background preloader

Resource Hacker

Resource Hacker
Version 4.2.5 Last updated: 17 August 2015 Copyright © 1999-2015 Angus Johnson Freeware - no nags, no ads and fully functional.Download Overview: Resource Hacker™ has been designed to be the complete resource editing tool: compiling, viewing, decompiling and recompiling resources for both 32bit and 64bit Windows executables. Compiling: Viewing Resources: Once a file has been opened, most resources will be displayed as either an image (or group of images) or as decompiled text: However, some resource types will be displayed in both its compiled form (eg dialog or popup menu) and in its decompiled text format. Some resource types can only be displayed as a dump of raw byte data: Using the internal editor to modify text-based resources: Dialog, menu, string-table, message-table, accelerators and Borland form resources can all be easily edited and recompiled using the internal resource editor. New controls can also be added. Replacing Images: Command Line Scripting: Command line syntax has 2 forms:

how to hack apps using IDA PRO - iHackMyi this is prob a crummy tut cuz its my first so i can use teamveiwer and show u how if u want. it is a long and complicated process, ur going to need ida pro so u can google for that u can either crack it or get the trial. once u have that u need the app u want to hack sooo ill use deathnight as an example for this. 1. download the cracked version of the game u want to hack ( u will not be able to hack app downloaded form the app store cuz they are encrypted ) 2. once u have the app open it up using winrar, and open the payload folder, in there you should see a bunch of files look for the binary file (EX. most of the time it is the largest file in there. also it does not have an extension on it and most of the time its the same name as the app.) 3. open it up in IDA pro, if you have a iphone 3g or ipod touch 2G and lower click on the arm 6 option if u have a 3GS or 3G ipod and up choose arm 7, then click on the drop down menu and select the top option. Quote

Part 2 – IDA assembly — Proger's blog Getting serious now - launching IDA and learning an introduction lesson into assembler language (ASM). Alright, here we are. Debugger is an incredible thing that allows us to read people’s minds… Ahem, yes sorry for being a little offtopic :) Let’s get and unpack IDA Pro somewhere and load ScenarioRunner.exe into it. Most of the time I use IDA because it has much better capabilities than OllyDbg when it comes to giving names to memory locations, functions, etc. – Olly doesn’t have any of this.However, Olly has very good breakpoint logging, plus patching functions and many other features that IDA lacks (or is limited in) so sometimes I use Olly as well – we’ll use it too in later chapters.However, at the beginning I use IDA. After a few sec IDA will disassemble the exe, you’ll notice it has finished when a bulb on the right of the third panel row from the top changes color from yellow to green. IDA has a terrible interface when you look at it at the beginning, even compared to Olly.

Alvasoft.net > Windasm logiciel pour désassembler 1. Qu'est-ce qu'un désassembleur ? Un désassembleur sert à voir ce qu'il y a à l'intérieur d'un programme (EXE, DLL,). Quand vous en désassemblerez un, vous aurez droit à un listing traduit en code assembleur. Lorsqu'un programmeur fait un programme, il utilise des instructions spécifiques à son langage (C++, Visual Basic, ...). Pour voir ces instructions assembleur, il vous faut donc un désassembleur et donc W32Dasm. L'avantage de W32dasm est qu'il possède aussi la fonction de debugging (permet d'exécuter pas à pas les instructions assembleur) et de ce fait, cela peut épargner l'utilisation de SoftIce (maître incontesté du debugging). 2. 2.1. Open File to Disassemble : Permet l'ouverture du fichier à désassembler.Disassembler Options :A cocher : Enable JUMP CONDITIONAL ,JUMP INCONDITIONNAL + CALL (X référence) [options par défaut]. Ces choix sont faits pour afficher ou non les CALL et JUMP qui vont appeler les routines qui suivent. 2.2 Project 2.3 Debug 2.4 Search 2.5 Goto 2.6 Execute Text

HackBBS Portable Executable File Format - Wikipédia Un article de Wikipédia, l'encyclopédie libre. Le format PE (Portable Executable, exécutable portable) est le format des fichiers exécutables et des bibliothèques sur les systèmes d'exploitation Windows 32 bits et 64 bits : .exe (programmes), .ocx (OLE et ActiveX), .dll et .cpl (élément du panneau de configuration Windows). C'est un format dérivé du COFF. Historique[modifier | modifier le code] Schéma du Format PE[modifier | modifier le code] Un fichier exécutable PE est structuré de la façon suivante : Les deux premiers octets du fichiers représentent les caractères MZ. En-tête MZ sous MS-DOS[modifier | modifier le code] On reconnaît par exemple : e_magic qui doit valoir "MZ"e_lfanew qui contient l'adresse du début de l'en-tête PE Segment DOS[modifier | modifier le code] Le segment DOS est exécuté au cas où Windows ne reconnaîtrait pas le fichier comme étant au format PE ou que vous tentez de le lancer sous MS-DOS. En-Tête PE[modifier | modifier le code] Répertoires[modifier | modifier le code]

Ivanlef0u's Blog Inject your code to a Portable Executable file - CodeProject Downloads PE Viewer PE Maker - Step 1 - Add new Section. PE Maker - Step 2 - Travel towards OEP. PE Maker - Step 3 - Support Import Table. PE Maker - Step 4 - Support DLL and OCX. Contents 0 Preface It might be, you demand to comprehend the ways a virus program injects its procedure in to the interior of a portable executable file and corrupts it, or you are interested in implementing a packer or a protector for your specific intention to encrypt the data of your portable executable (PE) file. You can employ the source code of this article to create your custom EXE builder. 1 Prerequisite There are no specific mandatory prerequisites to follow the topics in this article. 2 Portable Executable file format The Portable Executable file format was defined to provide the best way for the Windows Operating System to execute code and also to store the essential data which is needed to run a program, for example constant data, variable data, import library links, and resource data. PE Viewer

HOWTO-Reverse Engineering - ScummVM :: Wiki Introduction This page is meant to provide some basic suggestions and strategies for people who are starting out with reverse engineering old adventure games, and aren't sure how to do it. It mainly focuses on resources and tools for reversing DOS game executables, but much of the strategies discussed may apply equally to other systems and debugging tools. Resources IDA Disassembler IDA is one of the best disassemblers available. DosBox Debugger The DosBox Debugger is an invaluable tool for running old DOS games, to monitor how the program executes, and what values are generated by the executing code. XVI32 Hex File Viewer Although IDA has a built in hex viewer for the executable itself, the XVI32 tool is useful for viewing the contents of all the other files that come with a game. Ralf Brown's Interrupt List A nice reference for the operation of DOS interrupts. 8086 Assembly Language For those new to 8086 assembly language, you'll need a handy reference to learn the syntax. File Access

Apprendre le hacking - Les bases du hack et la sécurité informatique, le site du vrai hacking IDAPython conditional breakpoints or ‘QuickHooking with IDAPython’ « Exploiting Stuff. Conditional breakpoints Conditional breakpoints. Ohh beloved conditional breakpoints! Everybody loves conditional breakpoints. We can clearly see that set_bp only sets a breakpoint (in this example, a software breakpoint), enables it, and defines a condition for it. It’s in this function where we’ll be doing the IDAPython magic to handle our breakpoint. These are just some DEFINE-like lines to get rid of the problem i’ve mentioned before. It’s just a dirty way to keep it a oneliner: RunPythonStatement always returns 0, so Byte(0x10000) is what really matters. that way cond() will return 0 or 1 depending on which function (CONTINUE or BREAK) we called. Like this: Like Loading...

idapython-1.5.3.zip - idapython - IDAPython 1.5.3 Source Package - Python Plugin for Interactive Disassembler Pro - Google Project Hosting My favorites ▼ | Sign in Project Home Downloads Wiki Issues Source Terms - Privacy - Project Hosting Help Powered by Google Project Hosting The IDA Palace {IDC files}Download scripts to automate the Interactive Disassembler {pe scripts by Atli Gudmundsson} Enhances handling/modification of pe files. {SofICE/Icedump parsing scripts by Toteu} Further studying inc files of icedump and nticedump, I realised that they contain a lot of info and I wrote 2 IDC scripts for IDA to parse them and propagate the info in disassembly. Very useful. {H2enum by Leonid Lisovsky} This file creates IDA Enums by parsing C/C++ .H include file {idc script collection} A collection of IDC scripts. {Delphi RTTI script by redplait} This script deal with Delphi RTTI structures {Pseudo_C by trapflag} Creates pseudo-c code to aid you in the progress of decompiling a target. {Award Bios script by Alexey Kulentsov} No description available {Script to import DDM map files by Aleph} A very simple IDA script and two primitive utilities for reformatting EXE2DPR and DeDe output files and reimport them to IDA database {Useful toys by Hard Wisdom} needs perl. {Next page}

Apprendre le hacking - Les bases du hack et la sécurité informatique, le site du vrai hacking Mon but avec ce site est d'apporter les connaissances de base de la sécurité informatique et d'essayer de transmettre les techniques fondamentales du vrai hacking. Que sont ces bases ? Tout sauf des outils permettant d'exploiter de manière aveugle des failles bateau ou récupérer le mot de passe d'une personne sur divers sites. Happy hacking ! FrizN Côté copyrights, j'ai remarqué que pas mal de sites commençent à copier mon contenu, et même certains profs dans leurs cours.

Related: