<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-6699219850474086254</id><updated>2025-12-27T18:49:53.334-08:00</updated><category term="Cryptography"/><category term="Tutorials"/><category term="Hints n Tips"/><category term="UnPackers"/><category term="Packers"/><category term="PE Tools"/><category term="Debuggers"/><category term="OllyDBG Plugins/Scripts"/><category term="Resource Editors"/><category term="Decompilers"/><category term="Paid Tools"/><title type='text'>Reverse Engineering Blog</title><subtitle type='html'>This blog is only for educational purpose.</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://reversingtools.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://reversingtools.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Desi Master</name><uri>http://www.blogger.com/profile/04598065953640802276</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>130</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-6699219850474086254.post-2274519893253026554</id><published>2012-02-11T01:40:00.000-08:00</published><updated>2012-02-11T01:40:22.708-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Decompilers"/><title type='text'>VB Decompiler Pro v8.3 RETAIL INCL_KEYGEN+PATCH-FFF</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
What&#39;s new in this version:&lt;br /&gt;- Calling VTable properties and methods from some form to any other&lt;br /&gt;&amp;nbsp; form now can be decompiled. For example if you change in Form1&lt;br /&gt;&amp;nbsp; property of object in Form2 - it can be correctly decompiled (Native Code)&lt;br /&gt;- Parameters of object method/property is now typicle. If object&lt;br /&gt;&amp;nbsp; have parameters as boolean or single - it will be decompiled correctly:&lt;br /&gt;&amp;nbsp; single as float variable, boolean as True/False) (Native Code)&lt;br /&gt;- Decompile declaration of all types of array. Multifield arrays and&lt;br /&gt;&amp;nbsp; arrays of object (array of Form or commandButton for example) also&lt;br /&gt;&amp;nbsp; supported (Native Code)&lt;br /&gt;- Decompile __vbaVar2Vec, __vbaAryMove msvbvm functions&lt;br /&gt;- Italian language translation&lt;br /&gt;- Parsing control array index in events&lt;br /&gt;- Parsing function return value (P-Code)&lt;br /&gt;- Help files (English and Russian) is updated. New topics writen:&lt;br /&gt;&amp;nbsp; Opening file, Working with database, Saving the list of procedures,&lt;br /&gt;&amp;nbsp; Jump to address, The main window, Viewing of code, Decompilation from offset,&lt;br /&gt;&amp;nbsp; Language selection, Plugins&lt;br /&gt;- Language files changed&lt;br /&gt;- BugFix: Correctly calculate count of parameters in public sub&#39;s&lt;br /&gt;- BugFix: Procedure analyzer and optimazer now correctly process second parameter in For command&lt;br /&gt;- BugFix: Correctly process some types of VarType integer and long (Native Code)&lt;br /&gt;- BugFix: Correctly detect end of some non-standard procedures in source mode (Native Code)&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Download: &lt;a href=&quot;http://adf.ly/5OqRh&quot;&gt;Multiupload&lt;/a&gt; - &lt;a href=&quot;http://adf.ly/5OqrV&quot;&gt;Depositfiles&lt;/a&gt; - &lt;a href=&quot;http://adf.ly/5Oqtq&quot;&gt;WUpload&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;http://feeds.feedburner.com/ReverseEngineeringBlog&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://reversingtools.blogspot.com/feeds/2274519893253026554/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://reversingtools.blogspot.com/2012/02/vb-decompiler-pro-v83-retail.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/2274519893253026554'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/2274519893253026554'/><link rel='alternate' type='text/html' href='http://reversingtools.blogspot.com/2012/02/vb-decompiler-pro-v83-retail.html' title='VB Decompiler Pro v8.3 RETAIL INCL_KEYGEN+PATCH-FFF'/><author><name>Desi Master</name><uri>http://www.blogger.com/profile/04598065953640802276</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6699219850474086254.post-5186508294947238319</id><published>2011-03-19T18:22:00.000-07:00</published><updated>2011-03-19T18:22:24.684-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Packers"/><title type='text'>VMProtect Ultimate v2.06 Incl. key</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGgQY3T1jNSm1-qx-R_v08SxiZ63XCyGufvFiYW2094jxCHlKIwolO-cq0DBexU3xVFsDKFItb_8029tnv7AWQciGtiZvIEI9mzeRJdEZz5v5UYgzTYMpQjf7b7z2i4Tyo9A0v1Cj5kMg/s1600/Clipboard01222.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;305&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGgQY3T1jNSm1-qx-R_v08SxiZ63XCyGufvFiYW2094jxCHlKIwolO-cq0DBexU3xVFsDKFItb_8029tnv7AWQciGtiZvIEI9mzeRJdEZz5v5UYgzTYMpQjf7b7z2i4Tyo9A0v1Cj5kMg/s400/Clipboard01222.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;VMProtect is to protect next-generation software. Protected parts of  code are executed on a virtual machine, which greatly complicates the  analysis and breaking the protected program. Built-in disassembler and a  MAP file will allow you to quickly select the necessary parts of code  to protect against hacking.&lt;br /&gt;
&lt;br /&gt;
Ultimate can provide maximum protection for your application. Supports  work with serial numbers, black list, virtualization and mutation of the  code, protection against debugging and more.&lt;br /&gt;
&lt;br /&gt;
VMProtect helps protect the software from analysis and cracking. The  basis of protection is the execution of program code sections in a  virtual machine. Architecture of virtual machines is radically different  from conventional processors, which renders meaningless most of the  tools used by hackers.&lt;br /&gt;
&lt;br /&gt;
VMProtect is a comprehensive solution for protecting software. In  addition to the immediate protection package, VMProtect allows you to  generate and check serial numbers, limiting their duration, to limit the  period of free updates and much more.&lt;br /&gt;
&lt;br /&gt;
Why VMProtect?&lt;br /&gt;
Here are five reasons to choose VMProtect to protect your software:&lt;br /&gt;
Virtualization package - is the next step in the field of software  protection from analysis. Most security systems encrypt the executable  code and decode it when you start the program. VMProtect never  deciphered the code. In the process of protecting VMProtect translates  program code into code that runs on a virtual processor. A set of  commands that the processor does not like the command processor x86 or  x64, and changes with each protection program.&lt;br /&gt;
Support all file formats - VMProtect allows you to protect executable  files (EXE, SCR), dynamic library (DLL, OCX, BPL) and driver (SYS).&lt;br /&gt;
64-bit platforms - VMProtect can protect both 32-bit and 64-bit executable files, libraries and drivers.&lt;br /&gt;
Support line Windows - protected files VMProtect, can run on all versions of Windows, from Windows 95.&lt;br /&gt;
&lt;br /&gt;
It supports 32 and 64-bit operating systems, there is a problem with DEP and UAC.&lt;br /&gt;
Integrated solution for protection - VMProtect allows you to generate  and check serial numbers. Rooms can be generated either manually or  automatically (Web-generators). Serial numbers may be limited by the  time of action, may limit the period of free updates that can be  attached to the equipment. Also VMProtect can make physically impossible  to execute code in the absence of serial numbers.&lt;br /&gt;
&lt;br /&gt;
Support for Compilers: Delphi, Borland C Builder, Visual C / C + +, Visual Basic (native), Virtual Pascal&lt;br /&gt;
&lt;br /&gt;
Supported Formats (x32 and x64): EXE, DLL, BPL, OCX, SYS&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;a href=&quot;http://www.mirrorcreator.com/files/L6FEA4JT/VMProtect_v2.06_Ultimate.rar_links&quot;&gt;&lt;b&gt;Download Now&lt;/b&gt;&lt;/a&gt; &lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;http://feeds.feedburner.com/ReverseEngineeringBlog&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://reversingtools.blogspot.com/feeds/5186508294947238319/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://reversingtools.blogspot.com/2011/03/vmprotect-ultimate-v206-incl-key.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/5186508294947238319'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/5186508294947238319'/><link rel='alternate' type='text/html' href='http://reversingtools.blogspot.com/2011/03/vmprotect-ultimate-v206-incl-key.html' title='VMProtect Ultimate v2.06 Incl. key'/><author><name>Desi Master</name><uri>http://www.blogger.com/profile/04598065953640802276</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGgQY3T1jNSm1-qx-R_v08SxiZ63XCyGufvFiYW2094jxCHlKIwolO-cq0DBexU3xVFsDKFItb_8029tnv7AWQciGtiZvIEI9mzeRJdEZz5v5UYgzTYMpQjf7b7z2i4Tyo9A0v1Cj5kMg/s72-c/Clipboard01222.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6699219850474086254.post-3205308554152018353</id><published>2010-11-29T12:21:00.000-08:00</published><updated>2010-11-29T12:21:13.434-08:00</updated><title type='text'>VMProtect Ultimate 2.06 Retail Incl. Key</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://vmpsoft.com/wp-content/uploads/2010/09/simple1.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;315&quot; src=&quot;http://vmpsoft.com/wp-content/uploads/2010/09/simple1.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
We’ve just released version 2.06 of VMProtect. The most important feature is the merging license manager into the main VMProtect executable. The detailed list of changes follows:&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;color: red;&quot;&gt;&lt;b&gt;New features&lt;/b&gt;&lt;/div&gt;&lt;br /&gt;
Added support of MinGW map files&lt;br /&gt;
Added support of JCLDEBUG library&lt;br /&gt;
Scripts: new method Clear in TPEDirectory&lt;br /&gt;
Scripts: new properties InputSize and OutputSize in TVMProcedure&lt;br /&gt;
Ultimate: Two new API functions in SDK: VMProtectBeginVirtualizationLockByKey and VMProtectBeginUltraLockByKey&lt;br /&gt;
&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div style=&quot;color: red;&quot;&gt;&lt;b&gt;Improvements&lt;/b&gt;&lt;/div&gt;&lt;br /&gt;
VMP files are now in XML format&lt;br /&gt;
Scripts are stored in VMP files as well, VMS are not used anymore&lt;br /&gt;
Ultimate: License Manager is moved to VMProtect interface&lt;br /&gt;
Ultimate: the speed of code locked to serial number is significantly improved&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;color: red;&quot;&gt;&lt;b&gt;Bugfixes&lt;/b&gt;&lt;/div&gt;&lt;br /&gt;
Fixed marked detection in MinGW files&lt;br /&gt;
Fixed import protection bug in 64-bit files&lt;br /&gt;
Fixed virtualization of FILD WORD PTR [XXXX] instruction&lt;br /&gt;
Fixed the incorrect disassembling of PSRLW instruction&lt;br /&gt;
Fixed DLL Box errors with some antivirus applications&lt;br /&gt;
&lt;br /&gt;
&lt;b style=&quot;color: blue;&quot;&gt;Download:&lt;/b&gt;&amp;nbsp; http://www.megaupload.com/?d=UXEWNT7K&lt;div class=&quot;blogger-post-footer&quot;&gt;http://feeds.feedburner.com/ReverseEngineeringBlog&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://reversingtools.blogspot.com/feeds/3205308554152018353/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://reversingtools.blogspot.com/2010/11/vmprotect-ultimate-206-retail-incl-key.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/3205308554152018353'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/3205308554152018353'/><link rel='alternate' type='text/html' href='http://reversingtools.blogspot.com/2010/11/vmprotect-ultimate-206-retail-incl-key.html' title='VMProtect Ultimate 2.06 Retail Incl. Key'/><author><name>Desi Master</name><uri>http://www.blogger.com/profile/04598065953640802276</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6699219850474086254.post-6399582015561831965</id><published>2010-08-20T10:48:00.000-07:00</published><updated>2010-09-02T23:17:10.794-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Paid Tools"/><title type='text'>Mind Crypter v1.0 - by SpiderZ  ~100% FUD Protection Solution~</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBraFJXzk7xGm-xUNhUBpg52SaUZlyq1tghyphenhyphenmOQ907tVj5p14-hw1qhhODO1L6glC37DfgVsafclK-g5JdNopc2YdqTAK9vkMzUV1xWc2JAWH6tfGyb_pSOd1GkY7hQZWiaPB3zPOoM6E/s1600/Clipboard01.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;640&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBraFJXzk7xGm-xUNhUBpg52SaUZlyq1tghyphenhyphenmOQ907tVj5p14-hw1qhhODO1L6glC37DfgVsafclK-g5JdNopc2YdqTAK9vkMzUV1xWc2JAWH6tfGyb_pSOd1GkY7hQZWiaPB3zPOoM6E/s640/Clipboard01.png&quot; width=&quot;392&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;~ 100% FUD Protection Solution Provider ~&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;color: red; text-align: center;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Features:&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;Clone File, Bind with File, Icon Changing (plus many common icons also included)&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;
All &lt;b&gt;AV&#39;s&lt;/b&gt; BYPASS ON &lt;b&gt;RUNTIME&lt;/b&gt; + &lt;b&gt;SCANTIME&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;Custom active process injection, Increase file size by Add extra bytes(mb)&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;In this version we used two best encryptions (&lt;b&gt;RC4&lt;/b&gt;, &lt;b&gt;TripleDES&lt;/b&gt;)&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;color: blue; text-align: center;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Stub Details:&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;First stub = &lt;b&gt;Free&lt;/b&gt; (incl. with crypter)&lt;br /&gt;
Every time when you need stub update it will cost you &lt;b&gt;10$&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b style=&quot;color: #b45f06;&quot;&gt;Note:&lt;/b&gt; 1month stub protection&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;color: #274e13; text-align: center;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;PRICE:&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;Crypter = &lt;span style=&quot;color: #073763;&quot;&gt;40$&lt;/span&gt; (Incl. 1st stub)&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;Stub = 10$ (Every time you need)&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;color: #741b47; text-align: center;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;Payment Options:&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;At this time we only accept &lt;span style=&quot;color: red;&quot;&gt;Moneybookers&lt;/span&gt;, &lt;span style=&quot;color: red;&quot;&gt;Western Union &lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: magenta;&quot;&gt;Discount of &lt;span style=&quot;color: blue; font-size: large;&quot;&gt;20$&lt;/span&gt; If you pay through &lt;span style=&quot;color: red;&quot;&gt;Moneybookers&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div style=&quot;color: red;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;&lt;blink&gt;INSTANT DOWNLOAD - NO WAITING!&lt;/blink&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;a href=&quot;https://www.click2sell.eu/buy?spiderzmin&quot; id=&quot;c2s_bn_lnk_14781&quot;&gt;&lt;img alt=&quot;Buy now!&quot; border=&quot;0&quot; src=&quot;http://www.moneybookers.com/images/logos/additional_logos/orange_pay_by.gif&quot; title=&quot;Buy now!&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;script src=&quot;http://www.click2sell.eu/js/buy_now_butt_v2.js&quot; type=&quot;text/javascript&quot;&gt;
&lt;/script&gt;&lt;br /&gt;
&lt;script type=&quot;text/javascript&quot;&gt;
c2s_bn_initializeBuyNowLink(&#39;www.click2sell.eu&#39;, &#39;14781&#39;);
&lt;/script&gt;&lt;br /&gt;
&lt;b&gt;Through bank payment?&lt;/b&gt; Contact me on:&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;/div&gt;&lt;script src=&quot;http://download.skype.com/share/skypebuttons/js/skypeCheck.js&quot; type=&quot;text/javascript&quot;&gt;
&lt;/script&gt;&lt;br /&gt;
&lt;a href=&quot;skype:spiderz-?call&quot;&gt;&lt;img alt=&quot;My status&quot; height=&quot;44&quot; src=&quot;http://mystatus.skype.com/bigclassic/spiderz-&quot; style=&quot;border: none;&quot; width=&quot;182&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;http://feeds.feedburner.com/ReverseEngineeringBlog&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://reversingtools.blogspot.com/feeds/6399582015561831965/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://reversingtools.blogspot.com/2010/08/mind-crypter-v10-by-spiderz-100-fud.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/6399582015561831965'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/6399582015561831965'/><link rel='alternate' type='text/html' href='http://reversingtools.blogspot.com/2010/08/mind-crypter-v10-by-spiderz-100-fud.html' title='Mind Crypter v1.0 - by SpiderZ  ~100% FUD Protection Solution~'/><author><name>Desi Master</name><uri>http://www.blogger.com/profile/04598065953640802276</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBraFJXzk7xGm-xUNhUBpg52SaUZlyq1tghyphenhyphenmOQ907tVj5p14-hw1qhhODO1L6glC37DfgVsafclK-g5JdNopc2YdqTAK9vkMzUV1xWc2JAWH6tfGyb_pSOd1GkY7hQZWiaPB3zPOoM6E/s72-c/Clipboard01.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6699219850474086254.post-5412831113558754500</id><published>2010-08-13T20:05:00.000-07:00</published><updated>2010-08-19T22:55:39.079-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Packers"/><title type='text'>VMProtect Ultimate v2.04.6 Retail</title><content type='html'>VMProtect is to protect next-generation software. Protected parts of code are executed on a virtual machine, which greatly complicates the analysis and breaking the protected program. Built-in disassembler and a MAP file will allow you to quickly select the necessary parts of code to protect against hacking.&lt;br /&gt;
&lt;br /&gt;
Ultimate can provide maximum protection for your application. Supports work with serial numbers, black list, virtualization and mutation of the code, protection against debugging and more.&lt;br /&gt;
&lt;br /&gt;
VMProtect helps protect the software from analysis and cracking. The basis of protection is the execution of program code sections in a virtual machine. Architecture of virtual machines is radically different from conventional processors, which renders meaningless most of the tools used by hackers.&lt;br /&gt;
&lt;br /&gt;
VMProtect is a comprehensive solution for protecting software. In addition to the immediate protection package, VMProtect allows you to generate and check serial numbers, limiting their duration, to limit the period of free updates and much more.&lt;br /&gt;
&lt;br /&gt;
Why VMProtect?&lt;br /&gt;
Here are five reasons to choose VMProtect to protect your software:&lt;br /&gt;
Virtualization package - is the next step in the field of software protection from analysis. Most security systems encrypt the executable code and decode it when you start the program. VMProtect never deciphered the code. In the process of protecting VMProtect translates program code into code that runs on a virtual processor. A set of commands that the processor does not like the command processor x86 or x64, and changes with each protection program.&lt;br /&gt;
Support all file formats - VMProtect allows you to protect executable files (EXE, SCR), dynamic library (DLL, OCX, BPL) and driver (SYS).&lt;br /&gt;
64-bit platforms - VMProtect can protect both 32-bit and 64-bit executable files, libraries and drivers.&lt;br /&gt;
Support line Windows - protected files VMProtect, can run on all versions of Windows, from Windows 95.&lt;br /&gt;
&lt;br /&gt;
It supports 32 and 64-bit operating systems, there is a problem with DEP and UAC.&lt;br /&gt;
Integrated solution for protection - VMProtect allows you to generate and check serial numbers. Rooms can be generated either manually or automatically (Web-generators). Serial numbers may be limited by the time of action, may limit the period of free updates that can be attached to the equipment. Also VMProtect can make physically impossible to execute code in the absence of serial numbers.&lt;br /&gt;
&lt;br /&gt;
Support for Compilers: Delphi, Borland C Builder, Visual C / C + +, Visual Basic (native), Virtual Pascal&lt;br /&gt;
&lt;br /&gt;
Supported Formats (x32 and x64): EXE, DLL, BPL, OCX, SYS&lt;br /&gt;
&lt;br /&gt;
&lt;b style=&quot;color: red;&quot;&gt;Download now:&lt;/b&gt; http://www.megaupload.com/?d=RDDZGNU0&lt;div class=&quot;blogger-post-footer&quot;&gt;http://feeds.feedburner.com/ReverseEngineeringBlog&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://reversingtools.blogspot.com/feeds/5412831113558754500/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://reversingtools.blogspot.com/2010/08/vmprotect-ultimate-v2046-retail.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/5412831113558754500'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/5412831113558754500'/><link rel='alternate' type='text/html' href='http://reversingtools.blogspot.com/2010/08/vmprotect-ultimate-v2046-retail.html' title='VMProtect Ultimate v2.04.6 Retail'/><author><name>Desi Master</name><uri>http://www.blogger.com/profile/04598065953640802276</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6699219850474086254.post-2600236850687229430</id><published>2010-07-30T05:14:00.000-07:00</published><updated>2011-03-19T17:49:22.751-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Decompilers"/><title type='text'>VB Decompiler Pro v7.9 Incl.Keygen</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;VB Decompiler - Decompiler is the program (EXE, DLL, OCX), written in  Visual Basic 5.0 and 6.0 and disassembler programs written in any  language. NET technology. As you know, programs developed in Visual  Basic, can be compiled or interpreted p-code, or executable native code.  Since p-code represents a high-level team, then there is a real  opportunity to recover from this source code (although the names of  variables and some functions will not be able to recover). VB Decompiler  restores the source code from the pseudocode as close as possible to  the original, so it is with some work really bring to the compiled. VB  Decompiler also decompiled all forms and UserControl&#39;y located in the  file. In general, VB Decompiler - is an ideal tool for analyzing  programs and is ideal in case of loss of source codes and the need to  partially restore the project.&lt;br /&gt;
&lt;br /&gt;
VB Decompiler is decompiler for programs (EXE, DLL or OCX) written in  Visual Basic 5.0 and 6.0 and disassembler for programs written on. NET  technology. As you know, programs in Visual Basic can be compiled into  interpreted p-code or into native code. . NET assembly always compiled  to just in time compilable IL code. Since p-code consists of high-level  commands, there is a real possibility to decompile it into the source  code (of course, the names of variables and some functions will not be  decompiled). VB Decompiler restores source code from p-code as much as  possible precisely. And after some modifications you may try to compile  generated code.&lt;br /&gt;
&lt;br /&gt;
If a program was compiled into the native code, restoring full source  code from machine instructions is not possible. But VB decompiler can  help to analyze the program even in this situation as well. It contains a  powerful disassembler and emulator. This powerfull engine try to decode  most assembler instructions to most likely VB commands. Of course, it  fails on some optimizations of assembler code and sometimes generate not  correct instructions. But at this time this is a best way to analyze  native code applications.&lt;br /&gt;
&lt;br /&gt;
Features:&lt;br /&gt;
Universal unpacking for packed applications (supported UPX, NSPack and  more other popular EXE packers)&lt;br /&gt;
Decompiling forms (frm and frx) and usercontrols (ctl) object files&lt;br /&gt;
Fully p-code decompiling (with parsing opcodes to standart vb  instructions, with decompile GUID objects)&lt;br /&gt;
&quot;2 p-code decompiling modes (with stack parsing or without stack  parsing)&lt;br /&gt;
Disassembling native code procedures&lt;br /&gt;
Disassembling native code procedures with String References and API  Calls&lt;br /&gt;
Partially decompiling native code (using code emulation engine)&lt;br /&gt;
Syntax coloring in decompiled code&lt;br /&gt;
String reference list and search engine&lt;br /&gt;
Fast decompiling speed&lt;br /&gt;
Obfuscator for VB5 / 6 programs&lt;br /&gt;
Patcher for VB5 / 6 programs&lt;br /&gt;
Save decompiled data to single DB file&lt;br /&gt;
Disassembling. NET programs&lt;br /&gt;
Save procedures list to MAP file, IDC script or to HIEW Names file&lt;br /&gt;
&lt;br /&gt;
Features:&lt;br /&gt;
&quot;Universal unpacking packed applications (UPX, NSPack and many other  famous EXE packers)&lt;br /&gt;
&quot;Decompilation forms (frm and frx) and usercontrol&#39;ov (ctl)&lt;br /&gt;
Full decompile p-code into the source-like code (including decompile  GUID objects)&lt;br /&gt;
&quot;3 mode decompilation p-code (in the processing stack, without  processing and function of the analyzer procedures followed by the  simplification and improvement of its code readability)&lt;br /&gt;
&quot;Disassembling native code (using powerful Pentium Pro disassembler)&lt;br /&gt;
&quot;Syntax Highlighting in the decompiled code&lt;br /&gt;
&quot;Partial decompile Native Code&#39;ovyh structures&lt;br /&gt;
&quot;Indexing the rows found in the decompiled code and features quick  search strings&lt;br /&gt;
&quot;High-speed decompiling&lt;br /&gt;
Obfuscator for VB5 / 6 programs&lt;br /&gt;
&quot;Possibility of a patch for VB5 / 6 programs&lt;br /&gt;
&quot;Saving the decompiled result in database&lt;br /&gt;
&quot;Disassembling. NET code&lt;br /&gt;
&quot;Saving the procedure name in the MAP file, IDC script or file HIEW  Names&lt;br /&gt;
&lt;br /&gt;
OS: Windows 95/98/ME/2k/XP/2003/Vista/2008&lt;br /&gt;
Interface: English&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;a href=&quot;http://www.mirrorcreator.com/files/0HA5THN3/VB_Decompiler_Pro_v7.9.rar_links&quot;&gt;&lt;b&gt;Download Now&lt;/b&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;http://feeds.feedburner.com/ReverseEngineeringBlog&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://reversingtools.blogspot.com/feeds/2600236850687229430/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://reversingtools.blogspot.com/2010/07/vb-decompiler-pro-v79-inclkeygen.html#comment-form' title='5 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/2600236850687229430'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/2600236850687229430'/><link rel='alternate' type='text/html' href='http://reversingtools.blogspot.com/2010/07/vb-decompiler-pro-v79-inclkeygen.html' title='VB Decompiler Pro v7.9 Incl.Keygen'/><author><name>Desi Master</name><uri>http://www.blogger.com/profile/04598065953640802276</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>5</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6699219850474086254.post-9155875864691545130</id><published>2010-02-07T00:56:00.000-08:00</published><updated>2010-02-07T00:56:39.771-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="OllyDBG Plugins/Scripts"/><title type='text'>AnalyzeThis+ 0.24</title><content type='html'>I made some improvements to AnalyzeThis mainly to analyze a memory  section which originally reports &quot;this section is not associated with  any module&quot;.&lt;br /&gt;
....&lt;br /&gt;
Sometimes (especially when dealing with  packers) you may need to run OllyDbg&#39;s code analysis function, only to  find it&#39;s not available to you because the EIP is currently outside the  code segment as defined by the PE header. AnalyzeThis! is an OllyDbg  plugin to allow OllyDbg&#39;s analysis function to operate outside of the  marked code segment, by telling OllyDbg the current segment *is* the  code segment. &lt;br /&gt;
&lt;br /&gt;
Caveats: OllyDbg can only store one analysis  table, so if you analyze a new segment, it will remove any existing  analysis that has been done.&lt;br /&gt;
&lt;br /&gt;
Source code has not been included;  not because I don&#39;t want to release it at this time, but because I can&#39;t  find it offhand. If you really need it, email me and I&#39;ll look harder  for it.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Download&lt;/b&gt;: http://www.megaupload.com/?d=6WFPOMED&lt;div class=&quot;blogger-post-footer&quot;&gt;http://feeds.feedburner.com/ReverseEngineeringBlog&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://reversingtools.blogspot.com/feeds/9155875864691545130/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://reversingtools.blogspot.com/2010/02/analyzethis-024.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/9155875864691545130'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/9155875864691545130'/><link rel='alternate' type='text/html' href='http://reversingtools.blogspot.com/2010/02/analyzethis-024.html' title='AnalyzeThis+ 0.24'/><author><name>Desi Master</name><uri>http://www.blogger.com/profile/04598065953640802276</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6699219850474086254.post-4137946867345370768</id><published>2010-02-07T00:53:00.000-08:00</published><updated>2010-02-07T00:53:19.118-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="OllyDBG Plugins/Scripts"/><title type='text'>StrongOD 0.2.9.561</title><content type='html'>This will be a seperate download of StrongOD as of version 0.2.4.350  because - as strange as it sounds - the developer has protected it!&lt;br /&gt;
&lt;br /&gt;
This  plugin will now require a key for it to run and be used. You can obtain  a valid key by emailing:   StrongOD©safengine.com&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Download&lt;/b&gt;: http://www.megaupload.com/?d=XWGTG9BB&lt;div class=&quot;blogger-post-footer&quot;&gt;http://feeds.feedburner.com/ReverseEngineeringBlog&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://reversingtools.blogspot.com/feeds/4137946867345370768/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://reversingtools.blogspot.com/2010/02/strongod-029561.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/4137946867345370768'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/4137946867345370768'/><link rel='alternate' type='text/html' href='http://reversingtools.blogspot.com/2010/02/strongod-029561.html' title='StrongOD 0.2.9.561'/><author><name>Desi Master</name><uri>http://www.blogger.com/profile/04598065953640802276</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6699219850474086254.post-148757138673896470</id><published>2010-02-07T00:48:00.000-08:00</published><updated>2010-02-07T00:48:30.950-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tutorials"/><title type='text'>VMProtect 1.7 - 2.0 (Unpacking) by LCF-AT</title><content type='html'>As I promised here comes the next movie tutorial and a updated script  which now also supports VMProtect 2.0. As always you can see in the  movie how to use it correctly. My unpack target which I have selected  was the VMProtect 2.0 Ultimate itself [Demo] version. I also declare you  how to rebuild the OEP in this target. Moreover you will see a second  show movie about the VMProtect 2.0.1.2 itself which I also unpacked.  This version has some more features than the Ultimate version.&lt;br /&gt;
&lt;br /&gt;
So  I fixed also some small bugs in the script and added some more  functions. So read all messages which you get with attention before you  press a button. For VMP 1.8 - 2.0 you can choose the API TRACER to get  all needed addresses, dwords,api´s, module infos into a new file. The  trace process can take a longer time if you work with a low system so  for this problem I have added the possibility that you can always cancel  the current process. Just stop the script if you want... if you then  restart Olly and the script then it will work further from the last  stop.&lt;br /&gt;
&lt;br /&gt;
Some words to the &quot;PE Header Fixing&quot;. This you will need  for example for the VMProtect 2.0.1.2 itself so till now it was the only  target which I have found which used this protection but I added the  fix function also now in the new script. Just use it if you need it.It  can also prevent some &quot;File corrupted!....&quot; messages. If you get still  this message after fixing the PE then your target can also use some CRC  checks.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Download:&lt;/b&gt; http://www.megaupload.com/?d=XBQYAZF6&lt;div class=&quot;blogger-post-footer&quot;&gt;http://feeds.feedburner.com/ReverseEngineeringBlog&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://reversingtools.blogspot.com/feeds/148757138673896470/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://reversingtools.blogspot.com/2010/02/vmprotect-17-20-unpacking-by-lcf-at.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/148757138673896470'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/148757138673896470'/><link rel='alternate' type='text/html' href='http://reversingtools.blogspot.com/2010/02/vmprotect-17-20-unpacking-by-lcf-at.html' title='VMProtect 1.7 - 2.0 (Unpacking) by LCF-AT'/><author><name>Desi Master</name><uri>http://www.blogger.com/profile/04598065953640802276</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6699219850474086254.post-8047225174587249698</id><published>2010-01-12T12:21:00.000-08:00</published><updated>2010-01-12T12:21:10.188-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Decompilers"/><title type='text'>VB Decompiler Pro v7.7 Retail - Incl. FFF-KEYGEN</title><content type='html'>VB Decompiler - Decompiler is the program (EXE, DLL, OCX), written in Visual Basic 5.0 and 6.0 and disassembler programs written in any language. NET technology. As you know, programs developed in Visual Basic, can be compiled or interpreted p-code, or executable native code. Since p-code represents a high-level team, then there is a real opportunity to recover from this source code (although the names of variables and some functions will not be able to recover). VB Decompiler restores the source code from the pseudocode as close as possible to the original, so it is with some work really bring to the compiled. VB Decompiler also decompiled all forms and UserControl&#39;y located in the file. In general, VB Decompiler - is an ideal tool for analyzing programs and is ideal in case of loss of source codes and the need to partially restore the project.&lt;br /&gt;
&lt;br /&gt;
VB Decompiler is decompiler for programs (EXE, DLL or OCX) written in Visual Basic 5.0 and 6.0 and disassembler for programs written on. NET technology. As you know, programs in Visual Basic can be compiled into interpreted p-code or into native code. . NET assembly always compiled to just in time compilable IL code. Since p-code consists of high-level commands, there is a real possibility to decompile it into the source code (of course, the names of variables and some functions will not be decompiled). VB Decompiler restores source code from p-code as much as possible precisely. And after some modifications you may try to compile generated code.&lt;br /&gt;
&lt;br /&gt;
If a program was compiled into the native code, restoring full source code from machine instructions is not possible. But VB decompiler can help to analyze the program even in this situation as well. It contains a powerful disassembler and emulator. This powerfull engine try to decode most assembler instructions to most likely VB commands. Of course, it fails on some optimizations of assembler code and sometimes generate not correct instructions. But at this time this is a best way to analyze native code applications.&lt;br /&gt;
&lt;br /&gt;
Features:&lt;br /&gt;
Universal unpacking for packed applications (supported UPX, NSPack and more other popular EXE packers)&lt;br /&gt;
Decompiling forms (frm and frx) and usercontrols (ctl) object files&lt;br /&gt;
Fully p-code decompiling (with parsing opcodes to standart vb instructions, with decompile GUID objects)&lt;br /&gt;
&quot;2 p-code decompiling modes (with stack parsing or without stack parsing)&lt;br /&gt;
Disassembling native code procedures&lt;br /&gt;
Disassembling native code procedures with String References and API Calls&lt;br /&gt;
Partially decompiling native code (using code emulation engine)&lt;br /&gt;
Syntax coloring in decompiled code&lt;br /&gt;
String reference list and search engine&lt;br /&gt;
Fast decompiling speed&lt;br /&gt;
Obfuscator for VB5 / 6 programs&lt;br /&gt;
Patcher for VB5 / 6 programs&lt;br /&gt;
Save decompiled data to single DB file&lt;br /&gt;
Disassembling. NET programs&lt;br /&gt;
Save procedures list to MAP file, IDC script or to HIEW Names file&lt;br /&gt;
&lt;br /&gt;
Features:&lt;br /&gt;
&quot;Universal unpacking packed applications (UPX, NSPack and many other famous EXE packers)&lt;br /&gt;
&quot;Decompilation forms (frm and frx) and usercontrol&#39;ov (ctl)&lt;br /&gt;
Full decompile p-code into the source-like code (including decompile GUID objects)&lt;br /&gt;
&quot;3 mode decompilation p-code (in the processing stack, without processing and function of the analyzer procedures followed by the simplification and improvement of its code readability)&lt;br /&gt;
&quot;Disassembling native code (using powerful Pentium Pro disassembler)&lt;br /&gt;
&quot;Syntax Highlighting in the decompiled code&lt;br /&gt;
&quot;Partial decompile Native Code&#39;ovyh structures&lt;br /&gt;
&quot;Indexing the rows found in the decompiled code and features quick search strings&lt;br /&gt;
&quot;High-speed decompiling&lt;br /&gt;
Obfuscator for VB5 / 6 programs&lt;br /&gt;
&quot;Possibility of a patch for VB5 / 6 programs&lt;br /&gt;
&quot;Saving the decompiled result in database&lt;br /&gt;
&quot;Disassembling. NET code&lt;br /&gt;
&quot;Saving the procedure name in the MAP file, IDC script or file HIEW Names&lt;br /&gt;
&lt;br /&gt;
OS: Windows 95/98/ME/2k/XP/2003/Vista/2008&lt;br /&gt;
Interface: English&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://hotfile.com/dl/23620299/d1504ac/VB_Decompiler_Pro_7.7.rar.html&quot;&gt;&lt;b style=&quot;color: red;&quot;&gt;&lt;span style=&quot;color: red; font-size: small;&quot;&gt;DOWNLOAD&lt;/span&gt; NOW&lt;/b&gt;&lt;/a&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;http://feeds.feedburner.com/ReverseEngineeringBlog&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://reversingtools.blogspot.com/feeds/8047225174587249698/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://reversingtools.blogspot.com/2010/01/vb-decompiler-pro-v77-retail-incl-fff.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/8047225174587249698'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/8047225174587249698'/><link rel='alternate' type='text/html' href='http://reversingtools.blogspot.com/2010/01/vb-decompiler-pro-v77-retail-incl-fff.html' title='VB Decompiler Pro v7.7 Retail - Incl. FFF-KEYGEN'/><author><name>Desi Master</name><uri>http://www.blogger.com/profile/04598065953640802276</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6699219850474086254.post-4690815027033250490</id><published>2010-01-08T01:12:00.000-08:00</published><updated>2010-08-19T22:56:45.901-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Packers"/><title type='text'>VMProtect Ultimate 2.03 - Cracked</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;VMProtect is to protect next-generation software. Protected parts of code are executed on a virtual machine, which greatly complicates the analysis and breaking the protected program. Built-in disassembler and a MAP file will allow you to quickly select the necessary parts of code to protect against hacking.&lt;br /&gt;
&lt;br /&gt;
Ultimate can provide maximum protection for your application. Supports work with serial numbers, black list, virtualization and mutation of the code, protection against debugging and more.&lt;br /&gt;
&lt;br /&gt;
VMProtect helps protect the software from analysis and cracking. The basis of protection is the execution of program code sections in a virtual machine. Architecture of virtual machines is radically different from conventional processors, which renders meaningless most of the tools used by hackers.&lt;br /&gt;
&lt;br /&gt;
VMProtect is a comprehensive solution for protecting software. In addition to the immediate protection package, VMProtect allows you to generate and check serial numbers, limiting their duration, to limit the period of free updates and much more.&lt;br /&gt;
&lt;br /&gt;
Why VMProtect?&lt;br /&gt;
Here are five reasons to choose VMProtect to protect your software:&lt;br /&gt;
Virtualization package - is the next step in the field of software protection from analysis. Most security systems encrypt the executable code and decode it when you start the program. VMProtect never deciphered the code. In the process of protecting VMProtect translates program code into code that runs on a virtual processor. A set of commands that the processor does not like the command processor x86 or x64, and changes with each protection program.&lt;br /&gt;
Support all file formats - VMProtect allows you to protect executable files (EXE, SCR), dynamic library (DLL, OCX, BPL) and driver (SYS).&lt;br /&gt;
64-bit platforms - VMProtect can protect both 32-bit and 64-bit executable files, libraries and drivers.&lt;br /&gt;
Support line Windows - protected files VMProtect, can run on all versions of Windows, from Windows 95.&lt;br /&gt;
&lt;br /&gt;
It supports 32 and 64-bit operating systems, there is a problem with DEP and UAC.&lt;br /&gt;
Integrated solution for protection - VMProtect allows you to generate and check serial numbers. Rooms can be generated either manually or automatically (Web-generators). Serial numbers may be limited by the time of action, may limit the period of free updates that can be attached to the equipment. Also VMProtect can make physically impossible to execute code in the absence of serial numbers.&lt;br /&gt;
&lt;br /&gt;
Support for Compilers: Delphi, Borland C Builder, Visual C / C + +, Visual Basic (native), Virtual Pascal&lt;br /&gt;
&lt;br /&gt;
Supported Formats (x32 and x64): EXE, DLL, BPL, OCX, SYS&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Download now: &lt;/b&gt;http://www.megaupload.com/?d=HIARENAV&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;http://feeds.feedburner.com/ReverseEngineeringBlog&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://reversingtools.blogspot.com/feeds/4690815027033250490/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://reversingtools.blogspot.com/2010/01/vmprotect-ultimate-203-cracked.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/4690815027033250490'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/4690815027033250490'/><link rel='alternate' type='text/html' href='http://reversingtools.blogspot.com/2010/01/vmprotect-ultimate-203-cracked.html' title='VMProtect Ultimate 2.03 - Cracked'/><author><name>Desi Master</name><uri>http://www.blogger.com/profile/04598065953640802276</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6699219850474086254.post-6065773876226460747</id><published>2010-01-01T01:45:00.000-08:00</published><updated>2010-01-01T01:45:42.382-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Debuggers"/><title type='text'>PEBrowse Professional Interactive 9.3.1</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://www.smidgeonsoft.com/images/PEBrowseProInteractive945x689.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;240&quot; src=&quot;http://www.smidgeonsoft.com/images/PEBrowseProInteractive945x689.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;/div&gt;PEBrowse Professional Interactive (v9.3.1) is a debugger for Microsoft Windows 2000, Windows XP, Windows 2003, and Windows Vista32.&lt;br /&gt;
&lt;br /&gt;
Changes since V 9.3&lt;br /&gt;
- Fixed kernel object display and added missing types in Windows 7&lt;br /&gt;
- Enable thread suspend, resume and terminate while debuggee is not stopped&lt;br /&gt;
- Enable zero-register and call-thru register displays&lt;br /&gt;
- Added dialogbox to minidump creation process&lt;br /&gt;
- Fixed for critical section display on OSes Win2003 and greater.&lt;br /&gt;
- Additional information for more kernel objects.&lt;br /&gt;
- Fixed session files storing incorrect executable names and settings.&lt;br /&gt;
&lt;br /&gt;
Download: http://www.smidgeonsoft.com/download/PEBrowseDbg.zip&lt;div class=&quot;blogger-post-footer&quot;&gt;http://feeds.feedburner.com/ReverseEngineeringBlog&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://reversingtools.blogspot.com/feeds/6065773876226460747/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://reversingtools.blogspot.com/2010/01/pebrowse-professional-interactive-931.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/6065773876226460747'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/6065773876226460747'/><link rel='alternate' type='text/html' href='http://reversingtools.blogspot.com/2010/01/pebrowse-professional-interactive-931.html' title='PEBrowse Professional Interactive 9.3.1'/><author><name>Desi Master</name><uri>http://www.blogger.com/profile/04598065953640802276</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6699219850474086254.post-7420237274288015871</id><published>2010-01-01T01:40:00.000-08:00</published><updated>2010-01-01T01:40:39.480-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="PE Tools"/><title type='text'>PROTECTiON iD v6.3.5</title><content type='html'>&lt;b&gt;&lt;u&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-size: 11pt;&quot;&gt;Features&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-size: 11pt;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-size: 11pt;&quot;&gt;- detection of every major PC ISO Game / Application protection&lt;br /&gt;
- currently covers 475 detections, including win32/64 exe protectors &amp;amp; packers, .net protectors, dongles, licenses &amp;amp; installers&lt;br /&gt;
&lt;span style=&quot;color: black;&quot;&gt;- sector scanning CDs / DVDs for Copy Protections&lt;br /&gt;
&lt;/span&gt;- files / folders can simply be drag &amp;amp; droped into pid&lt;br /&gt;
&lt;span style=&quot;color: black;&quot;&gt;- strong scanning routines allowing it to detect multiple protections&lt;br /&gt;
- easy scanning via shell context menu&lt;br /&gt;
&lt;/span&gt;- usefully misc tools included&lt;br /&gt;
- coded 100% in Win32 assembly language&lt;br /&gt;
- fully 32bit &amp;amp; 64bit compliant&lt;br /&gt;
- working from Win9x to Windows 7&lt;/span&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;color: black; font-size: 11pt;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-size: 11pt;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;b&gt;&lt;u&gt;&lt;span lang=&quot;EN-US&quot;&gt;v6.3.5&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;b&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-size: 11pt;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-size: 11pt;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-size: 11pt;&quot;&gt;hello folks!&lt;br /&gt;
&lt;br /&gt;
We are proud to present you the next and most up2date version of protection id.&lt;br /&gt;
it was about time to bring this to the public, as the last version was released back in march.&lt;br /&gt;
&lt;br /&gt;
During development of this version we ported it over to MASM v10,&lt;br /&gt;
using the latest compiler &amp;amp; linker available at the moment.&lt;br /&gt;
&lt;br /&gt;
This version of pid features highly optimized scanning routines, resulting in very fast detections.&lt;br /&gt;
i.e. a 2 GB setup.exe in processed in less then 1 second (smart mode kicks in).&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;  &lt;span lang=&quot;EN-US&quot; style=&quot;font-size: 11pt;&quot;&gt;We tweaked nearly all scans to benefit from our new procs.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span lang=&quot;EN-US&quot; style=&quot;font-size: 13.5pt;&quot;&gt;Download: &lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span style=&quot;font-size: 13.5pt;&quot;&gt;&lt;a href=&quot;http://pid.gamecopyworld.com/ProtectionID_v6.3.5.rar&quot;&gt;&lt;span lang=&quot;EN-US&quot;&gt;ProtectionID_v6.3.5.rar&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;span lang=&quot;EN-US&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;http://feeds.feedburner.com/ReverseEngineeringBlog&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://reversingtools.blogspot.com/feeds/7420237274288015871/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://reversingtools.blogspot.com/2010/01/protection-id-v635.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/7420237274288015871'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/7420237274288015871'/><link rel='alternate' type='text/html' href='http://reversingtools.blogspot.com/2010/01/protection-id-v635.html' title='PROTECTiON iD v6.3.5'/><author><name>Desi Master</name><uri>http://www.blogger.com/profile/04598065953640802276</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6699219850474086254.post-5523940119929869050</id><published>2010-01-01T01:37:00.000-08:00</published><updated>2010-01-01T01:37:35.479-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Debuggers"/><title type='text'>P32Dasm v2.6</title><content type='html'>i prepare for you some Christmas gift - new release of P32Dasm :-) This release add some powerful features that allow you to analyze VB5/6 apps more detailed. More objects/classes are resolved, more procedures are identified with their real names, in some cases of .ocx, .dll files also added parameters with real names and types plus additional information as Enumerators, Constants, Events and Properties. So a lot of work was done here and i hope you enjoy this release. Your best tool for reversing VB5/6 apps is ready to use :-)&lt;br /&gt;
&lt;br /&gt;
2.6 - [24.12.2009] - Christmas Release&lt;br /&gt;
+ Added procedure names identification&lt;br /&gt;
+ More objects recognition&lt;br /&gt;
+ Added reading more details (Enumerators, Constants, Events and Properties)&lt;br /&gt;
+ Added new Events icon for better resolution&lt;br /&gt;
+ Internal code tidy up and changes for displaying better debug info&lt;br /&gt;
+ More procedures details identified on some strange type apps (NCode)&lt;br /&gt;
- Removed displaying of procedure names list in output (moved to real names)&lt;br /&gt;
* fixed working of MRU files&lt;br /&gt;
* Fixed bug: missing end address in one procedure NCode object&lt;br /&gt;
* Fixed some GUI problems when app use visual styles&lt;br /&gt;
&lt;br /&gt;
Download: &lt;br /&gt;
http://progress-tools.110mb.com/p32dasm.zip&lt;div class=&quot;blogger-post-footer&quot;&gt;http://feeds.feedburner.com/ReverseEngineeringBlog&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://reversingtools.blogspot.com/feeds/5523940119929869050/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://reversingtools.blogspot.com/2010/01/p32dasm-v26.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/5523940119929869050'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/5523940119929869050'/><link rel='alternate' type='text/html' href='http://reversingtools.blogspot.com/2010/01/p32dasm-v26.html' title='P32Dasm v2.6'/><author><name>Desi Master</name><uri>http://www.blogger.com/profile/04598065953640802276</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6699219850474086254.post-4264961381189487924</id><published>2010-01-01T01:30:00.000-08:00</published><updated>2010-01-01T01:30:16.004-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Debuggers"/><title type='text'>DataRescue IDA Pro Advanced 5.5 with Hex Reys Decompiler 1.1</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://i46.tinypic.com/2wdwz0z.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;222&quot; src=&quot;http://i46.tinypic.com/2wdwz0z.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://i47.tinypic.com/160odaw.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;222&quot; src=&quot;http://i47.tinypic.com/160odaw.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;What&#39;s new &lt;/span&gt;&lt;/span&gt;:&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://i50.tinypic.com/vhf7z6.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;221&quot; src=&quot;http://i50.tinypic.com/vhf7z6.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt; &lt;span style=&quot;font-weight: bold;&quot;&gt;Other, probably less visible, improvements include the PDB plugin, the type system, more SDK functions (check out the exec_request_t if you develop multithreaded plugins), etc. The full list is below:&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;PROCESSOR MODULES &lt;br /&gt;
----------------- &lt;br /&gt;
&lt;br /&gt;
+ PC: added detection of CException destructor; this helps to detect exception handlers and ignore them during function epilog analysis &lt;br /&gt;
+ PC: added support for another variation of PIC code by GCC &lt;br /&gt;
+ PC: more switches recognized in unoptimized MSVC code &lt;br /&gt;
+ ARM: added support for SUB Rx, R11, #fpoff stack variable references &lt;br /&gt;
+ ARM: added support for switches implemented using TBB/TBH instruction &lt;br /&gt;
+ ARM: better detection of R7-based frames &lt;br /&gt;
+ ARM: LDMED can be used for return too &lt;br /&gt;
+ ARM: type info and argument names are propagated for local variables passed by reference &lt;br /&gt;
+ ARM: other unspecified improvements (we removed them to keep the list short and more readable) &lt;br /&gt;
+ ARM: LSL Rx, Ry, #0 and ADD Rx, Ry, #0 are simplified to MOV Rx, Ry &lt;br /&gt;
+ I51: i/o port names are accepted for all segments (before only FSR definitions were handled) &lt;br /&gt;
+ MIPS: much improved analysis of ELF files &lt;br /&gt;
+ SuperH: simplified display of pc-relative literal loads &lt;br /&gt;
&lt;br /&gt;
FILE FORMATS &lt;br /&gt;
------------ &lt;br /&gt;
&lt;br /&gt;
+ BOCHRC file loader: it is now possible to start IDA with a bochsrc file as the input file &lt;br /&gt;
+ CRASH DMP file loader: it is now possible to start IDA with an MS Windows Crask dump file &lt;br /&gt;
+ COFF: segment permissions are imported for MS object files &lt;br /&gt;
+ ELF: accept PPC64 ELF files &lt;br /&gt;
+ ELF: handle dynamic symbols in MIPS files &lt;br /&gt;
+ ELF: some new SuperH relocations are supported &lt;br /&gt;
+ ELF: added support for ARM TLS relocations &lt;br /&gt;
+ EPOC: added support for multiple imports with the same ordinal &lt;br /&gt;
+ EPOC: user contribution: ids files for epoc6/9 from Robert Krkic &lt;br /&gt;
+ EPOC: since AppTRK does not report thread creation/deletion, IDA forcibly refreshes the thread list if an unknown thread id is encountered &lt;br /&gt;
+ PDB: added the possibility to manually load a specific PDB file; to load only types from the PDB &lt;br /&gt;
+ PDB: added support for anonymous unions. types with bitfields are handled more correctly: we replace them with a corresponding POD type; ida kernel can not handle bitfields yet &lt;br /&gt;
+ PDB: added support for undefined enum types &lt;br /&gt;
+ PDB: better handling of C++ static methods and functions returning complex types. &lt;br /&gt;
+ PDB: better handling of string literals (??_C@...) &lt;br /&gt;
+ PDB: information about function argument names is applied, if available in the .pdb file &lt;br /&gt;
+ PDB: symbols can be loaded using EXE headers in the database, either from the module list during debugging or via File menu by specifying a valid base address &lt;br /&gt;
+ PE: added an option in pe.cfg to force loading of all PE file sections (usually .reloc and similar sections are skipped) &lt;br /&gt;
+ PE: if import and/or export tables lie outside .idata segment, they are parsed and formatted &lt;br /&gt;
&lt;br /&gt;
KERNEL &lt;br /&gt;
------ &lt;br /&gt;
&lt;br /&gt;
+ Added some common C++ ABI functions to noret.cfg &lt;br /&gt;
+ Added support for __usercall functions with variable number of arguments (...) &lt;br /&gt;
+ Added functions to handle floating point instructions for the decompiler &lt;br /&gt;
+ Improved the browsing speed for big databases when autoanalysis is busy: moving around in huge databases is much better &lt;br /&gt;
+ Demangler: added support for the latest gcc4 &lt;br /&gt;
+ Updated WinCE ARM ids files to Windows Mobile 6.0 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
IDC &amp;amp; SDK &lt;br /&gt;
--------- &lt;br /&gt;
&lt;br /&gt;
+ IDC: added MoveSegm() and RebaseProgram() functions &lt;br /&gt;
+ IDC: added OpFloat() function &lt;br /&gt;
+ IDC: renamed segment modification functions to start with a verb. Old names continue to be available. &lt;br /&gt;
+ SDK: added append_buf() and unpack_buf(), append_obj() and unpack_obj() &lt;br /&gt;
+ SDK: added build_anon_type_name() &lt;br /&gt;
+ SDK: added build_func_type() to facilitate building of type strings that represent functions &lt;br /&gt;
+ SDK: added callbacks to AskUsingForm so that the dialog can be modified on the fly &lt;br /&gt;
+ SDK: added change_storage_type() to change the storage method of arbitrary address range. please note that the sparse storage method works well only with uninitialized areas with huge objects &lt;br /&gt;
+ SDK: added floating point conversion functions for 64bit values &lt;br /&gt;
+ SDK: added functions for working with imports (enum_import_names and others, see nalt.hpp) &lt;br /&gt;
+ SDK: added get_zero_areas() to retrieve info about huge zero inited ranges &lt;br /&gt;
+ SDK: added exec_request_t - class that allows for code execution in the main thread from any other thread &lt;br /&gt;
+ SDK: added more convenient areacb_t::for_all_areas2(), which accepts a functor instead of (function,data) pair &lt;br /&gt;
+ SDK: added qlist compiler-independent template &lt;br /&gt;
+ SDK: added qthread_self() &lt;br /&gt;
+ SDK: added set_process_options() to set debugger process options &lt;br /&gt;
+ SDK: added ui_enable_input_hotkeys notification to let plugins temporary disable alphanumeric hotkeys which can interfere with user input &lt;br /&gt;
+ SDK: added replace_wait_box() &lt;br /&gt;
+ SDK: added DBGINV_REDRAW bit to refresh the user interface while invalidating the debugger caches &lt;br /&gt;
+ SDK: bitfield definitions in type strings have been changed. since there was no support for bitfields in the parser, this change should not affect anybody &lt;br /&gt;
+ SDK: introduced dt_ldbl to represent long double types. long double is different from tbyte and can be 8,10,12, or 16 bytes depending on the compiler &lt;br /&gt;
+ SDK: is_sp_based() can now return information about operands which are substracted from stack pointer &lt;br /&gt;
+ SDK: patch_byte() and similar functions return success if they succeed in modifying either process memory or idb. before they were returning true only if both process memory and idb were modified &lt;br /&gt;
+ SDK: windbg kernel mode: added notion of virtual threads &lt;br /&gt;
&lt;br /&gt;
USER INTERFACE &lt;br /&gt;
-------------- &lt;br /&gt;
&lt;br /&gt;
+ UI: it is possible to add several types at once from the local types list (previously only the first one was added) &lt;br /&gt;
+ UI: it is possible to delete segment register change points from the &quot;Jump to segment register&quot; dialog or &quot;Segment registers&quot; view &lt;br /&gt;
+ UI: it is possible to set the base for array indexes display (decimal, hexadecimal, octal or binary) &lt;br /&gt;
+ UI: hex view supports in-place editing, various data formats and unicode strings &lt;br /&gt;
+ UI: unicode strings: unprintable characters are grouped into arrays; extra trailing zeroes are omitted by default &lt;br /&gt;
&lt;br /&gt;
DEBUGGER &lt;br /&gt;
-------- &lt;br /&gt;
&lt;br /&gt;
+ breakpoint condition is evaluated only after the breakpoint is hit &lt;br /&gt;
+ Symbian: added support for new AppTRK v3.0.8 (thanks to Bernhard Mueller from SEC Consult GmbH) &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BUGFIXES &lt;br /&gt;
-------- &lt;br /&gt;
&lt;br /&gt;
BUGFIX: &#39;move segment&#39; command could affect segments outside of selection &lt;br /&gt;
BUGFIX: &#39;search for immediate&#39; would ignore unexplored dword values (except in some very rare cases) &lt;br /&gt;
BUGFIX: &quot;load debug info&quot; command was not available from the module list if the database was created by instant debugger &lt;br /&gt;
BUGFIX: 68K: immediate floating-point operands were displayed incorrectly &lt;br /&gt;
BUGFIX: 8051: &#39;x&#39; key didn&#39;t work with named bit operands (like P35) &lt;br /&gt;
BUGFIX: apply_tinfo() could not apply array types correctly; also applying char[] types was not always producing nice results &lt;br /&gt;
BUGFIX: ARM: some Thumb2 instructions were not decoded &lt;br /&gt;
BUGFIX: attaching to a process that generates exceptions or any other non-white listed event would still generate an ATTACH event first &lt;br /&gt;
BUGFIX: autoanalysis could loop indefinitely in some rare cases &lt;br /&gt;
BUGFIX: bochs could hang while parsing a binary file as bochsrc text file &lt;br /&gt;
BUGFIX: bochs dbg/rc file selectors were using save dialog and not open dialog &lt;br /&gt;
BUGFIX: bochs debugger could not handle some malformed PE files &lt;br /&gt;
BUGFIX: bochs debugger PE files with no sections were handled incorrectly &lt;br /&gt;
BUGFIX: bochs debugger was not initializing the FPU before running the program &lt;br /&gt;
BUGFIX: bochs debugger: CR4.bit9 should be set otherwise an invalid opcode will be thrown if a program attempts to use any of SSE{n} instructions. &lt;br /&gt;
BUGFIX: CodeView debug information was applied to wrong addresses &lt;br /&gt;
BUGFIX: corrupted epoc executables could not be loaded &lt;br /&gt;
BUGFIX: deleting a segment from UI sometimes led to deletion of wrong segment &lt;br /&gt;
BUGFIX: demangler: Visual Age was always interpreted as GNU compiler &lt;br /&gt;
BUGFIX: ELF: if file had .got.plt section but no .got, IDA did not rename PLT import stubs &lt;br /&gt;
BUGFIX: equal_types() was considering floating point and integral types of the same size equal &lt;br /&gt;
BUGFIX: esp alignment in 32-bit programs is only 2 bytes, not 4 bytes (push ax/add esp, 2 are perfectly valid but ida was aligning esp to 4 bytes) &lt;br /&gt;
BUGFIX: fild/fistp qword operands are marked as floating point doubles &lt;br /&gt;
BUGFIX: fpval-&amp;gt;integer conversion functions were broken since very long time &lt;br /&gt;
BUGFIX: generating html file with inverted colors would hang ida &lt;br /&gt;
BUGFIX: GetProcessQty() was failing if called before running the debugger &lt;br /&gt;
BUGFIX: huge (&amp;gt;2GB) areas could not be displayed in the navigation band in all zoom levels &lt;br /&gt;
BUGFIX: ida could complain about patched bytes at the start of a debugging session while no bytes had been patched &lt;br /&gt;
BUGFIX: ida was always asking for a confirmation of array creation if the first byte of the array was unexplored &lt;br /&gt;
BUGFIX: ida was not using export information from available DLLs due to a logic error in the code &lt;br /&gt;
BUGFIX: ida was silently failing to use dummy prefixes as new location names; now it displays a correct error message &lt;br /&gt;
BUGFIX: ida would crash in linux trying to display the debugger specific options dialog box &lt;br /&gt;
BUGFIX: IDACall GetProcAddress() was returning wrong addresses for forwarded entries &lt;br /&gt;
BUGFIX: idb2scr() was broken. it was impossible to edit comments with 8-bit ascii characters, the dialog box would display them as garbage &lt;br /&gt;
BUGFIX: IDC was not comparing floating point with integers correctly &lt;br /&gt;
BUGFIX: idc: fixed a typo in INF_SIZEOF_LDBL &lt;br /&gt;
BUGFIX: if attaching to multithreaded application, the thread window would not focus on the current thread (no thread would be selected) &lt;br /&gt;
BUGFIX: in some cases IDA was still showing the &quot;IDA Pro failed to stop/detach from the debugged program&quot; dialog even if the process was already terminated &lt;br /&gt;
BUGFIX: in some rare cases IDA could display an exception if &quot;full stack pointer analysis&quot; was enabled. &lt;br /&gt;
BUGFIX: it was impossible to refuse to import types from local type window to enum/structure windows &lt;br /&gt;
BUGFIX: it was impossible to debug a dll when two or more dlls of the same name are loaded &lt;br /&gt;
BUGFIX: it was impossible to suspend a process that keeps on generating masked exceptions. &lt;br /&gt;
BUGFIX: java module could crash trying to display an automatic comment for a long (multi-line) output &lt;br /&gt;
BUGFIX: linux debugger could interr if the input file name was incorrect in the process options &lt;br /&gt;
BUGFIX: long descriptions of local void and typedef types were lacking the &#39;typedef&#39; keyword &lt;br /&gt;
BUGFIX: LX: some LE files were not completely loaded (if the object&#39;s virtual size was less than the actual size) &lt;br /&gt;
BUGFIX: mac executables could not be used under Mac OS X 10.3 &lt;br /&gt;
BUGFIX: mac os x debugger could exit with &quot;can’t find dll name&quot; error &lt;br /&gt;
BUGFIX: mips dmfc1/dmtc1 instructions were not supported &lt;br /&gt;
BUGFIX: mips module was requiring even fp register numbers for ldc1/sdc1 instructions; removed this limitation &lt;br /&gt;
BUGFIX: mips: clz/clo/plzcw/movf/movt instructions could not be disassembled in delay slots &lt;br /&gt;
BUGFIX: move_segm() would rebase offset expressions regardless of the MSF_NOFIX flag &lt;br /&gt;
BUGFIX: multiple problems with the linux debugger module have been fixed &lt;br /&gt;
BUGFIX: nlm loader was not populating the imports window &lt;br /&gt;
BUGFIX: noType() called on a tail byte could corrupt the database &lt;br /&gt;
BUGFIX: pausing execution in VMWare was reported as an exception &lt;br /&gt;
BUGFIX: PC: (x64) movq instruction was decoded as movd &lt;br /&gt;
BUGFIX: PC: fixed occasional inifinite loop during analysis &lt;br /&gt;
BUGFIX: PC: fpu instructions had wrong values in the dtyp field (fpu reg types are still set to be dt_double, ideally it should be dt_tbyte) &lt;br /&gt;
BUGFIX: PC: functions with _SEH_prolog were not analyzed properly when using PDB symbols &lt;br /&gt;
BUGFIX: PC: LAHF/SAHF instructions could not be disassembled in 64-bit mode &lt;br /&gt;
BUGFIX: PC: operands of the fcompp insn were displayed in reverse order; they are not displayed anymore if they are regular st, st(1) &lt;br /&gt;
BUGFIX: PC: some one-byte opcodes were decoded incorrectly in 64-bit mode. REX.B was not ignored for opcodes 05, 25 etc &lt;br /&gt;
BUGFIX: PDB plugin could create a circular dependency in type, which would later crash IDA &lt;br /&gt;
BUGFIX: PE: imports in files with zero sections were parsed incorrectly &lt;br /&gt;
BUGFIX: PE: several fixes to handle unusual alignment values (thanks to Ivan Teblin) &lt;br /&gt;
BUGFIX: PIC files were loaded with 8-bit &#39;bytes&#39; by default &lt;br /&gt;
BUGFIX: pressing and holding F8 in bochs debugger could lead to a racing condition and deadlock &lt;br /&gt;
BUGFIX: SDK: c2ustr was returning a string with an extra terminating zero which was included in the string length &lt;br /&gt;
BUGFIX: SDK: for 16bit segmented memory, ida would set incorrect value for eip after a breakpoint (visible with third-party 16bit debugger plugins) &lt;br /&gt;
BUGFIX: SDK: open_hexdump_window() didn&#39;t work in GUI version &lt;br /&gt;
BUGFIX: SDK: patch_word()/patch_long() did not work properly if the new value had some bytes matching the database &lt;br /&gt;
BUGFIX: set_offset_ex() with RVAOFF could fail randomly &lt;br /&gt;
BUGFIX: some symbian sisx files could not be loaded (ida crashed) &lt;br /&gt;
BUGFIX: some undefined types referenced by name were imported as &#39;void&#39; &lt;br /&gt;
BUGFIX: structure alignment was sometimes wrong in types created by the pdb plugin &lt;br /&gt;
BUGFIX: structures with arrays of structures should not be displayed in terse form &lt;br /&gt;
BUGFIX: Symbian: file names in embedded sis files were displayed incorrectly &lt;br /&gt;
BUGFIX: the horizontal scrollbar in disassembly views was handled incorrectly &lt;br /&gt;
BUGFIX: tms6 module was incorrectly commenting branch/call targets under linux &lt;br /&gt;
BUGFIX: type system was not adding comments for arguments that were handled from generic code (gen_use_arg_types()) &lt;br /&gt;
BUGFIX: u2cstr() was returning a string with an extra terminating zero which was included in the string length &lt;br /&gt;
BUGFIX: UI: ida could display &quot;Access denied&quot; message when running in a remote desktop session and the session was minimized or closed &lt;br /&gt;
BUGFIX: unicode support in the mac version of ida was broken &lt;br /&gt;
BUGFIX: unix implementation of qsem() functions could crash on NULL pointer &lt;br /&gt;
BUGFIX: unpatched PIC GOT32/GOTOFF relocations were handled incorrectly &lt;br /&gt;
BUGFIX: validate_tofs() could not handle variable sized structures. modifying a byte of a variable sized structure could lead to interrs. &lt;br /&gt;
BUGFIX: win32 debugger would freeze trying to attach to a crippled program that would generate exceptions during attaching &lt;br /&gt;
BUGFIX: win7 rc has a hardcoded int3 instruction in LdrpDoDebuggerBreak() instead of a call to DbgBreakPoint() and IDA stops on it &lt;br /&gt;
BUGFIX: wince debugger could not attach to an already running process if the &quot;debugger-&amp;gt;process options-&amp;gt;input file&quot; was specified &lt;br /&gt;
BUGFIX: WinCE debugger module could hang in some cases if ida_kdstub.dll was missing from IDA directory and the PocketPC &lt;br /&gt;
BUGFIX: wince debugger was causing system wide memory leaks on the PDA &lt;br /&gt;
BUGFIX: windbg debugger module (kernel mode) generates duplicate debug names each single step &lt;br /&gt;
BUGFIX: windbg debugger module was not enabled for drivers &lt;br /&gt;
BUGFIX: windbg was reverting the debugging tools path to the default at each process start &lt;br /&gt;
BUGFIX: wrong types with circular dependencies could crash ida (like typedef x x &lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://rapidshare.com/files/322368444/idp55.rar&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;b&gt;DOWNLOAD&lt;/b&gt;&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;Pass: chevrosky&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;http://feeds.feedburner.com/ReverseEngineeringBlog&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://reversingtools.blogspot.com/feeds/4264961381189487924/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://reversingtools.blogspot.com/2010/01/datarescue-ida-pro-advanced-55-with-hex.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/4264961381189487924'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/4264961381189487924'/><link rel='alternate' type='text/html' href='http://reversingtools.blogspot.com/2010/01/datarescue-ida-pro-advanced-55-with-hex.html' title='DataRescue IDA Pro Advanced 5.5 with Hex Reys Decompiler 1.1'/><author><name>Desi Master</name><uri>http://www.blogger.com/profile/04598065953640802276</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://i46.tinypic.com/2wdwz0z_th.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6699219850474086254.post-3475684620510832246</id><published>2009-12-01T07:51:00.000-08:00</published><updated>2009-12-01T07:51:44.145-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="OllyDBG Plugins/Scripts"/><title type='text'>StrongOD.v0.2.8.478.By.海风月影[CUG]</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqk5qv78KKYBmd1cDawjAtWbTsnKgVkaDMW2gYdLXOn3NeDSYuKZ9bLCwJw1gkg_gRVrAVfVbF9SCisaPNMKHriiAtHstc6a9jb3qsBHg95HJ_MPJQUkOibDIfWh_JZxMg8D353jiDBz0/s1600/20090.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqk5qv78KKYBmd1cDawjAtWbTsnKgVkaDMW2gYdLXOn3NeDSYuKZ9bLCwJw1gkg_gRVrAVfVbF9SCisaPNMKHriiAtHstc6a9jb3qsBHg95HJ_MPJQUkOibDIfWh_JZxMg8D353jiDBz0/s320/20090.png&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;Download:&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;http://www.megaupload.com/?d=N35WGW5G&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;http://feeds.feedburner.com/ReverseEngineeringBlog&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://reversingtools.blogspot.com/feeds/3475684620510832246/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://reversingtools.blogspot.com/2009/12/strongodv028478bycug.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/3475684620510832246'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/3475684620510832246'/><link rel='alternate' type='text/html' href='http://reversingtools.blogspot.com/2009/12/strongodv028478bycug.html' title='StrongOD.v0.2.8.478.By.海风月影[CUG]'/><author><name>Desi Master</name><uri>http://www.blogger.com/profile/04598065953640802276</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqk5qv78KKYBmd1cDawjAtWbTsnKgVkaDMW2gYdLXOn3NeDSYuKZ9bLCwJw1gkg_gRVrAVfVbF9SCisaPNMKHriiAtHstc6a9jb3qsBHg95HJ_MPJQUkOibDIfWh_JZxMg8D353jiDBz0/s72-c/20090.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6699219850474086254.post-6174625685803473764</id><published>2009-12-01T01:17:00.000-08:00</published><updated>2009-12-01T01:17:25.505-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Packers"/><title type='text'>VMProtect.Professional.v.2.01.2.Cracked.by.Nooby</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://unpack.cn/attachments/month_0911/0911181705980ae92752371b63.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;297&quot; src=&quot;http://unpack.cn/attachments/month_0911/0911181705980ae92752371b63.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;Download:&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;http://www.megaupload.com/?d=IL91YMHW&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;http://feeds.feedburner.com/ReverseEngineeringBlog&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://reversingtools.blogspot.com/feeds/6174625685803473764/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://reversingtools.blogspot.com/2009/12/vmprotectprofessionalv2012crackedbynoob.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/6174625685803473764'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/6174625685803473764'/><link rel='alternate' type='text/html' href='http://reversingtools.blogspot.com/2009/12/vmprotectprofessionalv2012crackedbynoob.html' title='VMProtect.Professional.v.2.01.2.Cracked.by.Nooby'/><author><name>Desi Master</name><uri>http://www.blogger.com/profile/04598065953640802276</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6699219850474086254.post-3254611884614919355</id><published>2009-11-15T06:33:00.000-08:00</published><updated>2009-11-15T06:33:07.216-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tutorials"/><title type='text'>Unpacking VMProtect 1.7 - 1.8 Tutorial Set &amp; Script by LCF-AT</title><content type='html'>What&#39;s inside?All belong together!&lt;br /&gt;
******************************************************&lt;br /&gt;
Vid_01. Unpacking VMProtect 1.7 - 1.8 Debugger and system setup.swf&lt;br /&gt;
Vid_02. Unpacking VMProtect 1.7 - 1.8 OEP and API analysis.swf&lt;br /&gt;
Vid_03. Unpacking VMProtect 1.7 - 1.8 Unpacking VMP 1.7 target.swf&lt;br /&gt;
Vid_04. Unpacking VMProtect 1.7 - 1.8 Unpacking VMP 1.8 target.swf&lt;br /&gt;
Vid_05. Unpacking VMProtect 1.7 - 1.8 Test all unpacked files.swf&lt;br /&gt;
&lt;br /&gt;
Six small exsample targets.Three protected by VMProtect 1.8 and three more protected by VMProtect 1.7.I added also all unpacked files and txt &amp;amp; mem files which was created by my script so that you can also understand &amp;amp; test it.&lt;br /&gt;
&lt;br /&gt;
VMProtect 1.7 - 1.8 OEP &amp;amp; Unpack Helper 1.0.txt  / 37 KB&lt;br /&gt;
&lt;blockquote&gt;&lt;br /&gt;
&lt;pre class=&quot;prettyprint&quot;&gt;&lt;span class=&quot;pun&quot;&gt;***************************************************&lt;/span&gt;&lt;span class=&quot;pln&quot;&gt; 
&lt;/span&gt;&lt;span class=&quot;pun&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;pln&quot;&gt; &lt;/span&gt;&lt;span class=&quot;lit&quot;&gt;1.&lt;/span&gt;&lt;span class=&quot;pun&quot;&gt;)&lt;/span&gt;&lt;span class=&quot;pln&quot;&gt; OEP &lt;/span&gt;&lt;span class=&quot;typ&quot;&gt;Finder&lt;/span&gt;&lt;span class=&quot;pln&quot;&gt; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 

&lt;/span&gt;&lt;span class=&quot;pun&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;pln&quot;&gt; &lt;/span&gt;&lt;span class=&quot;lit&quot;&gt;2.&lt;/span&gt;&lt;span class=&quot;pun&quot;&gt;)&lt;/span&gt;&lt;span class=&quot;pln&quot;&gt; API &lt;/span&gt;&lt;span class=&quot;typ&quot;&gt;Place&lt;/span&gt;&lt;span class=&quot;pln&quot;&gt; &lt;/span&gt;&lt;span class=&quot;typ&quot;&gt;Finder&lt;/span&gt;&lt;span class=&quot;pln&quot;&gt; &lt;/span&gt;&lt;span class=&quot;typ&quot;&gt;Break&lt;/span&gt;&lt;span class=&quot;pln&quot;&gt; &lt;/span&gt;&lt;span class=&quot;pun&quot;&gt;&amp;amp;&lt;/span&gt;&lt;span class=&quot;pln&quot;&gt; LOG &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 

&lt;/span&gt;&lt;span class=&quot;pun&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;pln&quot;&gt; &lt;/span&gt;&lt;span class=&quot;lit&quot;&gt;3.&lt;/span&gt;&lt;span class=&quot;pun&quot;&gt;)&lt;/span&gt;&lt;span class=&quot;pln&quot;&gt; &lt;/span&gt;&lt;span class=&quot;typ&quot;&gt;Creating&lt;/span&gt;&lt;span class=&quot;pln&quot;&gt; IATPATCH&lt;/span&gt;&lt;span class=&quot;pun&quot;&gt;.&lt;/span&gt;&lt;span class=&quot;pln&quot;&gt;txt &lt;/span&gt;&lt;span class=&quot;pun&quot;&gt;&amp;amp;&lt;/span&gt;&lt;span class=&quot;pln&quot;&gt; IAT_INLINE &lt;/span&gt;&lt;span class=&quot;typ&quot;&gt;Section&lt;/span&gt;&lt;span class=&quot;pln&quot;&gt; M&lt;/span&gt;&lt;span class=&quot;pun&quot;&gt;|&lt;/span&gt;&lt;span class=&quot;lit&quot;&gt;2&lt;/span&gt;&lt;span class=&quot;pln&quot;&gt; 

&lt;/span&gt;&lt;span class=&quot;pun&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;pln&quot;&gt; &lt;/span&gt;&lt;span class=&quot;lit&quot;&gt;4.&lt;/span&gt;&lt;span class=&quot;pun&quot;&gt;)&lt;/span&gt;&lt;span class=&quot;pln&quot;&gt; &lt;/span&gt;&lt;span class=&quot;typ&quot;&gt;Creating&lt;/span&gt;&lt;span class=&quot;pln&quot;&gt; &lt;/span&gt;&lt;span class=&quot;typ&quot;&gt;Session&lt;/span&gt;&lt;span class=&quot;pln&quot;&gt; &lt;/span&gt;&lt;span class=&quot;typ&quot;&gt;Info&lt;/span&gt;&lt;span class=&quot;pln&quot;&gt; &lt;/span&gt;&lt;span class=&quot;typ&quot;&gt;File&lt;/span&gt;&lt;span class=&quot;pln&quot;&gt; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 

&lt;/span&gt;&lt;span class=&quot;pun&quot;&gt;(&lt;/span&gt;&lt;span class=&quot;pln&quot;&gt; &lt;/span&gt;&lt;span class=&quot;lit&quot;&gt;4.&lt;/span&gt;&lt;span class=&quot;pun&quot;&gt;)&lt;/span&gt;&lt;span class=&quot;pln&quot;&gt; &lt;/span&gt;&lt;span class=&quot;typ&quot;&gt;Creating&lt;/span&gt;&lt;span class=&quot;pln&quot;&gt; &lt;/span&gt;&lt;span class=&quot;typ&quot;&gt;Extra&lt;/span&gt;&lt;span class=&quot;pln&quot;&gt; &lt;/span&gt;&lt;span class=&quot;typ&quot;&gt;APIs&lt;/span&gt;&lt;span class=&quot;pln&quot;&gt; &lt;/span&gt;&lt;span class=&quot;typ&quot;&gt;For&lt;/span&gt;&lt;span class=&quot;pln&quot;&gt; &lt;/span&gt;&lt;span class=&quot;typ&quot;&gt;Some&lt;/span&gt;&lt;span class=&quot;pln&quot;&gt; &lt;/span&gt;&lt;span class=&quot;typ&quot;&gt;Cases&lt;/span&gt;&lt;span class=&quot;pln&quot;&gt;

&lt;/span&gt;&lt;span class=&quot;typ&quot;&gt;How&lt;/span&gt;&lt;span class=&quot;pln&quot;&gt; to &lt;/span&gt;&lt;span class=&quot;typ&quot;&gt;Use&lt;/span&gt;&lt;span class=&quot;pln&quot;&gt; &lt;/span&gt;&lt;span class=&quot;typ&quot;&gt;Information&lt;/span&gt;&lt;span class=&quot;str&quot;&gt;`s | Step List Choice
***************************************************
You have 3 methods | Follow this | *2=1 *2=2 *3=3 *
*
*2 &amp;lt;- Search the API Holder Address &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; [1] * 
*1 &amp;lt;- Search the OEP / SubRoutine Address &amp;nbsp; &amp;nbsp; [2] * 
*3 &amp;lt;- Write IATPATCH.txt File &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; [3] * &lt;/span&gt;&lt;span class=&quot;str&quot;&gt;&lt;/span&gt;&amp;nbsp;&lt;/pre&gt;&lt;/blockquote&gt;&lt;blockquote&gt;&lt;pre class=&quot;prettyprint&quot;&gt;&lt;span class=&quot;str&quot;&gt;*************************************************** &lt;/span&gt;&lt;/pre&gt;&lt;/blockquote&gt;So how you can alraedy see are there five movie tutorials to watch so I&#39;ve decided to do this to give you also a good overview how to find the important places we need and what we can to do there.I also commented all so that you can do nothing wrong and it´s also qualified for some newbies.&lt;br /&gt;
&lt;br /&gt;
The script content some diffrent methods which you can choose so it`s also important to choose these in the right turn you know.So just watch all movies and then you can start to unpack something by youself with the script.This prevents also me for some unnecessary questions later.Try also to use the same or higher ODbgScript.dll plugin v1.76.3 to prevent mistake`s!&lt;br /&gt;
&lt;br /&gt;
I also added the Nooby.dll in my package and I explain what the dll makes.I also have made my script compatible for this dll and VMProtect 1.8 versions if you want to use this dll but this is not required so you have the choice.I show you also how to get the dumped files working for other OS which you can also see in Vid_05.So all in all I can say it´s the biggest tutorial which I have made till now so the package size of 30 MB so I hope you have a little bit time to watch all. &lt;br /&gt;
So then I have no more to tell at the moment about it.Now I whish all interested people much fun at watching all movies and I also hope that you get it also working for you.If you get after all still some problems during the unpack process then you can use this topic to put your questions in here.&lt;br /&gt;
&lt;br /&gt;
DownLoadLink:&lt;br /&gt;
http://www.megaupload.com/?d=33QZB757&lt;br /&gt;
PASS: VMP_UNPACKING_SET&lt;div class=&quot;blogger-post-footer&quot;&gt;http://feeds.feedburner.com/ReverseEngineeringBlog&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://reversingtools.blogspot.com/feeds/3254611884614919355/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://reversingtools.blogspot.com/2009/11/unpacking-vmprotect-17-18-tutorial-set.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/3254611884614919355'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/3254611884614919355'/><link rel='alternate' type='text/html' href='http://reversingtools.blogspot.com/2009/11/unpacking-vmprotect-17-18-tutorial-set.html' title='Unpacking VMProtect 1.7 - 1.8 Tutorial Set &amp; Script by LCF-AT'/><author><name>Desi Master</name><uri>http://www.blogger.com/profile/04598065953640802276</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6699219850474086254.post-5567913169363645265</id><published>2009-11-13T01:26:00.000-08:00</published><updated>2009-11-13T01:29:05.176-08:00</updated><title type='text'>Ad Banner Remover Plus - Version 1.0.4.1</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBsxmRBVBcA7vrcLASD3xNNmVBxzNa6RuHoC78M5N_6St0dVijkSgQvPHHGIYcv2Cr8oAy7qC6raBuX4wCVAzLZZHqa6zWfr-7pmwNf0e3H9sg2o5aO1XXfBqIPz218lrgWpHGGpqng50/s1600-h/abmain.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBsxmRBVBcA7vrcLASD3xNNmVBxzNa6RuHoC78M5N_6St0dVijkSgQvPHHGIYcv2Cr8oAy7qC6raBuX4wCVAzLZZHqa6zWfr-7pmwNf0e3H9sg2o5aO1XXfBqIPz218lrgWpHGGpqng50/s320/abmain.jpg&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial; font-size: small;&quot;&gt;&lt;b&gt;Advert Options&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial;&quot;&gt;Main Messenger Advert - Removable&lt;br /&gt;
Change Room Banner - Replaceable&lt;br /&gt;
Chat Room Advert - Removable&lt;br /&gt;
Webcam Adverts - Replaceable&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial; font-size: small;&quot;&gt;&lt;b&gt;Other Options&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial;&quot;&gt;Enable / Disable Multiple Instances of Yahoo Messenger 10, 9, or 8&lt;br /&gt;
Disable &quot;Automatically start Yahoo Messenger&quot; - When Windows Starts&lt;br /&gt;
Enable/Disable Smiley Search - Yahoo Messenger 10 Only&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;MD5&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
5CBA3FDC9E83A3BA51ED7762B6F87FB7&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Download&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
Download from Megaupload - &lt;a href=&quot;http://www.megaupload.com/?d=ZHRCPGET&quot; target=&quot;_blank&quot;&gt;Download&lt;/a&gt;&lt;br /&gt;
Download from Mediafire - &lt;a href=&quot;http://www.mediafire.com/?1thdny5hm2n&quot; target=&quot;_blank&quot;&gt;Download&lt;/a&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;Versions File&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Arial;&quot;&gt;Download&lt;/span&gt; &lt;span style=&quot;font-family: Arial;&quot;&gt;from &lt;/span&gt;&lt;span style=&quot;font-family: Arial;&quot;&gt;Mediafire&lt;/span&gt; &lt;span style=&quot;font-family: Arial;&quot;&gt;- &lt;a href=&quot;http://www.mediafire.com/?izm1ii3mkmw&quot; target=&quot;_blank&quot;&gt;Download&lt;/a&gt;&lt;/span&gt; &lt;span style=&quot;font-family: Arial;&quot;&gt;(&lt;/span&gt; Updated 11/12/2009 )&lt;br /&gt;
If you download Ad Banner Remover Plus from one of the download&lt;br /&gt;
links above then you do not need download an updated Versions file.&lt;br /&gt;
-----------------------------------------------------------------------------------------------&lt;br /&gt;
&lt;div style=&quot;color: red;&quot;&gt;&lt;b&gt;Yahoo Messenger 10.0.0.1102 is supported.&lt;/b&gt;&lt;br /&gt;
&lt;/div&gt;I have made some small changes to the User Interface in some places of the&lt;br /&gt;
application. I have also added a Help tab which includes a Help Document.&lt;div class=&quot;blogger-post-footer&quot;&gt;http://feeds.feedburner.com/ReverseEngineeringBlog&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://reversingtools.blogspot.com/feeds/5567913169363645265/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://reversingtools.blogspot.com/2009/11/ad-banner-remover-plus-version-1041.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/5567913169363645265'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/5567913169363645265'/><link rel='alternate' type='text/html' href='http://reversingtools.blogspot.com/2009/11/ad-banner-remover-plus-version-1041.html' title='Ad Banner Remover Plus - Version 1.0.4.1'/><author><name>Desi Master</name><uri>http://www.blogger.com/profile/04598065953640802276</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBsxmRBVBcA7vrcLASD3xNNmVBxzNa6RuHoC78M5N_6St0dVijkSgQvPHHGIYcv2Cr8oAy7qC6raBuX4wCVAzLZZHqa6zWfr-7pmwNf0e3H9sg2o5aO1XXfBqIPz218lrgWpHGGpqng50/s72-c/abmain.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6699219850474086254.post-8044236922242589516</id><published>2009-11-07T06:25:00.000-08:00</published><updated>2009-11-07T06:25:58.536-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tutorials"/><title type='text'>ASProtect SKE v2.x Unpacking Tuts</title><content type='html'>ASProt_unp.rar&lt;br /&gt;
http://www.megaupload.com/?d=X0FDMFTS&lt;br /&gt;
---------------&lt;br /&gt;
ASProtect 2.3 SKE (Bypass HardwareID Lock).rar&lt;br /&gt;
http://www.megaupload.com/?d=MOKUV0DV&lt;br /&gt;
---------------&lt;br /&gt;
ASProtect 2.4 SKE (OEP + Advanced Import Protection).rar&lt;br /&gt;
http://www.megaupload.com/?d=TU6RS5T4&lt;br /&gt;
---------------&lt;br /&gt;
ASProtect 2.xx (Attack on Activation Key).rar&lt;br /&gt;
http://www.megaupload.com/?d=G50HQ4JD&lt;br /&gt;
---------------&lt;br /&gt;
ASProtect SKE Unpacking Approach.rar&lt;br /&gt;
http://www.megaupload.com/?d=31QQJ28M&lt;br /&gt;
---------------&lt;br /&gt;
ASProtect.SKE2.x Unpacking.rar&lt;br /&gt;
http://www.megaupload.com/?d=SIG6MVN0&lt;br /&gt;
---------------&lt;br /&gt;
Asprotect_Ske2.3_U_Series.rar&lt;br /&gt;
http://www.megaupload.com/?d=2YVX75F0&lt;div class=&quot;blogger-post-footer&quot;&gt;http://feeds.feedburner.com/ReverseEngineeringBlog&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://reversingtools.blogspot.com/feeds/8044236922242589516/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://reversingtools.blogspot.com/2009/11/asprotect-ske-v2x-unpacking-tuts.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/8044236922242589516'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/8044236922242589516'/><link rel='alternate' type='text/html' href='http://reversingtools.blogspot.com/2009/11/asprotect-ske-v2x-unpacking-tuts.html' title='ASProtect SKE v2.x Unpacking Tuts'/><author><name>Desi Master</name><uri>http://www.blogger.com/profile/04598065953640802276</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6699219850474086254.post-1511760364488131181</id><published>2009-11-07T05:49:00.000-08:00</published><updated>2009-11-07T05:49:30.180-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tutorials"/><title type='text'>Armadillo v4x/5x/6x Unpacking Tuts</title><content type='html'>arma6.24 tut X Video Converter.rar 1.2MB&lt;br /&gt;
http://www.megaupload.com/?d=6E2KNR6P&lt;br /&gt;
--------------&lt;br /&gt;
Armadillo 6.40 (CopyMem 2 + Debug Blocker).rar 7.7MB&lt;br /&gt;
http://www.megaupload.com/?d=3GAKAL0F&lt;br /&gt;
--------------&lt;br /&gt;
Unpacking Armadillo 4.66 (Debug-Blocker).zip 12.4MB&lt;br /&gt;
http://www.megaupload.com/?d=WJNWDJBK&lt;br /&gt;
--------------&lt;br /&gt;
Unpacking Armadillo 4.66 (Standard).zip 10.16MB&lt;br /&gt;
http://www.megaupload.com/?d=HK4WZFP4&lt;br /&gt;
--------------&lt;br /&gt;
Unpacking Armadillo 4.xx (Standard with Trial Keys).zip 10.29MB&lt;br /&gt;
http://www.megaupload.com/?d=7IL608WC&lt;br /&gt;
--------------&lt;br /&gt;
Unpacking Armadillo 5.xx (Debug-Blocker + new Overlay signature).zip 9.36MB&lt;br /&gt;
http://www.megaupload.com/?d=A3YW8D0U&lt;br /&gt;
--------------&lt;br /&gt;
Unpacking Armadillo v6.xx Debug-Blocker+Nanomites - Pogo Games.zip 5.69MB&lt;br /&gt;
http://www.megaupload.com/?d=B7LS4K7L&lt;br /&gt;
--------------&lt;br /&gt;
Unpacking Armadillo v6.xx Standard - iWin Games.zip 5.74MB&lt;br /&gt;
http://www.megaupload.com/?d=KHI59WQD&lt;br /&gt;
--------------&lt;br /&gt;
Unpacking Armadillo v6.xx Standard - RegCompact.zip 4.98MB&lt;br /&gt;
http://www.megaupload.com/?d=XSAUXJ3F&lt;div class=&quot;blogger-post-footer&quot;&gt;http://feeds.feedburner.com/ReverseEngineeringBlog&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://reversingtools.blogspot.com/feeds/1511760364488131181/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://reversingtools.blogspot.com/2009/11/armadillo-v4x5x6x-unpacking-tuts.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/1511760364488131181'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/1511760364488131181'/><link rel='alternate' type='text/html' href='http://reversingtools.blogspot.com/2009/11/armadillo-v4x5x6x-unpacking-tuts.html' title='Armadillo v4x/5x/6x Unpacking Tuts'/><author><name>Desi Master</name><uri>http://www.blogger.com/profile/04598065953640802276</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6699219850474086254.post-3683929118090791121</id><published>2009-11-07T04:52:00.000-08:00</published><updated>2009-11-07T04:52:20.832-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="OllyDBG Plugins/Scripts"/><title type='text'>Ollydbg 60 Plugins Latest - 07-11-2009</title><content type='html'>Download: 5.4MB&lt;br /&gt;
http://www.megaupload.com/?d=I6WMI0DW&lt;div class=&quot;blogger-post-footer&quot;&gt;http://feeds.feedburner.com/ReverseEngineeringBlog&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://reversingtools.blogspot.com/feeds/3683929118090791121/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://reversingtools.blogspot.com/2009/11/ollydbg-60-plugins-latest-07-11-2009.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/3683929118090791121'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/3683929118090791121'/><link rel='alternate' type='text/html' href='http://reversingtools.blogspot.com/2009/11/ollydbg-60-plugins-latest-07-11-2009.html' title='Ollydbg 60 Plugins Latest - 07-11-2009'/><author><name>Desi Master</name><uri>http://www.blogger.com/profile/04598065953640802276</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6699219850474086254.post-6434002164034673981</id><published>2009-11-07T04:44:00.001-08:00</published><updated>2009-11-07T04:44:36.488-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="OllyDBG Plugins/Scripts"/><title type='text'>Ollydbg 867 Scripts Pack - 2008-05-17</title><content type='html'>Download: 1.15MB&lt;br /&gt;
http://www.megaupload.com/?d=JYLSNOJE&lt;div class=&quot;blogger-post-footer&quot;&gt;http://feeds.feedburner.com/ReverseEngineeringBlog&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://reversingtools.blogspot.com/feeds/6434002164034673981/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://reversingtools.blogspot.com/2009/11/ollydbg-867-scripts-pack-2008-05-17.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/6434002164034673981'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/6434002164034673981'/><link rel='alternate' type='text/html' href='http://reversingtools.blogspot.com/2009/11/ollydbg-867-scripts-pack-2008-05-17.html' title='Ollydbg 867 Scripts Pack - 2008-05-17'/><author><name>Desi Master</name><uri>http://www.blogger.com/profile/04598065953640802276</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6699219850474086254.post-8447726363847105308</id><published>2009-11-07T04:40:00.000-08:00</published><updated>2009-11-07T04:40:24.950-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="OllyDBG Plugins/Scripts"/><title type='text'>All 959 Scripts by LCF-AT</title><content type='html'>Download: 845KB&lt;br /&gt;
http://www.megaupload.com/?d=4ZZF3UIW&lt;div class=&quot;blogger-post-footer&quot;&gt;http://feeds.feedburner.com/ReverseEngineeringBlog&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://reversingtools.blogspot.com/feeds/8447726363847105308/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://reversingtools.blogspot.com/2009/11/all-959-scripts-by-lcf-at.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/8447726363847105308'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/8447726363847105308'/><link rel='alternate' type='text/html' href='http://reversingtools.blogspot.com/2009/11/all-959-scripts-by-lcf-at.html' title='All 959 Scripts by LCF-AT'/><author><name>Desi Master</name><uri>http://www.blogger.com/profile/04598065953640802276</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6699219850474086254.post-4674559354362832529</id><published>2009-11-07T04:38:00.001-08:00</published><updated>2009-11-07T04:38:06.192-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="OllyDBG Plugins/Scripts"/><title type='text'>Olly Script Editor v2.0</title><content type='html'>Download:&lt;br /&gt;
http://www.megaupload.com/?d=8S3B67BZ&lt;div class=&quot;blogger-post-footer&quot;&gt;http://feeds.feedburner.com/ReverseEngineeringBlog&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://reversingtools.blogspot.com/feeds/4674559354362832529/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://reversingtools.blogspot.com/2009/11/olly-script-editor-v20.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/4674559354362832529'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6699219850474086254/posts/default/4674559354362832529'/><link rel='alternate' type='text/html' href='http://reversingtools.blogspot.com/2009/11/olly-script-editor-v20.html' title='Olly Script Editor v2.0'/><author><name>Desi Master</name><uri>http://www.blogger.com/profile/04598065953640802276</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>