Are you over 18 and want to see adult content?
More Annotations
A complete backup of https://grindelwald.net
Are you over 18 and want to see adult content?
A complete backup of https://citeworld.com
Are you over 18 and want to see adult content?
A complete backup of https://quicktransportsolutions.com
Are you over 18 and want to see adult content?
A complete backup of https://senioripraha8.cz
Are you over 18 and want to see adult content?
A complete backup of https://johntfay.com
Are you over 18 and want to see adult content?
A complete backup of https://amlak-sedaghat-hadishahr.ir
Are you over 18 and want to see adult content?
A complete backup of https://babylovingmama.com
Are you over 18 and want to see adult content?
A complete backup of https://wacul-ai.com
Are you over 18 and want to see adult content?
A complete backup of https://parfuemerie-pieper.de
Are you over 18 and want to see adult content?
A complete backup of https://isea-international.org
Are you over 18 and want to see adult content?
A complete backup of https://nanya.ru
Are you over 18 and want to see adult content?
Favourite Annotations
A complete backup of https://pawtucketanimalshelter.weebly.com/
Are you over 18 and want to see adult content?
A complete backup of http://scandal.tgcom24.it/
Are you over 18 and want to see adult content?
A complete backup of https://www.amazon.com/music/prime
Are you over 18 and want to see adult content?
A complete backup of https://www.indeed.com/q-Tunisia-jobs.html
Are you over 18 and want to see adult content?
A complete backup of https://www.creta.gr/company/xenakis-fontas/3697
Are you over 18 and want to see adult content?
A complete backup of https://chinaq.tv/jp190708/
Are you over 18 and want to see adult content?
A complete backup of http://veryaoionline.net/page/10
Are you over 18 and want to see adult content?
A complete backup of http://veryaoionline.net/tag/activos/page/5
Are you over 18 and want to see adult content?
A complete backup of https://www.maison-energy.com/unelvent-M13/
Are you over 18 and want to see adult content?
A complete backup of https://www.babeshows.co.uk/showthread.php?tid=77809
Are you over 18 and want to see adult content?
Text
CHESTER FRITZ
Gilisoft Password Recovery Tool is a simple utility that allows you to recover the master password for 4 Gilisoft applications. This utility has been successfully tested on the following Gilisoft programs andversions:
REVERSE ENGINEERING TIPS: AN INTRODUCTION TO X64DBG Welcome to this short, introductory tutorial for using x64dbg by Mr. Exodia. The goal of this tutorial is to teach you some of the fundamentals of the x64dbg and show you how closely its features and flexibility resembles its close cousin Ollydbg.While x64dbg is still in an alpha stage, its bugs are minor and few with only a crash happening under unlikely conditions. REVERSE ENGINEERING TIPS: SOFTWARE APPLICATIONS Reverse engineering, password recovery, and programming software. A Reverse Engineering blog dedicated to unraveling the mysteries of reverse engineering. REVERSE ENGINEERING TIPS: BYPASSING PROTECTIONS: REVERSING After stepping to the end of the procedure, we discover that the value pushed onto the stack is a pointer to a Unicode string value which gets populated with the registration information string which will appear on the about form. REVERSE ENGINEERING TIPS: UNPACKING LAUNCH4J 3.5 Welcome to this short tutorial for unpacking Launch4j. Launch4j is a Java executable wrapper for Windows which makes the process of deploying a Java application on windows a REVERSE ENGINEERING TIPS: INCREDIMAIL PASSWORD RECOVERY TOOL Incredimail Password Recovery Tool can recover all of your Incredimail passwords from your email passwords, to your incredimail account.It is 100% free for non-commercial use. Download: REVERSE ENGINEERING TIPS: BYPASSING PROTECTIONS Welcome to part 2 of the Bypassing Protections series. In this part, we will be looking at an application which uses online activation to verify a license key and activate the software. REVERSE ENGINEERING TIPS: PIRACY: MY THOUGHTS AND OPINIONS The Leading Reverse Engineering Blog. Learn The Tips and Tricks of The Trade. Discover New Tools and Master New Strategies. REVERSE ENGINEERING TIPS: HASHING UTILITY 2.0 WITH UNICODE Hashing Utility v2.0 is a small utility coded in Delphi which gives the user the ability to calculate hashes and CRC values from a string using either ASCII or Unicode encoding. REVERSE ENGINEERING TIPS Inline Empty Byte Finder is a tool designed to help you find a location inside an executable or dll file to create an inline patch or code cave. It can check for specific section flags to meet the requirements for your inline. Inline finder searches for areas the meet the size that you specify, but also lists how many extra bytes are available at that offset. REVERSE ENGINEERING TIPS: GILISOFT PASSWORD RECOVERY TOOLAUTHOR:CHESTER FRITZ
Gilisoft Password Recovery Tool is a simple utility that allows you to recover the master password for 4 Gilisoft applications. This utility has been successfully tested on the following Gilisoft programs andversions:
REVERSE ENGINEERING TIPS: AN INTRODUCTION TO X64DBG Welcome to this short, introductory tutorial for using x64dbg by Mr. Exodia. The goal of this tutorial is to teach you some of the fundamentals of the x64dbg and show you how closely its features and flexibility resembles its close cousin Ollydbg.While x64dbg is still in an alpha stage, its bugs are minor and few with only a crash happening under unlikely conditions. REVERSE ENGINEERING TIPS: SOFTWARE APPLICATIONS Reverse engineering, password recovery, and programming software. A Reverse Engineering blog dedicated to unraveling the mysteries of reverse engineering. REVERSE ENGINEERING TIPS: BYPASSING PROTECTIONS: REVERSING After stepping to the end of the procedure, we discover that the value pushed onto the stack is a pointer to a Unicode string value which gets populated with the registration information string which will appear on the about form. REVERSE ENGINEERING TIPS: UNPACKING LAUNCH4J 3.5 Welcome to this short tutorial for unpacking Launch4j. Launch4j is a Java executable wrapper for Windows which makes the process of deploying a Java application on windows a REVERSE ENGINEERING TIPS: INCREDIMAIL PASSWORD RECOVERY TOOL Incredimail Password Recovery Tool can recover all of your Incredimail passwords from your email passwords, to your incredimail account.It is 100% free for non-commercial use. Download: REVERSE ENGINEERING TIPS: BYPASSING PROTECTIONS Welcome to part 2 of the Bypassing Protections series. In this part, we will be looking at an application which uses online activation to verify a license key and activate the software. REVERSE ENGINEERING TIPS: PIRACY: MY THOUGHTS AND OPINIONS The Leading Reverse Engineering Blog. Learn The Tips and Tricks of The Trade. Discover New Tools and Master New Strategies. REVERSE ENGINEERING TIPS: HASHING UTILITY 2.0 WITH UNICODE Hashing Utility v2.0 is a small utility coded in Delphi which gives the user the ability to calculate hashes and CRC values from a string using either ASCII or Unicode encoding. REVERSE ENGINEERING TIPS Inline Empty Byte Finder is a tool designed to help you find a location inside an executable or dll file to create an inline patch or code cave. It can check for specific section flags to meet the requirements for your inline. Inline finder searches for areas the meet the size that you specify, but also lists how many extra bytes are available at that offset. REVERSE ENGINEERING TIPS: INCREDIMAIL PASSWORD RECOVERY TOOL Incredimail Password Recovery Tool can recover all of your Incredimail passwords from your email passwords, to your incredimail account.It is 100% free for non-commercial use. Download: REVERSE ENGINEERING TIPS: JANUARY 2016 The Leading Reverse Engineering Blog. Learn The Tips and Tricks of The Trade. Discover New Tools and Master New Strategies. REVERSE ENGINEERING TIPS: INLINE PATCHING: GET THE IMAGE When doing an inline, whether it be from a DLL or inside the main module itself, getting the image base of the main module can be tricky in some circumstances. REVERSE ENGINEERING TIPS: PIRACY: MY THOUGHTS AND OPINIONS The Leading Reverse Engineering Blog. Learn The Tips and Tricks of The Trade. Discover New Tools and Master New Strategies. REVERSE ENGINEERING TIPS: BASE64 TOOL Base64 Tool is a simple freeware utility that allows you to base64 encode AnsiStrings, WideStrings, and hexadecimal values as well as decode them to their original format. REVERSE ENGINEERING TIPS: UNPACKING JAR2EXE 2.1 Welcome to this extensive tutorial for unpacking Jar2Exe. Jar2Exe is a java executable wrapper which works by taking your original java archive, wrapping it into an executable, and executing it through a virtual environment using the jvm.dll provided with each javadistribution.
REVERSE ENGINEERING TIPS: CUSTOMIZABLE ASPR_IDE.DLL WITH The Leading Reverse Engineering Blog. Learn The Tips and Tricks of The Trade. Discover New Tools and Master New Strategies. REVERSE ENGINEERING TIPS: EXE4J UNPACKER The Leading Reverse Engineering Blog. Learn The Tips and Tricks of The Trade. Discover New Tools and Master New Strategies. REVERSE ENGINEERING TIPS: FEBRUARY 2015 ClickLocker is marketed as a digital security solution that allows a content author to easily manage their digital rights by enabling them to regulate access to their ebook, video, or software product. While the ClickLocker website claims that "ClickLocker provides the industrial-strength security you deserve", this is a blatant exaggeration and misleading statement. REVERSE ENGINEERING TIPS: AN INTRODUCTION TO X64DBGAUTHOR: CHESTERFRITZ
Welcome to this short, introductory tutorial for using x64dbg by Mr. Exodia. The goal of this tutorial is to teach you some of the fundamentals of the x64dbg and show you how closely its features and flexibility resembles its close cousin Ollydbg.While x64dbg is still in an alpha stage, its bugs are minor and few with only a crash happening under unlikely conditions. REVERSE ENGINEERING TIPS: SOFTWARE APPLICATIONS Reverse Engineering: PE Appended Data Viewer 1.02: A Tool for Viewing the Overlay of a PE File. Hashing Utility Extended: Hash Strings With 77 Character Encoding Schemes. Hashing Utility Standard: Hashing with Unicode Support. Base64 Tool: A Utility for Encoding and Decoding Base64. Inline Empty Byte Finder: A Utility for Finding Empty Bytes REVERSE ENGINEERING TIPS: PIRACY: MY THOUGHTS AND OPINIONS Being a hobbyist reverse engineer, one inescapable fact that I have come to realize while interacting with professional reverse engineers around the world is that the majority of us became drawn to this field by software piracy. In my teenage years, I was the child of a single mother. I grew up in a small mountain town of less that 3000 people REVERSE ENGINEERING TIPS: BYPASSING PROTECTIONS: REVERSING The only thing left to do is to replace the dll in the directory with the one that we created, patch the integrity checks in the modules (not shown for legal purposes), and add a fake key in the registry (not shown for legal purposes). Now that we have done this, we will discuss some ways for the author to improve this protection. REVERSE ENGINEERING TIPS: GILISOFT PASSWORD RECOVERY TOOL Gilisoft Password Recovery Tool is a simple utility that allows you to recover the master password for 4 Gilisoft applications. This utility has been successfully tested on the following Gilisoft programs andversions:
REVERSE ENGINEERING TIPS: UNPACKING LAUNCH4J 3.5 To do this, right click the selection and click the 'Edit' button. From here, another menu will appear. Go to the option 'Copy Block' and in the sub-menu, click 'Into New File'. Afterwards, a save dialog will appear. In this example, I decided to name the file 'SimpleApp2.jar'. After clicking save, let's run our extracted file and see the results. REVERSE ENGINEERING TIPS: BYPASSING PROTECTIONS Welcome to part 2 of the Bypassing Protections series. In this part, we will be looking at an application which uses online activation to verify a license key and activate the software. After activation, the server allows the user to upload their sensitive data to the server, using their registration information as authentication. REVERSE ENGINEERING TIPS: HASHING UTILITY 2.0 WITH UNICODE Hashing Utility 2.0 With Unicode Support. Hashing Utility v2.0 is a small utility coded in Delphi which gives the user the ability to calculate hashes and CRC values from a string using either ASCII or Unicode encoding. It supports the following hash types: The tool is free for both home and commercial use and is open source. REVERSE ENGINEERING TIPS: INCREDIMAIL PASSWORD RECOVERY TOOL Incredimail Password Recovery Tool. Incredimail Password Recovery Tool can recover all of your Incredimail passwords from your email passwords, to your incredimail account. It is 100% free fornon-commercial use.
UNPACKING JAR2EXE 2.1: EXTRACTING THE JAR FILE AT ALL 3 This is the strongest protection offered by Jar2Exe. First, it changes all of the class file names to gibberish. Second, it encrypts and hides the files just like the level 2 protection. While we can recover the archive with a similar method as in Level 2, we REVERSE ENGINEERING TIPS: AN INTRODUCTION TO X64DBGAUTHOR: CHESTERFRITZ
Welcome to this short, introductory tutorial for using x64dbg by Mr. Exodia. The goal of this tutorial is to teach you some of the fundamentals of the x64dbg and show you how closely its features and flexibility resembles its close cousin Ollydbg.While x64dbg is still in an alpha stage, its bugs are minor and few with only a crash happening under unlikely conditions. REVERSE ENGINEERING TIPS: SOFTWARE APPLICATIONS Reverse Engineering: PE Appended Data Viewer 1.02: A Tool for Viewing the Overlay of a PE File. Hashing Utility Extended: Hash Strings With 77 Character Encoding Schemes. Hashing Utility Standard: Hashing with Unicode Support. Base64 Tool: A Utility for Encoding and Decoding Base64. Inline Empty Byte Finder: A Utility for Finding Empty Bytes REVERSE ENGINEERING TIPS: PIRACY: MY THOUGHTS AND OPINIONS Being a hobbyist reverse engineer, one inescapable fact that I have come to realize while interacting with professional reverse engineers around the world is that the majority of us became drawn to this field by software piracy. In my teenage years, I was the child of a single mother. I grew up in a small mountain town of less that 3000 people REVERSE ENGINEERING TIPS: BYPASSING PROTECTIONS: REVERSING The only thing left to do is to replace the dll in the directory with the one that we created, patch the integrity checks in the modules (not shown for legal purposes), and add a fake key in the registry (not shown for legal purposes). Now that we have done this, we will discuss some ways for the author to improve this protection. REVERSE ENGINEERING TIPS: GILISOFT PASSWORD RECOVERY TOOL Gilisoft Password Recovery Tool is a simple utility that allows you to recover the master password for 4 Gilisoft applications. This utility has been successfully tested on the following Gilisoft programs andversions:
REVERSE ENGINEERING TIPS: UNPACKING LAUNCH4J 3.5 To do this, right click the selection and click the 'Edit' button. From here, another menu will appear. Go to the option 'Copy Block' and in the sub-menu, click 'Into New File'. Afterwards, a save dialog will appear. In this example, I decided to name the file 'SimpleApp2.jar'. After clicking save, let's run our extracted file and see the results. REVERSE ENGINEERING TIPS: BYPASSING PROTECTIONS Welcome to part 2 of the Bypassing Protections series. In this part, we will be looking at an application which uses online activation to verify a license key and activate the software. After activation, the server allows the user to upload their sensitive data to the server, using their registration information as authentication. REVERSE ENGINEERING TIPS: HASHING UTILITY 2.0 WITH UNICODE Hashing Utility 2.0 With Unicode Support. Hashing Utility v2.0 is a small utility coded in Delphi which gives the user the ability to calculate hashes and CRC values from a string using either ASCII or Unicode encoding. It supports the following hash types: The tool is free for both home and commercial use and is open source. REVERSE ENGINEERING TIPS: INCREDIMAIL PASSWORD RECOVERY TOOL Incredimail Password Recovery Tool. Incredimail Password Recovery Tool can recover all of your Incredimail passwords from your email passwords, to your incredimail account. It is 100% free fornon-commercial use.
UNPACKING JAR2EXE 2.1: EXTRACTING THE JAR FILE AT ALL 3 This is the strongest protection offered by Jar2Exe. First, it changes all of the class file names to gibberish. Second, it encrypts and hides the files just like the level 2 protection. While we can recover the archive with a similar method as in Level 2, we REVERSE ENGINEERING TIPS Gilisoft USB Encryption v10.0.0 is a popular product that is marketed as a USB/flash drive encryption solution. It appears to be a continuation of the now discontinued Wondershare USB Drive Encryption product. According to Gilisoft's product description, it claims to be using AES-256 on-the-fly encryption to secure your files. REVERSE ENGINEERING TIPS: SOFTWARE APPLICATIONS Reverse Engineering: PE Appended Data Viewer 1.02: A Tool for Viewing the Overlay of a PE File. Hashing Utility Extended: Hash Strings With 77 Character Encoding Schemes. Hashing Utility Standard: Hashing with Unicode Support. Base64 Tool: A Utility for Encoding and Decoding Base64. Inline Empty Byte Finder: A Utility for Finding Empty Bytes REVERSE ENGINEERING TIPS: PIRACY: MY THOUGHTS AND OPINIONS Being a hobbyist reverse engineer, one inescapable fact that I have come to realize while interacting with professional reverse engineers around the world is that the majority of us became drawn to this field by software piracy. In my teenage years, I was the child of a single mother. I grew up in a small mountain town of less that 3000 people REVERSE ENGINEERING TIPS: APRIL 2020 The Leading Reverse Engineering Blog. Learn The Tips and Tricks of The Trade. Discover New Tools and Master New Strategies. REVERSE ENGINEERING TIPS: RANDOM SERIAL GENERATOR 1.0 Random Serial Generator 1.0 is a simple application that allows you to generate a random serial number for testing license algorithms or implementing them into your own application. Features: 1. Predefined Character Sets: A-Z, a-z, 0-9, 0-F, 0-f, 0-9 + A-Z, 0-9 + a-z, and 0-9, A-Z, + a-z. 2. Define a Custom Character Set. 3. Input length in either Decimal or Hexadecimal format. REVERSE ENGINEERING TIPS: INCREDIMAIL PASSWORD RECOVERY TOOL Incredimail Password Recovery Tool. Incredimail Password Recovery Tool can recover all of your Incredimail passwords from your email passwords, to your incredimail account. It is 100% free fornon-commercial use.
REVERSE ENGINEERING TIPS: JANUARY 2016 The Leading Reverse Engineering Blog. Learn The Tips and Tricks of The Trade. Discover New Tools and Master New Strategies. REVERSE ENGINEERING TIPS: THE EXAGGERATED PROMISES OF ClickLocker is marketed as a digital security solution that allows a content author to easily manage their digital rights by enabling them to regulate access to their ebook, video, or software product. While the ClickLocker website claims that "ClickLocker provides the industrial-strength security you deserve", this is a blatant exaggeration and misleading statement. REVERSE ENGINEERING TIPS: HASHING UTILITY EXTENDED 1.0 Hashing Utility Extended 1.0 is an extended version of Hashing Utility 2.0 which supports 77 types of character encoding sets and 14 types of hash encoding schemes. Supported hash algorithms: SHA1 SHA256 SHA384 SHA512 MD2 MD4 MD5 HAVAL(ALL) RIPEMD128 RIPEMD160 RIPEMD256 RIPEMD320 Supported String Encoding: REVERSE ENGINEERING TIPS: FEBRUARY 2015 ClickLocker is marketed as a digital security solution that allows a content author to easily manage their digital rights by enabling them to regulate access to their ebook, video, or software product. While the ClickLocker website claims that "ClickLocker provides the industrial-strength security you deserve", this is a blatant exaggeration and misleading statement. REVERSE ENGINEERING TIPS A Reverse Engineering blog dedicated to unraveling the mysteries of reverse engineering. Learn how to work on many different targets with a vast assortment of tools. SATURDAY, JULY 7, 2018 INLINE EMPTY BYTE FINDER INLINE EMPTY BYTE FINDER is a tool designed to help you find a location inside an executable or dll file to create an inline patch or code cave. It can check for specific section flags to meet the requirements for your inline. Inline finder searches for areas the meet the size that you specify, but also lists how many extra bytes are available at that offset.FEATURES:
* Drag and Drop Support * Command line Support * Define Empty Byte Value * Define needed Section Flags1.0 DOWNLOAD:
http://j.gs/BFPQ
1.3 UPDATE:
NEW FEATURES:
* Follow Offset or RVA in Hiew * Added Column Sorting1.3 DOWNLOAD:
http://j.gs/BHgK
Posted by Chester Fritzat 6:10 PM
No comments:
Email This
BlogThis!
Share
to Twitter
Share
to Facebook
Share
to Pinterest
Labels: code cave
,
DLL ,
exe ,
inline
,
inline patching
,
patch
,
reverse engineering
,
scanner
TUESDAY, SEPTEMBER 19, 2017 PE APPENDED DATA VIEWER 1.02 PE Appended Data Viewer is a tool designed to view and save the overlay of a PE file.FEATURES:
* x86 and x64 support * Save Data or Data Selection* Xor Decryption
* Begin and End Selection* Data Interpreter
NEW IN 1.02:
* Added Entropy Testing * Added Hashing/CRC-32 * Added Ability to Register Shell Extension * Added Hex Values to Data Interpreter * Added Select Range Form * Added Ability to Load Appended Data Using Virtual Size * Fixed Memory Leak on Drag and Drop of New FileDOWNLOADS:
V1.01:
http://j.gs/9gSI
V1.02:
http://j.gs/9gSF
Posted by Chester Fritzat 10:23 PM
No comments:
Email This
BlogThis!
Share
to Twitter
Share
to Facebook
Share
to Pinterest
Labels: appended data viewer,
DLL ,
Download
,
exe ,
Freeware
,
hex ,
overlay viewer
,
PE ,
reverse engineering
MONDAY, JULY 31, 2017JEXEPACK UNPACKER
JexePack Unpacker is a freeware utility that unpacks JexePack wrappedjava applications.
DOWNLOAD:
http://j.gs/9gSL
DOWNLOAD VERSION 2:
http://j.gs/AVqQ
Posted by Chester Fritzat 7:31 PM
5 comments:
Email This
BlogThis!
Share
to Twitter
Share
to Facebook
Share
to Pinterest
Labels: extractor
,
JexePack
,
JexePack Unpacker
,
JexePack unwrapper
,
unpacker
,
unwrapper
EXE4J UNPACKER
exe4j Unpacker is a freeware utility that unpacks exe4j wrapped javaapplications.
DOWNLOAD:
http://j.gs/9gSM
Please consider making a donation if used within a commercialenvironment.
Posted by Chester Fritzat 6:58 PM
2 comments:
Email This
BlogThis!
Share
to Twitter
Share
to Facebook
Share
to Pinterest
Labels: exe4j
,
exe4j Unpacker
,
exe4j unwrapper
,
unpacker
,
unwrapper
THURSDAY, JULY 13, 2017 LAUNCH4J UNPACKER: UPDATED 07/26/2017 Launch4J Unpacker is a free utility to extract the embedded jar archive from a Launch4J wrapped java program. 07/26/2017: Version 1.01 Released: * Added Support for Launch4j applications signed with sign4j.DOWNLOAD:
Version 1.01:
http://j.gs/9gSN
Version: 1.0:
http://j.gs/9gSO
Posted by Chester Fritzat 7:21 PM
No comments:
Email This
BlogThis!
Share
to Twitter
Share
to Facebook
Share
to Pinterest
Labels: Launch4j
,
Launch4j unpacker
,
launch4j unwrapper
,
unpacker
,
unwrapper
CLICKLOCKER UNPACKER/REMOVAL TOOL CLICKLOCKER UNPACKER is a free DRM removal utility which automatically extracts the original unprotected file from a Clicklocker protected application, ebook, image, or video.DOWNLOAD:
http://j.gs/9gSP
Posted by Chester Fritzat 12:45 AM
No comments:
Email This
BlogThis!
Share
to Twitter
Share
to Facebook
Share
to Pinterest
Labels: ClickLocker
,
DRM Removal
,
remover
,
Software
,
tool ,
unpacker
,
unwrapper
,
Utility
WEDNESDAY, JULY 12, 2017BASE64 TOOL
BASE64 TOOL is a simple freeware utility that allows you to base64 encode AnsiStrings, WideStrings, and hexadecimal values as well as decode them to their original format.FEATURES:
* Encode ASCII/AnsiStrings to Base64 * Encode Unicode/WideStrings to Base64 * Decode Base64 to Hex, Unicode, or Ansistring * Decode Base64 to a file * Download and Decode or Encode a URLDOWNLOAD:
https://mega.nz/#!4p9xwL7I!L_g8jCkrCXoFXeF_GodLfJlMbd5IJWja-vbiTBKZKOM Posted by Chester Fritzat 7:58 PM
No comments:
Email This
BlogThis!
Share
to Twitter
Share
to Facebook
Share
to Pinterest
Labels: base64
,
Freeware
,
Software
,
tool ,
Utility
Older Posts
Home
Subscribe to: Posts (Atom)SEARCH THIS BLOG
DONATIONS
If you find this blog helpful, please consider supporting my endeavors with a small contribution.SOFTWARE UTILITIES
Software Tools
FOLLOW BY EMAIL
CONTACT ME:
POPULAR POSTS
*
An Introduction To x64dbg Welcome to this short, introductory tutorial for using x64dbg by Mr. Exodia. The goal of this tutorial is to teach you ...*
Unpacking Jar2Exe 2.1: Extracting The Jar File At All 3 ProtectionLevels
Welcome to this extensive tutorial for unpacking Jar2Exe. Jar2Exe is a java executable wrapper which works by takin...*
Bypassing Protections: Exploiting Activation to Access Sensitive Data Welcome to part 2 of the Bypassing Protections series. In this part, we will be looking at an application which uses online activation tov...
*
Bypassing Protections: Reversing and Recreating a Protected DLL Hello and welcome to this new series called Bypassing Protections. Together, we will learn some new methods to bypass protections whichha...
*
Hashing Utility 2.0 With Unicode Support Hashing Utility v2.0 is a small utility coded in Delphi which gives the user the ability to calculate hashes and CRC val...*
Unpacking Launch4j 3.5: Extracting The Jar File Unpacking Launch4j 3.5: Extracting The Jar File: Welcome to this short tutorial for unpacking Launch4j. Launch4j is a Java executabl...*
Delphi Tips: Hashing a String With Delphi Encryption Compendium(DEC) Today, I wanted to use the Delphi Encryption Compendium(DEC) to hash a string. It is a little bit difficult to figure out how to use theco...
*
Gilisoft Password Recovery Tool Gilisoft Password Recovery Tool is a simple utility that allows you to recover the master password for 4 Gilisoft applications...*
Incredimail Password Recovery Tool Incredimail Password Recovery Tool can recover all of your Incredimail passwords from your email passwords, to your incredima...*
Random Serial Generator 1.0 Random Serial Generator 1.0 is a simple application that allows you to generate a random serial number for testing licen... Awesome Inc. theme. Powered by Blogger .Details
Copyright © 2024 ArchiveBay.com. All rights reserved. Terms of Use | Privacy Policy | DMCA | 2021 | Feedback | Advertising | RSS 2.0