Leaderboard
-
CodeExplorer
Team Member1,314Points4,311Posts -
lovejoy226
Full Member+900Points1,430Posts -
jackyjask
Full Member+771Points1,634Posts -
whoknows
Full Member+218Points1,950Posts
Popular Content
Showing content with the highest reputation since 09/08/2024 in Posts
-
aspr_ide.dll Full Source Code
11 pointsYou will find the source code for aspr_ide.dll, a dynamic link library used in software licensing and protection, specifically for applications protected by AsProtect. This DLL simulates various functions related to license validation, registration, trial period management, and hardware ID checks. With ❤️ aspr_ide.dpr11 points
-
TitanHide
10 pointsTitanHide has been updated to support the latest VMProtect v3.9.4 changes. The service name is now used as the device name, as well, so the check for \\.\TitanHide will fail if you name the service the differently. Latest version (v0019) download link10 points
-
Flare-On 11
10 pointsMy writeups are live now: https://washi1337.github.io/ctf-writeups/writeups/flare-on/2024/10 points
-
VMProtect v3.5.1
9 pointsWindowsFormsApplication4.vmp35.exe: 1. VMUnprotect.Dumper https://github.com/void-stack/VMUnprotect.Dumper/releases/tag/1.1.0.0 2. Unset "IL Only" Flag from .NET Directory with CFF Explorer 3. Demutation Tool https://forum.tuts4you.com/topic/45162-demutation-vmprotect-net https://forum.exetools.com/showthread.php?t=21105 4. de4dot Use --keep-names ntpfg while cleaning the file using de4dot Or use --dont-rename 5. VMP Killer by DarkBullNull Use Option 2 First and Fix CRC and Debug Check https://github.com/DarkBullNull/VMP.NET-Kill https://forum.tuts4you.com/topic/45179-vmpnet-kill/ https://forum.exetools.com/showthread.php?p=131964 6. Unset "IL Only" Flag from .NET Directory with CFF Explorer 7. Use VMProtectNoDelegates to clean delegates https://forum.exetools.com/showthread.php?t=21106 https://forum.tuts4you.com/topic/45163-vmprotectnodelegates-net The only thing left if unvirtualization. WindowsFormsApplication4.vmp35-decrypted-demutate-cleaned.justify_nodel.rar9 points
-
[Technical Paper] GanDiao.sys (ancient kernel driver based malware)
Hi all, this is my analysis of GanDiao.sys, an ancient kernel driver based malware. It only works in WinXP as it is unsigned. This driver was used by various malware families and it allowed any userland application to kill other protected processes. This doc also includes a custom userland app source code to use GanDiao and test its capabilities. ENGLiSH VERSiON: http://lucadamico.dev/papers/malware_analysis/GanDiao.pdf iTALiAN VERSiON: https://www.lucadamico.dev/papers/malware_analysis/GanDiao_ITA.pdf As usual, I'm also attaching both PDF files here, just in case. Enjoy. GanDiao.pdf GanDiao_ITA.pdf8 points
-
MediaPlayer
8 pointsv1.0.0.4 https://github.com/mrfearless/MediaPlayer/releases/tag/1.0.0.4 Added /close command line option to close MediaPlayer once play ends (request from vitsoft on masm32 forum). Also added /minimized, /fullscreen and /volume:xx command line options. Add Ukrainian language menu resource (thanks to greenozon). Add Ukrainian language tooltips (thanks to greenozon). Add Persian language menu resources (thanks to Yashar Mahmoudnia). Add Persian language tooltips (thanks to Yashar Mahmoudnia). Add Right To Left Layout for Persian language selection (thanks to Yashar Mahmoudnia for testing). Changed play rate from slower/faster menu and buttons to a playback speed submenu and a button with a dropdown menu. Added audio stream switching via a submenu and a dropdown menu (from volume mute toggle button) (request from makson5 on github). Playback speed and audio stream menus are dynamically created when a media item is loaded. Otherwise menu will show a menu item showing "Unavailable". i button tooltip displays filename as well now. Holding CTRL whilst clicking on Help->About or i button will open folder containing MediaPlayer's ini file. Fixed menu items width on menus still showing very long widths after clearing MRU list. String resources are now compressed with rtlc in a block and are loaded and decompressed per language selection on first access. Removed some string resources, icons and bitmaps that are now redundant. MediaPlayer-x64.zip MediaPlayer-x86.zip8 points
-
crackme123
7 pointsYour crackme seems to have multiple solutions. Not sure if this was intended: Some example passwords: Approach:7 points
-
VSEC KeygenMe
7 pointsHello! I am 14yoKID , and i have documented everything tothe best of my ability. If you have any questions, please feel free to reach out or respond to my solution. I appreciate any feedback or discussion. The first step is to look inside the crackme’s binary for any references to “Wrong key!” (the error message). We load the executable into a disassembler or debugger (IDA, x64dbg, or similar). A quick search reveals that “Wrong key! Try again.” is located around the following code: 00408C3E | A1 0CA34000 | mov eax, [0x40A30C] 00408C43 | BA D48C4000 | mov edx, 0x408CD4 ; "Wrong key! Try again." This is where program prints the "Wrong Key! message. Scrolling above that reference,we see : 00408C16 | A1 98B74000 | mov eax, [0x40B798] ; loads the user's computed key 00408C1B | 3B05 ACB74000 | cmp eax, [0x40B7AC] ; compares it to the correct key 00408C21 | 75 1B | jne 0x408C3E ; jump if not equal => "Wrong key!" This shows: The user’s input key is stored at [0x40B798]. The “correct” key resides at [0x40B7AC]. If these two values do not match, we jump to the code that prints “Wrong key! Try again.” If they do match, we take the path that prints “Correct key!, Now Try to Keygen ME !” Finding Where [0x40B7AC] Is Set : Quick look upword in disassembly reveals: 00408BB0 | E8 5BFEFFFF | call 0x408A10 00408BB5 | A3 ACB74000 | mov [0x40B7AC], eax So at address 0x00408BB0, we call a function (which we’ll refer to as sub_408A10). Right after that call, we store EAX into [0x40B7AC]. That means the function at 0x00408A10 produces the correct key in EAX. To finally find a key set a breakpoint at 0x00408BB0 or directly inside sub_408A10 at 0x00408A10. Run the program and break on that address,press F7 ( Step into ) the call to examine how the function computes EAX. Inside sub_408A10, we notice: It reads a hard-coded byte 0x5A from [0x40A298] It loops exactly four times over bytes stored at [0x40A29C..0x40A29F] ( for instance , 0xA5 , 0x3C , 0xD7 , 0x82 ) Each iteration does some arithmetic: XOR , multiply by 12345 , add 0x6789, shift bits, etc. After finishing four iterations, it multiplies EAX by 0xDEADBEEF , does a final XOR and then returns EAX. Stepping through the entire function, we see that every run ends with a single final value: EAX = 0x8981B3E0 Then writes this to [0x40B7AC]. Therefore, the correct key is a constant number: 0x8981B3E0 ( OR IS IT?? ) Even though we know the internal number is 0x8981B3E0 , how do we type it so that crackme accepts it? By stepping into the function that processes (sub_4060A8 or sub_4045D4), or simply by trial and error, we learn: The crackme expects a leading '$' to interpret the rest of the text as hex. Typing XXXX1B3E0 ( dont want to spoil fun for others ) is interpreted as the hex value 0x8981B3E0. This matches the stored correct key, so the crackme prints : Correct key!, Now Try to Keygen ME ! But why $? In this particular crackme, the $ symbol is how the program’s input-parsing routine recognizes the user’s entry as a hexadecimal number. Without the '$' prefix, the code typically treats your input as decimal (or otherwise misreads it). Since the “correct key” is stored internally as the hexadecimal value 0x8981B3E0, the crackme will only accept a matching hex number—and it specifically wants you to indicate “hex mode” with '$'. That’s why typing 0x8981B3E0 or plain 8981B3E0 fails: the program doesn’t parse those formats as the same 32-bit value. Only '$8981B3E0' matches the exact hexadecimal integer 0x8981B3E0 the crackme expects. The final answer of mine and correct/valid key is :7 points
-
Creating Controls With Assembler (Deep Dive Podcast) 📄+🎙️
Hi @fearless, thanks for the new upload and the special AI podcast. I created a simple video with subtitle on it and attached another video with subtitle added as own track to have an better quality on reading. Just made for fun and for all who like reading at same time when hearing the podcast. Creating Controls In Assembler - Subtitle on Video.mp4 Below the attached video. Creating Controls In Assembler - Subtitle Track.7z greetz7 points
-
Flare-On 12
6 pointsIt's that time of the year again. It seems we're starting September 26 8PM EST again with a return to Web3 and YARA as well. Four weeks instead of six this year... I wonder what the reason for this is. 🤔 https://flare-on.com/6 points
-
VMProtect HWID CrackMe
6 pointsHey guys! I’m iced, a passionate student from Bosnia who’s really into reverse engineering. I decided to join Tuts4You to expand my knowledge and trade insights with people who are way better than me.Im also a friend of @0xret2win and he suggested me to join site and try to tackle couple of nice crackmes posted here. Also i dont think the guy who made this applied full protection settings. Anyways upon investigating this target i found two interesting calls: ( Not entierly sure if i should do step-by-step since if you follow "MessageBoxA" in ret and stack you will eventually get to same place i got ) "vmp-licensing-test.vmp.exe"+A19CAE - E8 B9CB60FF - call "vmp-licensing-test.vmp.exe"+2686C This is upon hitting "VMProtectGetCurrentHWID". RAX => 29 "vmp-licensing-test.vmp.exe"+A19C9C - E8 2550ABFF - call "vmp-licensing-test.vmp.exe"+4CECC6 This is upon hitting on "VMProtectSetSerialNumber". RAX => 20 Using x64dbg : 00007FF665759CAE | E8 B9CB60FF | call vmp-licensing-test.vmp.7FF664D6686C | -> VMProtectGetCurrentHWID 00007FF665759C9C | E8 2550ABFF | call vmp-licensing-test.vmp.7FF66520ECC6 | -> VMProtectSetSerialNumber6 points
-
Polymorphic Parasite (x86) WriteUp
6 pointsi may banter a lil in the opening, but that is how i was taught when i was in highschool learning ASM from the ukranians and russians, bootkits from the chinese You give a short shoutout or point to be made and ya write and code Here, i use the LCRN (LCG) from the GiantBlack Book of Viruses (Physicist Dr. Mark Ludwig) and his 16-bit many hoops and recreated it for x86 (32 bit) VXWriteUp.pdf6 points
-
WinLicense v3.2.2 (Window Function Through an External Plugin)
Among the anti-debug techniques, there's an interesting one worth noting. A dummy thread is created and then it calls Sleep(0x32). (The goal is for the created thread to be detected by tools like x64dbg.) Then, it calls NtQueryObject with the ObjectBasicInformation class using the thread handle. If the returned HandleCount is greater than 1, it determines that debugging is in progress. void dummy() { Sleep(8000); } bool CheckCreateThreadHandleCount() { HANDLE hThread = CreateThread(NULL, 0, (LPTHREAD_START_ROUTINE)dummy, NULL, 0, NULL); if (hThread == NULL) { return false; } Sleep(0x32); PUBLIC_OBJECT_BASIC_INFORMATION objInfo; NTSTATUS status = NtQueryObject(hThread, ObjectBasicInformation, &objInfo, sizeof(objInfo), NULL); if (!NT_SUCCESS(status)) { CloseHandle(hThread); return false; } std::cout << "Handle Count: " << objInfo.HandleCount << std::endl; if (objInfo.HandleCount > 1) { CloseHandle(hThread); return true; } CloseHandle(hThread); return false; }6 points
-
.NET KeyGenMe by Freddy #1
6 pointsSince @Washi provided the solution first, you may mark his answer as solved. However, I’d like to share my approach as well for reference. 1) Polynomial Coefficients and Matrix 1. Username - Polynomial Coeffs The code has a function that folds ASCII values into 8 coefficients ( size = 7 ). For "CHESSKING" , we take each character's ASCII and add it to slot in the array. 2. Matrix Build We then build 5 x 5 integer matrix from these 7 coefficients. Each entry is computed via this formula : mat(r,c) = ( coeffs ( r mod 7 ) x ( c + 1)) + ( r + 1 ) ---> All in paranthesses from start has to be to the power of 2. 3. Determinant ( mod 65521 ) We do a row-reduction to find the matrix's determinant, and then take /bmod 65521. 2) Toy Elliptic-Curve Step The code defines a small curve: y2 ≡ x3 +Ax+B (modp), p=1201, A=1,B =1. ( x3 here is actually x to the power of 3 ) We have a base point G = ( 5,116 ) this goes : finalPoint= ECSM (G,detMod) That is, we "add" G to itself ( detMod ) times in elliptic-curve arithmetic. The result is ( X , Y ) . Then we define it with this formula : curveSecret= X+ (Y≪16) 3) LFSR Shuffle We take 64 bits (lowest bits) from curveSecret and feed them into a Linear Feedback Shift Register for 64 rounds, producing a new 64-bit integer lfsrOutput. This step effectively scrambles the bits further. 4) BFS-Based Knight Path The code starts at square E5 on a 10×10 board labeled A..J (files) and 1..10 (ranks). Internally, E5 is (4,4) in 0-based coordinates. For each character in the username, we do: steps= (ASCII of char) mod 5 , then run a BFS for that many expansions. The BFS uses Knight moves (like (2,1), (1,2), etc.) with wrapping if we go off the board. We capture the last enqueued square after those BFS expansions, add that to our path, and repeat for the next character in the username. 5) “Check to the King” There is a King placed on G10 → (6,9) in 0-based coordinates. We look at the final square in our BFS path. If that final square is one knight’s move away from (6,9), we do an extra step: lfsrOutput = lfsrOutput⊕0xA5A5A5A5 For "CHESSKING" , the BFS path’s last square does or does not cause this XOR. In our run, it does cause the XOR (i.e., it’s in position to “check the King”). 6) Nibble → Weird SAN Moves We take the final integer (lfsrOutput) and break it into 12 consecutive 4-bit nibbles. For each nibble, we pick a “weird” standard algebraic notation (SAN) chess move from the code’s move table. This yields moves like e2e4, Na3xb5, Qd1h5, etc. 7) Final Serial Part A: The BFS squares (space-separated). A dash ( - ) Part B: The 12 SAN moves from the nibble-based table. Verifying everythin we gathered so far : For "CHESSKING" : E5 I3 C1 A7 G4 C1 C1 I8 E5 G4 After the code determines the King is in check, it XORs the LFSR output with 0xA5A5A5A5 Extract 12 nibbles → map to the weird SAN table. They all turned out to be mostly e2e4, with a couple of different ones in the middle (Bf1c4, d2d4) My final answer which is my Username and Serial Key is :6 points
-
Searching for "The Weakness of the Windows API" by ARTeam
-src -ARTeam.esfv -Thumbs.db -Weakness of the Windows API.Part1.pdf WeaknessoftheWindowsAPI.rar6 points
-
Api_WindowWithControls_Delphi
6 pointsA simple Template in Delphi with only winapi Api_WindowWithControls.txt6 points
-
Creating Controls With Assembler (Deep Dive Podcast) 📄+🎙️
Today I fed the gitbook I created into NotebookLM to create a deep dive podcast. This was the summary it created: I uploaded the deep dive podcast so that it can be downloaded. Its a 43MB .wav file with a duration of about 15mins. There was about 3 or 4 instances where the podcast "hosts" reference something that they say they touched on or talked about previously, but hadn't actually done so, but other than that its actually pretty good I would say. Here is the download link for the Creating Controls In Assembler Deep Dive Podcast: https://github.com/mrfearless/creating-controls-in-assembler/releases/download/Gitbook/Creating.Controls.In.Assembler.-.NotebookLM.-.Deep.Dive.Podcast.zip?raw=true The original online gitbook is here for reference: https://fearless.gitbook.io/creating-controls-in-assembler and pdf and .epub downloads are attached or available here: https://github.com/mrfearless/creating-controls-in-assembler/releases Creating Controls In Assembler-epub.zip Creating Controls In Assembler-pdf.zip6 points
-
BinaryShield (Custom VM)
6 pointsFun and not too difficult challenge. I always like me some VM crackmes Valid keys: Had enough fun reversing this so I made a full writeup with disassembler and devirtualized code: https://blog.washi.dev/posts/binaryshield-vm-crackme/6 points
-
VMProtect x64 v3.6 HWID Lock (All Protection Options)
For some reason, when I press VMCode, nothing happens. No badboy or goodboy message. But for now, I’ve managed to get any key to register successfully. I’ll still take a look at the VMCode routine—just out of curiosity—and if I manage to figure it out, I’ll definitely write a tutorial. Btw whats up with your x86 with your anti-anti tricks? It wont even start on my machine for some reason. Could you please take a look at it?5 points
-
Leaked VMProtect sources
5 points...because cloning git repo, or just clicking on anonfiles.com_d1D7M7q9z4_vmpsrc.zip is so f*ing complicated. You don't need VMProtect sources. What you need is a basic understanding of this magical thing called "the internet".5 points
-
help for macOs protector
5 points
-
Blackett
5 pointsHi! I took a look at it and shame that no one tried to solve it,here is my approach. Basic things i pulled: All four keys must differ. If any two keys are the same string, it shows “All keys must be different.” No key can contain "0@0". If you type a key like "0@0@something", it rejects it. “Erjey” can be used at most once, and if it appears, the fourth chunk of that key must be less than 6. That is, if a key has the substring "erjey", its format is X@Y@erjey@W, and W<6W < 6W<6. The third chunk in each key can be one of three strings: erjey kao tuts4you If you use something else, you get badboy error message. 2.2. Internally, a Linear Solver Digging deeper, i discovered a set of classes (d, e, j, etc.) that build a system of linear equations or inequalities. Each key of the form X@Y@{erjey|kao|tuts4you}@W is taken to mean X⋅x+Y⋅yRELWX , where the “relation” REL depends on the keyword: erjey → equality (=). kao → some inequality (≥ or ≤) depending on puzzle logic. tuts4you → the other inequality. From hints in the code and trial tests, we saw that: erjey is effectively “=”. For this puzzle’s code, kao ended up being “≥” and tuts4you was “≤” (the code flips them). Finally, after the solver ensures a feasible solution for (x, y), it calculates an “objective value” from the Name field, which must also be in the format A@B (two doubles). The code uses: objective=A×x+B×y If that objective is exactly 44 000, it shows: MessageBox.Show("Valid combination!"); That is the central condition: Ax+By=44000. 3. Constructing a Solution To guarantee the solver yields 44,000, we needed to pick (x, y) and (A,B) so that: A×x+B×y=44000. Additionally, we had exactly four constraints (the “Keys”) to pin down x and y. 3.1. The Simplest Trick: Set x=y One common approach: force x=y=c for some integer c < 6 (because the puzzle disallows “erjey@W” if W >= 6). Then we just need: (A+B)×c=44000 then this becomes A+B = 44000 / c Hence, pick any c in [1..5], and pick A + B = 44000 / c. 3.3. Example Name Then to satisfy (A+B) c=44000, choose a Name that splits as A@B with A+B=44000/c. For instance: Let c = 4. Then A+B must be 11000. We pick A = 5500 and B = 5500. So Name = "5500@5500". 3.4. Putting It All Together And if im right and if this is the keygen you have asked for : keygen.py5 points
-
Obsidium v1.69b1 x86 (All Protection Options)
I recommand the people to use this protection because it's very good. The protection is advanced like Pelock but very good. Only a real reserver can do it But it needs much times to be able handle it. UnpackMe.Obsidium.1.69b1.x86_unprotect.rar5 points
-
Scrolling Starfield_Delphi
5 points
-
Delphi Basics Offline Version 7.3
5 pointsA complete version of the web site has been converted into a Windows executable. It looks and behaves like the site, but with the added benefits of : No adverts Search facility for finding Run Time Library entries and .Net Methods. Fast access to 1,000+ pages of tutorial/reference pages - the full site and more System.Drawing.Graphics .Net class pages - 44 methods each with examples illustrated with graphical output Printing of pages precisely to any paper size or format RTL lists printable by letter, function, unit or category History drop-down of recent and popular RTL pages Database tutorials, not available on this web site Copy full text copy is enabled at last (the secret revealed by a user) Delphi Basics Offline 7.3.zip Serial.txt5 points
-
PatchMe No.1 2024 (x86 32-Bit)
5 points
-
ASProtect SKE 2.56 SDK Sample (x32)
5 pointsi made a video for unpacking with tools .... asprotect_unpack_by_terco.txt5 points
-
Coding Version.dll in Delphi To Patch EXE
5 points
-
Revteam Reverse Engineering Collection
4 points
-
Change return of Assembly.GetCallingAssembly fails in .NET 7
Mono still makes sense for environments that cannot work with JIT and require an interpreter (e.g., wasm), and is still the default implementation for legacy .NET Framework in e.g., wine. Also, MonoMod is not affiliated with Mono, nor does it work "just" for Mono. Its name originates from Unity using Mono, but it is built to also work for other versions of .NET, including .NET Framework, .NET Core and .NET. Harmony under the hood also uses MonoMod. If you want to use MonoMod directly instead of Harmony, it should be doable using MonoMod.RuntimeDetour. Example from their docs: // Create a Hook. using (var d = new Hook(methodInfoFrom, methodInfoTo)) { // When the detour goes out-of-scope (and thus has Dispose() called), the detour is undone. // If the object is collected by the garbage collector, the detour is also undone. }4 points
-
VMProtect Heaven's Gate Anti-Debug Bypass to VectorHandler
Here are the steps to get a completely modified version of x64dbg. Go to https://github.com/x64dbg/x64dbg Press this button in the top-right corner of your screen: You can then change the code to your liking (e.g., to bypass the anti-debug problem).4 points
-
Armadillo Nanomits Source Code
4 pointsIf you are familiar with the Armadillo program, you will remember that this software had a very interesting feature called "Nanomits", which was created to prevent dumps from being taken from protected processes. The source code below is actually a re-engineered version of the original product's behavior that is available to everyone https://github.com/NIKJOO/Nanomits Give repo a star if you find it useful.4 points
-
TinyCrackMe - WinLicense 3.1.7.0 Edition
4 points
-
VSEC Hyper Crackme II
4 pointsTime spent: 5 minutes from start to typing this message. It's a great example of how a compromised older version of the software (like your crackme v1.0) leads to a complete compromise of the new and improved protection. I hope to find some time on Sunday or early next week to make a writeup. But my spare time is limited these days, I apologize for that in advance.. If someone else wants to make a tutorial, I'd love to see that!4 points
-
Eclipse Runtime Obfuscator
4 pointsI suggest you think about this long and hard. What could possibly go wrong? I'll take the bonus points..4 points
-
The Enigma Protector x64 v7.4 (HWID Lock)
@boot How to bypass the x64 target like you had done? Regards. sean.4 points
-
The Enigma Protector x64 v7.4 (HWID Lock)
@Sh4DoVV How to bypass x64 version of enigma constant used target? Do we have to change CRCs and then change hwid to the given one like changing x86 version of it's hwid using @CodeExplorer's EnigmaHardwareID Tool and scripts for x86 targets? Many thanks in advance. Regards. sean.4 points
-
The Enigma Protector x64 v7.4 (HWID Lock)
Forgive me for speaking frankly. There is no need to use the so-called "KeyGen", and it can be directly forced to bypass this protection. Those who boast about "KeyGen" but do not provide effective solutions are useless besides wasting forum space and questioner's time. Video_2025-01-25_181545.mp44 points
-
calling getEHinfo in x64
4 pointsI've made real progress: ulong ledi1 = (ulong)selfEH.ToInt64(); // ulong leax1 = *(ulong*)(ledi1+0x58); ulong valueZero = *(ulong*)(leax1+0x28); ulong Pointer = leax1+0x28; MessageBox.Show(valueZero.ToString("X8")); When valueZero is zero method has no exception handers; So I've found add that EHCount from info->EHcount from CORINFO_METHOD_INFO_Fr4_x64 has invalid value; mainly the function was called for methods with no Exception Handlers.4 points
-
WaterEffect_Delphi
4 points
-
The Enigma Protector v7.70 (x32 & x64)
Would yuo like send valid registration otherwise it's christmas day so I have free times for challenge this one for this last years? Merry Christmas day for everybody 🎂🍾🎉🎊😁🤭.4 points
-
The Enigma Protector v7.70 (x32 & x64)
After having some free Times, I do some steps and don't find anything new. As always there are no change from it. Attach key and name to decrypt the section may be I will send a full tutorial for unpacking and patching enigma. May be the Author will know how their protection works and how to deal wit it. Have nice day4 points
-
Kernel Detective Src
4 pointsKernel Detective Purchased from GamingMasteR many years ago. As this code is quite old... I see zero reason not to make it public. This is the driver part "Kernel Detective" the x86 Anti-Rootkit. The GUI application may be found in Application.7z Was lazy, and did the upload via the github website =p If you make use of this source... you can do two simple things: 1). Give credit to GamingMaster 2). Give credit to me (Fyyre) -Fyyre https://github.com/Fyyre/kerneldetective4 points
-
Flare-On 11
4 pointsThe official announcement has just been made: https://cloud.google.com/blog/topics/threat-intelligence/announcing-eleventh-annual-flare-on-challenge. Countdown: https://flare-on.com/ Surprised by the YARA and Veriflog entries. I wonder what they have in mind for those.4 points
-
MASM32 graphical effects code collection
Merci, Frérot Steven.K (Xyl2k) MASM32-graphical-effects4 points
-
ASProtect SKE 2.56 SDK Sample (x32)
4 pointsThe easy way with "CodeDoctor" plugin ==>> Unpack Asprotect .... & you just need to add aspr_ide.dll file4 points
-
VMProtect v3.5.1
4 pointsde4vmp - VMProtect unvirtualizer: https://github.com/chickenienRE/de4vmp Demutation https://github.com/xlfj5211/DeMutation For MSIL decryption SMD_for_agile can be used. I didn't complete yet the challenge.4 points
-
MediaPlayer
4 pointsv1.0.0.5 https://github.com/mrfearless/MediaPlayer/releases/tag/1.0.0.5 Moved Spacebar play/pause toggle to accelerator table instead of WM_KEYDOWN. Set focus on media player video window on enter fullscreen to allow Escape key to exit fullscreen. Hide controls and cursor after 3 seconds in fullscreen mode, show controls and cursor on WM_MOUSEMOVE or exit of fullscreen. Controls do not hide if fullscreen and an audio track is loaded. MediaPlayer-x64.zip MediaPlayer-x86.zip4 points
-
MediaPlayer
4 pointsv1.0.0.3 https://github.com/mrfearless/MediaPlayer/releases/tag/1.0.0.3 Limit play speed to between x0.125 and x4. Adjusted German translation (thanks to Biterider). Added Spanish language menu resources (thanks to Biterider). Added Spanish language tooltips (thanks to Biterider). Reduced size of resources with sorcery and dark magic. Step 10 now only works at normal play speed or below. MediaPlayer Engine restart on every media file load. Fix video freeze/engine kill when opening a media file with a different codec than previous media file (MediaPlayer Engine restart). The i (info/about) button tooltip shows media information for streams when a media file is loaded, otherwise it just displays "About MediaPlayer". i button tooltip prepends stream number if total streams > 1 i button tooltip prepends stream selection ([*] or [-]) if total streams > 2 MediaPlayer-x86.zip MediaPlayer-x64.zip4 points
-
WinLicense v3.1.3.0 x86 (All Protection Options)
For this package, I did it. Winlicense 3.1.3 Test x64.zip However, @boot I couldn't do it for this package. give me your hand please. Many thanks in advance. Regards. sean.4 points