Prab Posted May 17, 2020 Posted May 17, 2020 View File DotNetSafer This file is packed with DotNetSafer using the following protections; Constants Protection Mutation Protection ILDasm Protection Invalid Metadata Protection Invalid Cctor Protection Name Protection Goal : Unpack the file and detail the methods you used to bypass the above protection options. Submitter Prab Submitted 05/15/2020 Category UnPackMe (.NET)
Rhotav Posted May 17, 2020 Posted May 17, 2020 Sorry, I don't have time to write Deobfuscator. However, I am sharing the tamper removed. Control Flow is very bad: D Hmm-Obf_tamped.exe If nobody is interested, I can look after it.(When I'm done ...)
0x59 Posted November 7, 2020 Posted November 7, 2020 (edited) Constant Decrypt and clean mutations after u are able to see the password Edited November 7, 2020 by 0x59
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now