New here? Post 10 threads to unlock access to threads, or upgrade now to access Crax all content instantly!
Join CraxPro and earn real money through our Credit Rewards System. Participate and redeem credits for Bitcoin/USDT. Start earning today! Read the detailed thread here
You are using an out of date browser. It may not display this or other websites correctly. You should upgrade or use an alternative browser.
Link:
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ****** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
A simple cryptor for .NET/Native files with Injection and obfuscation
Features:
• Anti-Debug
• Anti-VM
• StartUp
• Melting
• Running as Admin
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Jigsaw takes a raw shellcode input and outputs randomized shellcode, a lookup table, and a C/C++ stub to translate the randomized shellcode back to a usable format.
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
Practical reverse engineering x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation by Bruce Dang, Alexandre Gazet, Elias Bachaalany, Sébastien Josse - PDF
Analyzing how hacks are done, so as to stop them in the future
Reverse engineering is the process of analyzing hardware or...
Practical reverse engineering_ x86, x64, ARM, Windows Kernel, reversing tools, and obfuscation
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***
ADD AN IMAGE HERE! [Not adding an image will result in removal]
Then remove these lines.
Download: HERE
*** Hidden text: You do not have sufficient rights to view the hidden text. Visit the forum thread! ***