reverse-engineering

Hexdump reverse command

为君一笑 提交于 2020-08-22 20:39:43
问题 The hexdump command converts any file to hex values. But what if I have hex values and I want to reverse the process, is this possible? 回答1: There is a similar tool called xxd . If you run xxd with just a file name it dumps the data in a fairly standard hex dump format: # xxd bdata 0000000: 0001 0203 0405 ...... Now if you pipe the output back to xxd with the -r option and redirect that to a new file, you can convert the hex dump back to binary: # xxd bdata | xxd -r >bdata2 # cmp bdata bdata2

protect python code from reverse engineering

有些话、适合烂在心里 提交于 2020-08-08 07:17:32
问题 I'm creating a program in python (2.7) and I want to protect it from reverse engineering. I compiled it using cx_freeze (supplies basic security- obfuscation and anti-debugging) How can I add more protections such as obfuscation, packing, anti-debugging, encrypt the code recognize VM. I thought maybe to encrypt to payload and decrypt it on run time, but I have no clue how to do it. 回答1: Generally speaking, it's almost impossible for you to make your program unbreakable as long as there's

Universign Disabling PDF Download

穿精又带淫゛_ 提交于 2020-06-29 03:43:38
问题 Note: The Code I've written isn't polished, it's just for prototyping, so please excuse me if I have any bad practices and correct me if I do! Thank you. How can I disable or remove download button in Universign signing form? I have the form embedded in an iframe like this. <iframe src="https://app.universign.com/sig/sign/(form id goes here)" sandbox='allow-scripts allow-same-origin I've written a script to manipulate and use cors-anywhere API to GET all the necessary files such as css files,

Decipher phase 2 stage

删除回忆录丶 提交于 2020-06-23 19:26:53
问题 I am finding difficulties in defusing phase 2. i need to get 6 numbers in order to defuse the phase 2: The assembly line for phase 2 section is as follows: 08048b54 <phase_2>: 8048b54: 53 push %ebx 8048b55: 83 ec 30 sub $0x30,%esp 8048b58: 65 a1 14 00 00 00 mov %gs:0x14,%eax 8048b5e: 89 44 24 24 mov %eax,0x24(%esp) 8048b62: 31 c0 xor %eax,%eax 8048b64: 8d 44 24 0c lea 0xc(%esp),%eax 8048b68: 50 push %eax 8048b69: ff 74 24 3c pushl 0x3c(%esp) 8048b6d: e8 d2 05 00 00 call 8049144 <read_six

Decipher phase 2 stage

爷,独闯天下 提交于 2020-06-23 19:20:11
问题 I am finding difficulties in defusing phase 2. i need to get 6 numbers in order to defuse the phase 2: The assembly line for phase 2 section is as follows: 08048b54 <phase_2>: 8048b54: 53 push %ebx 8048b55: 83 ec 30 sub $0x30,%esp 8048b58: 65 a1 14 00 00 00 mov %gs:0x14,%eax 8048b5e: 89 44 24 24 mov %eax,0x24(%esp) 8048b62: 31 c0 xor %eax,%eax 8048b64: 8d 44 24 0c lea 0xc(%esp),%eax 8048b68: 50 push %eax 8048b69: ff 74 24 3c pushl 0x3c(%esp) 8048b6d: e8 d2 05 00 00 call 8049144 <read_six

Converting code from SQL Server to SQLite using reverse-engineering

我们两清 提交于 2020-06-17 09:42:13
问题 I have a WinForms app that I was writing as a side-project. It made use of a local SQL Server database, via Entity Framework, and it worked, but then it was very difficult to create a reasonable installer. It was suggested here that I might consider switching to SQLite, as a more appropriate solution. To attempt this, I first followed a suggestion I saw elsewhere to download SQLite Database Browser. I used that to create a new database, following the structure of the SQL Server database I

Reverse engineer Ceasar cipher

和自甴很熟 提交于 2020-06-15 20:09:12
问题 I reverse engineered to decrypt, but do not get the expected result. For example, entering Lipps${svph% with offset 4 should result in Hello World! but I get ello´world³ What did I do wrong? code = input("Enter text to decrypt: ") distance = int(input("Enter number of offset: ")) plainText = '' for ch in code: ordValue = ord(ch) cipherValue = ordValue - distance if cipherValue < ord('a'): cipherValue = ord('z') - \ (distance - (ord('a') - ordValue + 1)) plainText += chr(cipherValue) print