搜索资源列表
qqcheck
- QQ2004本地查看聊天记录内存补丁-AIM chat memory patch
MemPatch
- VB做的内存补丁模板,可以制作出自己的内存补丁风格,类似KEYMAKE的功能-memory patch template, can create their own memory patch style, KEYMAKE similar to the function
学习破解手记
- 步骤一 查壳步骤二 脱壳步骤三 试运行程序 发现突破点步骤四 W32DASM 寻找突破点(可以跳过)步骤五 查询软件的编译类型步骤六 采用GetVBRes v0.51 对付VB程序步骤七 用W32Dasm载入修改后的文件步骤八 制作内存补丁 KeyMake v1.73-steps to check a shell two steps Shelling three steps trial operation procedures found breakthrough steps to find a
VB_VSPatch
- VS平台内存补丁,基于逆向分析,去除自身MD5检测、*检测等功,实现挤房间和安全开MH等功能,本身不含MH-VS platform memory patch, based on the reverse analysis, to remove their own MD5 detection, plug-in detection, such as power, to achieve crowded room and safety features such as open MH itself is
DllPatch
- DLL内存补丁,由于DLL加载需要重定位,基地址变化,该工具可动态查找指定进程和DLL,并对DLL的相对地址进行修改,遍历进程和DLL,获取DLL基地址,写入数据长度,数据内容-DLL memory patch, because of relocation required DLL is loaded, change the base address, the tool can search the specified dynamic process and DLL, the relative
1st_JavaScript_Memory_patch
- 1St Javascr ipt Edit 最新破解内存补丁,适用于 1st Javascr ipt Edit 3.8版本,我自己已经在本机测试过-1St Javascr ipt Edit 3.8 News Memory patch Code C++ Source File
ModuleTutorialv1
- pbp文件的构架设计 This tutorial describes the use of modules in the PSP. The purpose of this tutorial is two-fold: first, to describe the basic steps to create PSP modules, including pure export modules and applications. Second, to present in detail wh
ReflectiveDllInjection_v1.0
- 在Windows平台上,本地和远程库注射技术 多年来一直存在。作为开采技术的远程库注入 在2004年推出Skape和JT[1]。他们的技术采用的shellcode修补主机进程NTDLL在运行时库,并迫使Windows加载本地加载动态链接库DLL)从内存中的镜象。这种技术的叫做反射DLL注入。-Under the Windows platform, library injection techniques both local and remote have been around f
libXi6.so-alignment-patch.tar
- Patch for Xorg s libXi6.so memory alignment to 8-Byte boundaries for higher performance and as a fix for the SIGBUS errors on certain RISC architectures with mandatory memory alignment (like Little Endian MIPS).
EPATHOBJExploit
- 0day提权漏洞 win2003-win 8均适用 Windows内核EPATHOBJ 0day漏洞是通过对PATHALLOC()进行内存压力测试爆出的,首先利用PATHREC>指向相同的的用户空间PATHREC EPATHOBJ::bFlatten它会”自旋”进行无限链表遍历。虽然它会自旋,但它会通过另一个线程池来打补丁(pprFlattenRec)到列表中的节点(因为它是在用户空间)。从而得到系统权限。-0day vulnerability mention the right
singlestep
- 利用调试、单步执行机制大造内存补丁,XP下通过-Use debug, single-step execution mechanism creating a big patch of memory, XP through
XMemPatch-1.0
- 暗组内存补丁生成器 暗组内存补丁生成器-Dark patch generator set memory
fstab
- SQueeZe driver enable restricting the amount of main memory available without having to patch physmem and reboot hopefully, this can become the System Query driver. -SQueeZe driver enable restricting the amount of main memory available without ha