搜索资源列表
FindOEP
- OEP是每个PE文件读取时的起始地址,该程序给出两种方法来读取OEP,一种是直接从PE文件读取;另一种是将PE映射到内存中来读取。-OEP each PE file read at the opening address, the program gives two ways to read OEP. A PE is directly from the document read. Another is to PE Maps memory to read.
MyShell
- 加壳软件,自己练习用的!功能有使用次数和时间限制!没有进行区段合并!对OEP进行了加密处理!
OEP
- 基于visual c++的 可以获取pe文件的oep,即每个exe或dll文件加载的起始地址。
scbwsrc
- 冲击波2000 源码 D.boy 感谢D.boy无私奉献源码!极酷的查找OEP工具。 -source D.boy thank D.boy selfless dedication source! Very cool OEP search tools.
UPXupack
- UPXupack 程序执行文件pe头检测,判断upx特征码,由此在(oep)程序入口点,savedump-UPXupack pe first test program execution files, judge upx signature, resulting in the (oep) program entry point, savedump
OEP
- 读取PE文件OEP值,带源码,VC++编写-Read the Address Entry Point of PE File
ACprotect1.22D
- UltraProtect 1.x/ACprotect 1.22 OEP Finder(Default mode,not for Delphi) Author: loveboom Email : bmd2chen@tom.com OS : Win2kADV sp2,OllyDbg 1.1b,Ollyscr ipt v0.62 Date : 2004-3-28 Config: Hide ollydbg(IsDebuggerPresent),Exceptions:unch
packedabc
- 又是一个自娱自乐的产物,和netsowell发布过源码的那个不一样,这个壳90%的代码是用delphi写成的。 仅在win2k+sp4上测试过,不支持9x系统。因为用了一个可能不安全的隐藏oep的方法,xp系统上有可能会出问题。 没花,没anti代码,适合初学者了解壳。-Entertain themselves is also a product of, and netsowell release that do not have the same source, 90 of this
IMProtect
- IMProtect 嵌入源码编译保护壳开源 嵌入到源码中编译的保护壳,先于OEP执行,主要是保护输入表和一些反调试反注入手段。-IMProtect embedded protective shell open source compiler to compile source code embedded into the protective shell, first performed at the OEP, mainly to protect the input table and in
Project5
- PE(Exe)文件伪装入口点(OEP),伪装成VC++的入口点,欺骗PId的检测。实际无任何意义:)-PE (Exe) file disguised entry point (OEP), disguised as a VC++ entry points PId deception detection. Without any real sense :)