OllyEye v0.1
Sometimes we want to find out where in a module the code parsing is done. In the example below, we want to find the code that parses the QuickTime video codecs that are in Windows media player. We know that the codecs support the raw, rle, jpeg, mjpb, and rpza tags, so all we need to do is to search for those tags in our module--in this case, the "quartz.dll" module. The OllyEye hunter knows tha..
Reversing tools/올리 플러그인
2009. 2. 15. 19:31
반응형
최근에 올라온 글
최근에 달린 댓글
- Total
- Today
- Yesterday
링크
TAG
- 리버스 엔지니어링
- Unpacker
- 한글화
- crack
- plugin
- 미친소 수입반대
- 리버싱은 내운명
- ProtectionID
- Themida
- TTprotect
- ollydbg PLUGIN
- Unpacking
- 미니 노트북
- ODbgScript
- StrongOD
- 패처
- Memory Hacking Software
- ollydbg mup
- OllyDbg Plugins
- DUP2
- vmprotect
- PECompact
- Reverse Engineering
- ASProtect 1.32 - 1.41
- OllyDbg
- exeinfo pe
- ollydbg ScriptEditor
- ollydbg scripts
- OllyScriptEditor
- 언패킹
일 | 월 | 화 | 수 | 목 | 금 | 토 |
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | |||
5 | 6 | 7 | 8 | 9 | 10 | 11 |
12 | 13 | 14 | 15 | 16 | 17 | 18 |
19 | 20 | 21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 | 31 |
글 보관함