragging rights?
  20. 1 point
    Still around, but not really doing any RE nowadays. :) It truly is weird hearing yourself on video 8 years later..
  21. 1 point
    @maristroch I think I can do it except VM.
  22. 1 point
  23. 1 point
    1.Remove Anti Damp 2.Dump 3.Fix x86 Calls 4.Fix Delegates 5.Fix Calls 6.Constants Decode 7.Remove Fake Attributes 8.Remowe Control Flow 9.Rename Module 10.De4Dot For Rename and Clean Unused Methods Easy >.< Unpack_Me-d_noX86-Cleaned_patched-Cleaned-ConstantDec_fix_nodelegate-Cleaned-cleaned-cleaned.exe
  24. 1 point
    You could also do that for the whole code section, however you have to be very careful as to 1) disassemble everything correctly, in order not to run into the same problem as before, where the 0xCC occurs as data in a legitimate instruction 2) padding might use 0xCC as filler bytes. Especially Delphi also likes to embedd data in the code section, so you cannot just do a linear assembly and compare the first byte. your dissassemler would be thrown off by embedded data or padding. in practice, there is no good way here. I dont know how to do this in Delphi. You'd start by getting a method pointer and pass that to ReadMemory WinApi. No idea how to get the size of the method or how to do it concretely. Generally I think C or C++ is more straight forward for this kind of lowlevel stuff ... in my opinion.
  25. 1 point
  26. 1 point
  27. 1 point
    Mine is a laptop and was ordered as a custom build so everything was pre-installed on arrival. The only things I have changed really are software settings, disabled startup items, services etc.and being a laptop not really sure of the motherboard specs I used to do a lot with hardware when I had my Desktop but really haven't kept up to date with latest hardware differences for a few years now since buying my laptop which was the best spec I could afford at the time so I could hopefully keep it for a few years with no problems It has i7-6820HK Quad Core 2.7GHz Overclocked to 4.1GHz, 8mb Cache with 32gb of DDR4 RAM with GTX1070 GPU with 8gb GDDR5 The BIOS is a pre-boot environment so although you can update it in Windows you cannot change any settings in Windows or via software, you either need to select recovery or similar in Windows settings which will then restart into it or press hotkey on restart Maybe someone else can advise you on BIOS settings for your hardware and BIOS manufacturer I used to get problems with my old Desktop and I found HWMonitor to be excellent to show problem temperatures due to inefficient fans
  28. 1 point
    I have 1TB SSD (Boot) + 1TB 7200RPM SATA 6Gb/s (Storage) My SSD is a Toshiba THNSN51T02DUK PCIe Gen3 x4 NVMe M.2 Hibernation dumps the contents of RAM into a file at shutdown and reloads it at startup, on older slower machines this was often a lot quicker for bootup times to reinstate the last state rather than totally shutdown and then reload the OS and all drivers from scratch SSDs can vary massively with speeds, obviously mine is different to yours, I'm very happy with my read speeds and bootup times, and although my write speeds are slower than yours, it really doesn't matter much for me because I try to minimise writes on my SSD to prolong it's life and generally use my SSD for OS only and use my SATA for storage What I was trying to say in my last post is bootup times can vary hugely between machines for lots of reasons and not just the hard drive speeds which normally is the bottleneck, but other factors can influence speeds such as RAM, cache, drivers, BIOS, CPU and services and although my machine is a couple of years old now it has very good all round specs This is standard options for win10, if your write speeds were bad then you could have enabled the 2nd option which would improve the speeds but your write speeds are fine and a lot better than mine There are other Windows options you can tweak such as prefetch, superfetch etc. but you will probably only see very small differences because Win10 generally is pretty good at managing SSDs You should be able to disable auto startup from the startup tab in task manager by right clicking the item and selecting Disable There are other options you can disable by running msconfig from the run command such as unused services but be careful disabling these You could check to see if there is a BIOS update for your hardware and although yours sounds pretty new I would check to see if there is one and what the fixes are Also go through your BIOS settings to make sure they are optimal for your hardware
  29. 1 point
    Except manufacturers are giving no change log except very vague things like "security enhancements" or "performance improvements" or "general fixes" or other ridiculously unspecific reasons for the release. So since you trust the original BIOS, and you trust the board manufacturer you bought the device from, you have no reason not to trust the updates. Although if this vague message sounds like it wont fix your problem, then I suppose you could base your action based on them. There is a risk of a botched update but its small enough that I have never had any problem BIOS updating any PCs, laptops or even routers and the like, though I have seen a few cases where people had to RMA devices for it so its not impossible. But if it happens you will almost certainly get it fixed for free by the manufacturer especially with a valid warranty still, at a cost of annoying inconvenience of time lost without the device. The only time I bricked a machine was when I hand patched the BIOS unsuccessfully and the machine would not boot or factory BIOS reset any longer. I ended up taking it to a laptop repair service that sent it to a lab that was able to flash the ROM directly by using machinery that attaches to the ROM chip itself by using the BIOS found on the internet. It did not take that long, less than a week as I recall and was surprisingly cheap though it was in Asia. Anyway @LCF-AT, trying the other driver versions is an excellent idea. If you could dual boot Win7, or run CrystalDiskInfo off of a USB key with a Win7/WinPE environment and check the benchmarks there to compare it would give you some real information whether there is some Win10 driver issue or not. The other options in device manager can be found on properties of the disk itself under disk drives there dealing with 2 kinds of write caching and sometimes power options. The power profiles I think have some settings related to this, and the CPU itself could be the problem. Apparently the way the CPU is operating has changed these benchmark speeds based on technologies that dynamically change clock speed or hyper-threading and such. This is based on reports I have read on the web about why SSD is slower than advertised. However, still, the chipset driver IMO is definitely to blame regardless of the situation, or some settings that influence it.
  30. 1 point
    Here are my SSD speeds as a comparison As you can see my read speeds are greater than yours but your write speeds are greater than mine but still your speeds are not too bad and real world speeds probably wont match advertised speeds My Win10 x64 boot up times from my bios password screen to seeing my desktop (No windows password) is about 12 seconds but after that my AV, Firewall and other services take a few more seconds to load (Some are set to delayed start) When you power off do you shutdown or use hibernation? hibernation can cause unnecessary writes to your drive which will reduce it's lifespan and for me it slowed bootup times massively on my SSD compared to my old SATA but that also depends on the amount of RAM you have Where do you time your bootup? If it's once everything is loaded then check your startup tab in task manager and see what is loading and try to disable as many as possible you don't always use from auto loading on windows startup. Themes, desktop items and unnecessary services can also slow bootup times Some BIOS settings will affect bootup times too but you will have to check your BIOS manufacturer recommended settings for the board and hardware you have
  31. 1 point
  32. 1 point
    I once post it in a China forum, you can visit it in https://www.52pojie.cn/thread-762832-1-1.html by Google Translator I try my best to introduce it using English 1. download x64dbg and download the symbol file of clr.dll (mscorwks.dll if runtime is .net2.0~.net3.5) 2.set a breakpoint at "SystemDomain::ExecuteMainMethod" in clr.dll/mscorwks.dll and run 3.use MegaDumper (I use my ExtremeDumper based on codecracker's megadumper https://github.com/wwh1004/ExtremeDumper) to dump the main module when the program break at "SystemDomain::ExecuteMainMethod" 4.fix pe header and maybe you shoud also fix .net header This way is more complex than use MegaDumper only and directt dump the assembly. But if the assembly is packed with native stub and protected with anti dump (ConfuserEx and others) or protected with whole #US encryption (DNGuardHVM and others), maybe this way is good to dump assemblies. If you can not understand it, you can reply me. Best wish.
  33. 1 point
    if you understand how vm's works you can devirtualize any .net target. for start you can read saneki's eazdevirt source code. Crackme_2-devirtualized.rar
  34. 1 point
    here is my production of face shields, already 200 dispatched around my town to local hospital, liberal nurses, etc...
  35. 1 point
    Personally I find picking locks very interesting ! This channel has many great videos : https://www.youtube.com/channel/UCm9K6rby98W8JigLoZOh6FQ/videos
  36. 1 point


    A Shockwave Flash movie tutorial showing a method of keygenning Kurapica's CrackMe #15. It includes the source code for the keygen.
  37. 1 point


    A quick video tutorial on keygenning TccT KeygenMe #2 by Tarequl.
  38. 1 point


    A video tutorial on keygenning CloneTrone KeygenMe #1.
  39. 1 point


    RSA Tutorial 01 - Keygenning RSA RSA Tutorial 02 - Serial Fishing RSA RSA Tutorial 03 - How to Find RSA Primes
  40. 1 point


    A Shockwave Flash movie tutorial showing a method of keygenning a simple KeygenMe. Example code is in Delphi.
  41. 1 point
    You have to find out the logic behind their VM handlers and restore original opcodes using this information. Attached cleaned file. VMTest_devirted-cleaned.zip
  42. 1 point
    I created this experimental project. I hope someone can be useful. any collaboration and improvement is welcome thank you https://github.com/Pigrecos/Triton4Delphi
  43. 1 point
    No, thanks. Compared to Themida v2, the themida v3 does not have a great improvement over the VMs. There are two types of VMs in this UnPackMe, Dolphin and Tiger.
  44. 1 point
    Nice... Tutorial Video İs Here.
  45. 1 point
    https://youtu.be/Sv8yu12y5zM bonus - VSCodium - Binary releases of VS Code without MS branding/telemetry/licensing - hxxps://github.com/VSCodium/vscodium
  46. 1 point
    I'm not a big fan of Kip Irvine's book. But I can't recommend any particular book instead of it - I learned ASM by reading source codes of DOS-era viruses. There were no ASM books available in my country at that time, so I just had to figure it out on my own.. Since you seem to be mostly interested in reverse-engineering aspect of ASM language, I would recommend reading https://sensepost.com/blogstatic/2014/01/SensePost_crash_course_in_x86_assembly-.pdf - it's a pretty decent summary and contains links to other useful resources as well. One thing I can tell you - you need to start from the beginning and work methodically. Currently you're jumping from C sample code to VMProtect to driver disassembly. It makes no sense and is actually slowing you down.
  47. 1 point
    Run the unpacker in netbox 4.0 :
  48. 1 point
    I too am dubious about your claims, and here is why... For a malware analyst you are asking some pretty basic questions about malware, unpacking and RE For a chief independent researcher you are asking some basic questions which have been answered numerous times, I would expect a researcher to use search or google... For someone who has been programming for over 10 years it really surprises me that you cant create a little code to open a file and change a byte... You are 20 years old, you have been programming since 10 years old? You started your career when you were 15 years old? It's not a good start, your intentions might be good but none of your statements add up so I very much doubt you will get what your asking from here. BTW, you can ask whatever you like for software but it doesn't mean anyone will buy it at that price, do u have a business plan? Do you have any sales so far or just ideas? Just my opinion of course, sorry
  49. 1 point
    The resource obfuscation is not that amazing. With time, someone can sit down and figure out all the strings. The resource reader uses the function: internal static string <ascii_name>(int num, int num2, int num3){ num += 593; Assembly executingAssembly = Assembly.GetExecutingAssembly(); num2 -= 331; Stream manifestResourceStream = executingAssembly.GetManifestResourceStream("resource"); int num4 = num ^ num2; num4 = num4 * 17 / 27; manifestResourceStream.Seek((long)(7 + num4), SeekOrigin.Begin); byte[] array = new byte[8]; manifestResourceStream.Read(array, 0, 4); int num5 = (BitConverter.ToInt32(array, 0) ^ 2100157544) - 100; manifestResourceStream.Read(array, 0, 4); int num6 = BitConverter.ToInt32(array, 0) - 5 ^ 485648943; manifestResourceStream.Seek((long)num5, SeekOrigin.Begin); array = new byte[num6]; manifestResourceStream.Read(array, 0, num6); for (int i = 0; i < array.Length; i++) { array[i] = (byte)((int)array[i] ^ num3); } return Encoding.UTF8.GetString(array);}This points to the resource file 'resource' for the strings. Then it is a matter of finding where the strings are created and mimic the creation.For example, one of the text boxes is created like this: private TextBox <bell_char>;this.<bell_char> = new TextBox();this.<bell_char>.Location = new Point(77, 46);Control arg_604_0 = this.<bell_char>;int arg_5FF_0 = (int)27079.0;int arg_5FF_1 = checked((int)28538L);arg_604_0.Name = <Module>.<decode_string_from_resource>(arg_5FF_0, arg_5FF_1, (((uint)num6 >> 7) - 3892314112u == (uint)(128 * (num6 & 6475))) ? checked(326302297 + 895344590) : (sizeof(ushort) + 60));this.<bell_char>.Size = new Size(278, 20);this.<bell_char>.TabIndex = 2;base.Controls.Add(this.<bell_char>);So we know that the Name of this text box is made from the above, we can mimic it like this: using (var fStream = new FileStream("C:\\Users\\atom0s\\Desktop\\resource", FileMode.Open, FileAccess.Read)) { int arg_5FF_0 = (int)27079.0; int arg_5FF_1 = checked((int)28538L); var test1 = checked(326302297 + 895344590); var test2 = (sizeof(ushort) + 60); Debug.WriteLine(decomp(fStream, arg_5FF_0, arg_5FF_1, test1)); Debug.WriteLine(decomp(fStream, arg_5FF_0, arg_5FF_1, test2)); }The second print gives us the valid name: textBox1So then we look at the function that handles the button click for testing our info. We see the following at the top: bool flag = this.<bell>.Text == this.<soh> && this.<bs>.Text == this.<stx>;So we dig for the info that sets <soh> and <stx> which we find: int num = checked(-269761182 + 269768102); int arg_A1_0 = num; int arg_A1_1 = (int)checked((long)(612651665 - 612644079)); int arg_A1_2; if (num * 4 + -63008 == 32 * (num / 8 + -9144)) { int <si> = <Module>.<si>; arg_A1_2 = ((<si> - 3386368 == (<si> & 3317)) ? (Type.EmptyTypes.Length + -1258285692) : (Type.EmptyTypes.Length + 1963304847)); } else { arg_A1_2 = Type.EmptyTypes.Length + 241; } this.<stx> = <Module>.<decode_string>(arg_A1_0, arg_A1_1, arg_A1_2); private string <soh> = <Module>.<decode_string>(sizeof(float) + 25083, checked(1822738687 + -1822712593), sizeof(Guid) + -11);// then we had to dig for the <Module>.<si> value which is:<Module>.<si> = -942491469;Decoded we get:Username <soh> = Tuts4You Password <sx> = IvancitoOzTutoAppFuscator Working key:
  50. 1 point
    File Name: Combinator - Skin+Psd (TeamREPT) File Submitter: Tracer File Submitted: 30 Dec 2011 File Category: uPPP Skins The "Demo.rar" in here is only the finished Patch, the complete Skin have incl. psd-file 9,9 MB (To big to upload it here) Download the full package instead here: https://forum.tuts4you.com/topic/28052-combinator-skinpsd-teamrept/#entry165901 Or from ZippyShare... http://www1.zippyshare.com/v/43588772/file.html COMBINATOR One Skin \ Countless Design Possibilities Why Combinator ? Because i build many Themes & Features inside the PSD File, you be able to change the complete Design in 5 Minutes! Take my ready 2 use Themes or just make your own: just select a Theme Layer and klick on a Style in your Photoshop, now you have a new Frame, but you could more, now combinate the Frame with a new look for the Button-Bar and select another Logo for the Window... How it Works ? Check The Quicktour (Pics) Tutorial : (Folder: \Customize Skin-Gfx\Combinate+Re-edit Quicktour\) THE DETAILS: ───────────────────────────────────────────────────────────────────────── WINDOW FX: + Activate \ Deactivate some Mainwindow FX like "Holes & Screw" + Activate \ Deactivate "Logo-Scanlines" + Have the Choice of 2 Gloss Styles for the Logo MENUE THEMES: + 14 ready to use Themes for the Menue-Frame + Easy to make your own Themes with 3 Clicks (See the Tut) LOGO THEMES: + 13 ready to use Rept-Logos + Easy to add new Logos (See the Tut) BUTTONBAR THEMES: + 6 ready to use Themes for the Button-Bar. + Easy to make your own Theme with 3 Clicks (See the Tut) SCROLLER THEMES: + 8 ready to use Scrollbar-Themes + Easy to make your own Theme with 3 Clicks (See the Tut) Combinate all this together with new Styles, Experimenting with the Layer FX... and this Patch-Skin never getting old, just update the Skin with a few clicks! Click here to download this file
  • Newsletter

    Want to keep up to date with all our latest news and information?
    Sign Up
  • Create New...