Location:
Search - IDB
Search list
Description: 刚接触逆向的,可能不知道静态脱壳是怎么回事,KANXUE建议我把文章发出来,带动一下学习气氛。。于是文章就发出来了。。
我的文章由于只是IDA教程,只是用IDC将加壳的PE文件在IDB文件上脱壳,并修复API符号,到能分析的程序,并没有修复成脱壳的PE文件。
另,我脱的是MSLRHv0.31a。比较简单的壳,适合初学者学习
Platform: |
Size: 190761 |
Author: guo |
Hits:
Description: apache.org/commons/fileupload/下载。由于本人...关键步骤中的相关 操作为: 1) 在init(),用实例变量....1\\db\\db.prp idb.maxconn=2 access. url=jdbc:... URL,而且访问该数据库要使用JDBC-ODBC驱动程序。... -apache.org / commons / fileupload / download. Because I ... key steps of operation : 1) in init (), using examples of variable .... 1 \\ db \\ = 2 db.prp idb.maxconn access. Url = jdbc : ... URL, but to visit the to use the database JDBC-ODBC driver.
Platform: |
Size: 59016 |
Author: 100 |
Hits:
Description: CodeRedII - Analysis.txt - eEye对 CodeRedII 病毒的分析
CodeRedII - Binary - CodeRedII 病毒的 Binary 二进制代码
CodeRedII - IDA File.idb - CodeRedII 病毒的IDA数据
CodeRedII Disassembly.txt - 文本格式的 CodeRedII 病毒IDA数据
Explorer.exe Disassembly.txt - 文本格式的 Explorer.exe IDA数据
Explorer.exe IDA File.idb - Explorer.exe 的IDA数据
Platform: |
Size: 77296 |
Author: xiongjun |
Hits:
Description: 机器狗病毒的完全逆向分析,以及提供sys.idb
Platform: |
Size: 690388 |
Author: fengyuntao |
Hits:
Description: apache.org/commons/fileupload/下载。由于本人...关键步骤中的相关 操作为: 1) 在init(),用实例变量....1\db\db.prp idb.maxconn=2 access. url=jdbc:... URL,而且访问该数据库要使用JDBC-ODBC驱动程序。... -apache.org/commons/fileupload/download. Because I ... key steps of operation : 1) in init (), using examples of variable .... 1 \ db \ = 2 db.prp idb.maxconn access. Url = jdbc : ... URL, but to visit the to use the database JDBC-ODBC driver.
Platform: |
Size: 58368 |
Author: |
Hits:
Description: 刚接触逆向的,可能不知道静态脱壳是怎么回事,KANXUE建议我把文章发出来,带动一下学习气氛。。于是文章就发出来了。。
我的文章由于只是IDA教程,只是用IDC将加壳的PE文件在IDB文件上脱壳,并修复API符号,到能分析的程序,并没有修复成脱壳的PE文件。
另,我脱的是MSLRHv0.31a。比较简单的壳,适合初学者学习
Platform: |
Size: 190464 |
Author: guo |
Hits:
Description: CodeRedII - Analysis.txt - eEye对 CodeRedII 病毒的分析
CodeRedII - Binary - CodeRedII 病毒的 Binary 二进制代码
CodeRedII - IDA File.idb - CodeRedII 病毒的IDA数据
CodeRedII Disassembly.txt - 文本格式的 CodeRedII 病毒IDA数据
Explorer.exe Disassembly.txt - 文本格式的 Explorer.exe IDA数据
Explorer.exe IDA File.idb - Explorer.exe 的IDA数据-CodeRedII- Analysis.txt- eEye on CodeRedII analysis of virus CodeRedII- Binary- CodeRedII virus Binary binary code CodeRedII- IDA File.idb- CodeRedII virus IDA data CodeRedII Disassembly.txt- text format CodeRedII virus IDA data Explorer.exe Disassembly . txt- text format Explorer.exe IDA data Explorer.exe IDA File.idb- Explorer.exe the IDA data
Platform: |
Size: 76800 |
Author: xiongjun |
Hits:
Description: 机器狗病毒的完全逆向分析,以及提供sys.idb-Dog virus completely reverse analysis, as well as the provision sys.idb
Platform: |
Size: 690176 |
Author: fengyuntao |
Hits:
Description: 微软开发 虚拟光驱。我自己逆向的idb-Microsoft Virtual CD-ROM development. I reverse the IDB
Platform: |
Size: 70656 |
Author: huaxinsoftware |
Hits:
Description: IceLight逆向出来的源代码。
有idb文件和c文件-IceLight reverse out of the source code. There are documents and c IDB document
Platform: |
Size: 270336 |
Author: love |
Hits:
Description: 这是图像恢复中的盲反卷积迭代算法的matlab的源程序,对于学习数字图像有很大的好处!-This is image restoration in the Iterative Blind Deconvolution algorithm matlab source for the study of digital image has a lot of benefits!
Platform: |
Size: 2048 |
Author: 张磊 |
Hits:
Description:
研制一台性能如下的实验计算机:
(1) 能使用键盘和打印机两种外设
(2) 运算器采用单累加器多寄存器结构。
(3) 能实现PC相对寻址和变址器变址寻址这两种操作寻址方式,指令系统中有相应的指令。
如: SJMP rel (PC) + rel -> PC
LD A,addr[Rx] (addr + (Rx)) -> A
提示:需要自己设置IAB到IDB的数据缓冲通路
(4) 指令系统中有子程序调用指令(CALL addr)和子程序返回指令(RET).
提示:需要自己设置堆栈。
(5) 能执行将键入的四个以上两位十进制数排序后打印出来(程序自编)。-Development of the performance of a computer experiment is as follows: (1) keyboard and printer can use two types of peripherals (2) computing devices more than a single accumulator register structure. (3) to achieve PC relative addressing and indexing device addressing addressing these two operations, a corresponding instruction in the instruction. Such as: SJMP rel (PC)+ rel-> PC LD A, addr [Rx] (addr+ (Rx))-> A Tip: IAB needs its own set of data to the buffer IDB pathway (4) instruction in subroutine call instructions (CALL addr) and the subroutine return instruction (RET). NOTE: need to set up their own stack. (5) will be able to perform more than four typed a decimal number two ranking after the print out (own procedures). Such as: 66 71 85 99
Platform: |
Size: 226304 |
Author: 穆鹏 |
Hits:
Description: 擦除IDB的小工具,用于安卓固件刷机失败后的恢复,也可单独测试其固件其他文件。-IDB erase a small tool for Andrew after the failure of flashing the firmware recovery, the firmware can also be individually tested for other documents.
Platform: |
Size: 268288 |
Author: 御酒探花 |
Hits:
Description: Fractal Julia
julia\Debug\julia.exe
.....\.....\julia.ilk
.....\.....\julia.pdb
.....\julia\Debug\BuildLog.htm
.....\.....\.....\julia.exe.intermediate.manifest
.....\.....\.....\julia.obj
.....\.....\.....\mt.dep
.....\.....\.....\vc90.idb
.....\.....\.....\vc90.pdb
.....\.....\julia.bmp
.....\.....\julia.cpp
.....\.....\julia.vcproj
.....\.....\julia.vcproj.DUC.DUc.user
.....\julia.ncb
.....\julia.sln
.....\julia.suo
.....\.....\Debug
.....\Debug-Fractal Julia
julia\Debug\julia.exe
.....\.....\julia.ilk
.....\.....\julia.pdb
.....\julia\Debug\BuildLog.htm
.....\.....\.....\julia.exe.intermediate.manifest
.....\.....\.....\julia.obj
.....\.....\.....\mt.dep
.....\.....\.....\vc90.idb
.....\.....\.....\vc90.pdb
.....\.....\julia.bmp
.....\.....\julia.cpp
.....\.....\julia.vcproj
.....\.....\julia.vcproj.DUC.DUc.user
.....\julia.ncb
.....\julia.sln
.....\julia.suo
.....\.....\Debug
.....\Debug
Platform: |
Size: 22528 |
Author: Sergey |
Hits:
Description: 三重DES加密解密算法 可以实现3轮加密或者16轮加密的自由选择 并通过加密进行密文测试-DES\Debug\DES.exe
...\.....\DES.ilk
...\.....\DES.obj
...\.....\DES.pch
...\.....\DES.pdb
...\.....\DES.res
...\.....\DESDlg.obj
...\.....\StdAfx.obj
...\.....\vc60.idb
...\.....\vc60.pdb
...\.....\Welcome.obj
Platform: |
Size: 3628032 |
Author: 缪超 |
Hits:
Description: 青鸟是增删改查总结c++编写-This file contains a summary of what you will find in each of the files that make up your KillVir application.-KillVir
.......\CKillVir.h
.......\Debug
.......\.....\BuildLog.htm
.......\.....\KillVir.exe
.......\.....\KillVir.exe.embed.manifest
.......\.....\KillVir.exe.embed.manifest.res
.......\.....\KillVir.exe.intermediate.manifest
.......\.....\KillVir.ilk
.......\.....\KillVir.obj
.......\.....\KillVir.pdb
.......\.....\mt.dep
.......\.....\vc80.idb
.......\.....\vc80.pdb
.......\KillVir.cpp
.......\KillVir.dsp
.......\KillVir.dsw
.......\KillVir.ncb
.......\KillVir.opt
.......\KillVir.plg
.......\KillVir.sln
.......\KillVir.vcproj
.......\ReadMe.txt
.......\StdAfx.cpp
.......\StdAfx.h
Platform: |
Size: 64512 |
Author: 跃uyang |
Hits:
Description: IDB Database Request Source Code for Linux.
Platform: |
Size: 1024 |
Author: jenwunhin |
Hits:
Description: 用Cognex把一个文件夹里的图像打包成idb文件。安装了VisionPro就可以用。-To build up a package for images in one folder.
Platform: |
Size: 490496 |
Author: 邱自成 |
Hits:
Description: 很好的培训资料,很具有学习参考价值-it is good material that it is valuable for us to
Platform: |
Size: 499712 |
Author: 蒋喜龙 |
Hits:
Description: Krypton is an IDA Plugin that assists one in reverse engineering x86 binary executables, by executing a function IDB (IDA
database) using IDA s powerful Appcall feature.
krypton takes xrefs a given function (say a possible decoder) to find all function calls to it and then parses and finds the
parameters use (including prototype, no of arguments, and the arguments themselves) instructions and uses them to
the function using Appcall, this is most useful in analyzing a malware binary with encryption.-Krypton is an IDA Plugin that assists one in reverse engineering x86 binary executables, by executing a function IDB (IDA
database) using IDA s powerful Appcall feature.
krypton takes xrefs a given function (say a possible decoder) to find all function calls to it and then parses and finds the
parameters use (including prototype, no of arguments, and the arguments themselves) instructions and uses them to
the function using Appcall, this is most useful in analyzing a malware binary with encryption.
Platform: |
Size: 502784 |
Author: Srinivas |
Hits: