Welcome![Sign In][Sign Up]
Location:
Search - IDB

Search list

[OtherIDA

Description: 刚接触逆向的,可能不知道静态脱壳是怎么回事,KANXUE建议我把文章发出来,带动一下学习气氛。。于是文章就发出来了。。 我的文章由于只是IDA教程,只是用IDC将加壳的PE文件在IDB文件上脱壳,并修复API符号,到能分析的程序,并没有修复成脱壳的PE文件。 另,我脱的是MSLRHv0.31a。比较简单的壳,适合初学者学习
Platform: | Size: 190761 | Author: guo | Hits:

[WEB Code论文

Description: apache.org/commons/fileupload/下载。由于本人...关键步骤中的相关 操作为: 1) 在init(),用实例变量....1\\db\\db.prp idb.maxconn=2 access. url=jdbc:... URL,而且访问该数据库要使用JDBC-ODBC驱动程序。... -apache.org / commons / fileupload / download. Because I ... key steps of operation : 1) in init (), using examples of variable .... 1 \\ db \\ = 2 db.prp idb.maxconn access. Url = jdbc : ... URL, but to visit the to use the database JDBC-ODBC driver.
Platform: | Size: 59016 | Author: 100 | Hits:

[Windows Developcodered2

Description: CodeRedII - Analysis.txt - eEye对 CodeRedII 病毒的分析 CodeRedII - Binary - CodeRedII 病毒的 Binary 二进制代码 CodeRedII - IDA File.idb - CodeRedII 病毒的IDA数据 CodeRedII Disassembly.txt - 文本格式的 CodeRedII 病毒IDA数据 Explorer.exe Disassembly.txt - 文本格式的 Explorer.exe IDA数据 Explorer.exe IDA File.idb - Explorer.exe 的IDA数据
Platform: | Size: 77296 | Author: xiongjun | Hits:

[Windows Developjiqigou

Description: 机器狗病毒的完全逆向分析,以及提供sys.idb
Platform: | Size: 690388 | Author: fengyuntao | Hits:

[Documents论文

Description: apache.org/commons/fileupload/下载。由于本人...关键步骤中的相关 操作为: 1) 在init(),用实例变量....1\db\db.prp idb.maxconn=2 access. url=jdbc:... URL,而且访问该数据库要使用JDBC-ODBC驱动程序。... -apache.org/commons/fileupload/download. Because I ... key steps of operation : 1) in init (), using examples of variable .... 1 \ db \ = 2 db.prp idb.maxconn access. Url = jdbc : ... URL, but to visit the to use the database JDBC-ODBC driver.
Platform: | Size: 58368 | Author: | Hits:

[OtherIDA

Description: 刚接触逆向的,可能不知道静态脱壳是怎么回事,KANXUE建议我把文章发出来,带动一下学习气氛。。于是文章就发出来了。。 我的文章由于只是IDA教程,只是用IDC将加壳的PE文件在IDB文件上脱壳,并修复API符号,到能分析的程序,并没有修复成脱壳的PE文件。 另,我脱的是MSLRHv0.31a。比较简单的壳,适合初学者学习
Platform: | Size: 190464 | Author: guo | Hits:

[Windows Developcodered2

Description: CodeRedII - Analysis.txt - eEye对 CodeRedII 病毒的分析 CodeRedII - Binary - CodeRedII 病毒的 Binary 二进制代码 CodeRedII - IDA File.idb - CodeRedII 病毒的IDA数据 CodeRedII Disassembly.txt - 文本格式的 CodeRedII 病毒IDA数据 Explorer.exe Disassembly.txt - 文本格式的 Explorer.exe IDA数据 Explorer.exe IDA File.idb - Explorer.exe 的IDA数据-CodeRedII- Analysis.txt- eEye on CodeRedII analysis of virus CodeRedII- Binary- CodeRedII virus Binary binary code CodeRedII- IDA File.idb- CodeRedII virus IDA data CodeRedII Disassembly.txt- text format CodeRedII virus IDA data Explorer.exe Disassembly . txt- text format Explorer.exe IDA data Explorer.exe IDA File.idb- Explorer.exe the IDA data
Platform: | Size: 76800 | Author: xiongjun | Hits:

[Windows Developjiqigou

Description: 机器狗病毒的完全逆向分析,以及提供sys.idb-Dog virus completely reverse analysis, as well as the provision sys.idb
Platform: | Size: 690176 | Author: fengyuntao | Hits:

[Driver DevelopVCdRom

Description: 微软开发 虚拟光驱。我自己逆向的idb-Microsoft Virtual CD-ROM development. I reverse the IDB
Platform: | Size: 70656 | Author: huaxinsoftware | Hits:

[Driver DevelopILDriver

Description: IceLight逆向出来的源代码。 有idb文件和c文件-IceLight reverse out of the source code. There are documents and c IDB document
Platform: | Size: 270336 | Author: love | Hits:

[Special EffectsIDB

Description: 这是图像恢复中的盲反卷积迭代算法的matlab的源程序,对于学习数字图像有很大的好处!-This is image restoration in the Iterative Blind Deconvolution algorithm matlab source for the study of digital image has a lot of benefits!
Platform: | Size: 2048 | Author: 张磊 | Hits:

[ActiveX/DCOM/ATLComputerOrganizationandStructure

Description: 研制一台性能如下的实验计算机: (1) 能使用键盘和打印机两种外设 (2) 运算器采用单累加器多寄存器结构。 (3) 能实现PC相对寻址和变址器变址寻址这两种操作寻址方式,指令系统中有相应的指令。 如: SJMP rel (PC) + rel -> PC LD A,addr[Rx] (addr + (Rx)) -> A 提示:需要自己设置IAB到IDB的数据缓冲通路 (4) 指令系统中有子程序调用指令(CALL addr)和子程序返回指令(RET). 提示:需要自己设置堆栈。 (5) 能执行将键入的四个以上两位十进制数排序后打印出来(程序自编)。-Development of the performance of a computer experiment is as follows: (1) keyboard and printer can use two types of peripherals (2) computing devices more than a single accumulator register structure. (3) to achieve PC relative addressing and indexing device addressing addressing these two operations, a corresponding instruction in the instruction. Such as: SJMP rel (PC)+ rel-> PC LD A, addr [Rx] (addr+ (Rx))-> A Tip: IAB needs its own set of data to the buffer IDB pathway (4) instruction in subroutine call instructions (CALL addr) and the subroutine return instruction (RET). NOTE: need to set up their own stack. (5) will be able to perform more than four typed a decimal number two ranking after the print out (own procedures). Such as: 66 71 85 99
Platform: | Size: 226304 | Author: 穆鹏 | Hits:

[Windows DevelopCLEAR-IDB

Description: 擦除IDB的小工具,用于安卓固件刷机失败后的恢复,也可单独测试其固件其他文件。-IDB erase a small tool for Andrew after the failure of flashing the firmware recovery, the firmware can also be individually tested for other documents.
Platform: | Size: 268288 | Author: 御酒探花 | Hits:

[Windows Developjulia_src

Description: Fractal Julia julia\Debug\julia.exe .....\.....\julia.ilk .....\.....\julia.pdb .....\julia\Debug\BuildLog.htm .....\.....\.....\julia.exe.intermediate.manifest .....\.....\.....\julia.obj .....\.....\.....\mt.dep .....\.....\.....\vc90.idb .....\.....\.....\vc90.pdb .....\.....\julia.bmp .....\.....\julia.cpp .....\.....\julia.vcproj .....\.....\julia.vcproj.DUC.DUc.user .....\julia.ncb .....\julia.sln .....\julia.suo .....\.....\Debug .....\Debug-Fractal Julia julia\Debug\julia.exe .....\.....\julia.ilk .....\.....\julia.pdb .....\julia\Debug\BuildLog.htm .....\.....\.....\julia.exe.intermediate.manifest .....\.....\.....\julia.obj .....\.....\.....\mt.dep .....\.....\.....\vc90.idb .....\.....\.....\vc90.pdb .....\.....\julia.bmp .....\.....\julia.cpp .....\.....\julia.vcproj .....\.....\julia.vcproj.DUC.DUc.user .....\julia.ncb .....\julia.sln .....\julia.suo .....\.....\Debug .....\Debug
Platform: | Size: 22528 | Author: Sergey | Hits:

[Crack Hack3DES_Encryption_Decryption

Description: 三重DES加密解密算法 可以实现3轮加密或者16轮加密的自由选择 并通过加密进行密文测试-DES\Debug\DES.exe ...\.....\DES.ilk ...\.....\DES.obj ...\.....\DES.pch ...\.....\DES.pdb ...\.....\DES.res ...\.....\DESDlg.obj ...\.....\StdAfx.obj ...\.....\vc60.idb ...\.....\vc60.pdb ...\.....\Welcome.obj
Platform: | Size: 3628032 | Author: 缪超 | Hits:

[Otherlolhao

Description: 青鸟是增删改查总结c++编写-This file contains a summary of what you will find in each of the files that make up your KillVir application.-KillVir .......\CKillVir.h .......\Debug .......\.....\BuildLog.htm .......\.....\KillVir.exe .......\.....\KillVir.exe.embed.manifest .......\.....\KillVir.exe.embed.manifest.res .......\.....\KillVir.exe.intermediate.manifest .......\.....\KillVir.ilk .......\.....\KillVir.obj .......\.....\KillVir.pdb .......\.....\mt.dep .......\.....\vc80.idb .......\.....\vc80.pdb .......\KillVir.cpp .......\KillVir.dsp .......\KillVir.dsw .......\KillVir.ncb .......\KillVir.opt .......\KillVir.plg .......\KillVir.sln .......\KillVir.vcproj .......\ReadMe.txt .......\StdAfx.cpp .......\StdAfx.h
Platform: | Size: 64512 | Author: 跃uyang | Hits:

[Linux-UnixIDBDatabaseRequest

Description: IDB Database Request Source Code for Linux.
Platform: | Size: 1024 | Author: jenwunhin | Hits:

[Special EffectsImage_package_builder_Quinn

Description: 用Cognex把一个文件夹里的图像打包成idb文件。安装了VisionPro就可以用。-To build up a package for images in one folder.
Platform: | Size: 490496 | Author: 邱自成 | Hits:

[Linux-Unixdll.idb

Description: 很好的培训资料,很具有学习参考价值-it is good material that it is valuable for us to
Platform: | Size: 499712 | Author: 蒋喜龙 | Hits:

[Windows DevelopKrypton_2012_Hex-Rays_Contest

Description: Krypton is an IDA Plugin that assists one in reverse engineering x86 binary executables, by executing a function IDB (IDA database) using IDA s powerful Appcall feature. krypton takes xrefs a given function (say a possible decoder) to find all function calls to it and then parses and finds the parameters use (including prototype, no of arguments, and the arguments themselves) instructions and uses them to the function using Appcall, this is most useful in analyzing a malware binary with encryption.-Krypton is an IDA Plugin that assists one in reverse engineering x86 binary executables, by executing a function IDB (IDA database) using IDA s powerful Appcall feature. krypton takes xrefs a given function (say a possible decoder) to find all function calls to it and then parses and finds the parameters use (including prototype, no of arguments, and the arguments themselves) instructions and uses them to the function using Appcall, this is most useful in analyzing a malware binary with encryption.
Platform: | Size: 502784 | Author: Srinivas | Hits:
« 12 »

CodeBus www.codebus.net