Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - OEP
Search - OEP - List
破解相关的内容,非常适合初学破解的朋友,希望大家喜欢-crack-related content, very suitable for beginners decipher friend, hope you like
Update : 2008-10-13 Size : 5.54kb Publisher : 张扬

OEP是每个PE文件读取时的起始地址,该程序给出两种方法来读取OEP,一种是直接从PE文件读取;另一种是将PE映射到内存中来读取。-OEP each PE file read at the opening address, the program gives two ways to read OEP. A PE is directly from the document read. Another is to PE Maps memory to read.
Update : 2008-10-13 Size : 32.12kb Publisher : byron

这些天新壳大爆发啊,我也来凑个热闹。 又是一个自娱自乐的产物,和netsowell发布过源码的那个不一样,这个壳90%的代码是用delphi写成的。 仅在win2k+sp4上测试过,不支持9x系统。因为用了一个可能不安全的隐藏oep的方法,xp系统上有可能会出问题。 没花,没anti代码,适合初学者了解壳。 现在只能压缩exe文件。 压缩包里含源码,算是为这里的delphi初学者的小礼物。
Update : 2008-10-13 Size : 273.34kb Publisher : guo

加壳软件,自己练习用的!功能有使用次数和时间限制!没有进行区段合并!对OEP进行了加密处理!
Update : 2008-10-13 Size : 239.98kb Publisher : lee

DL : 0
基于visual c++的 可以获取pe文件的oep,即每个exe或dll文件加载的起始地址。
Update : 2008-10-13 Size : 31.74kb Publisher : 李乐

冲击波2000 源码 D.boy 感谢D.boy无私奉献源码!极酷的查找OEP工具。 -source D.boy thank D.boy selfless dedication source! Very cool OEP search tools.
Update : 2008-10-13 Size : 56.01kb Publisher : waterwhu

冲击波2000 源码 D.boy 感谢D.boy无私奉献源码!极酷的查找OEP工具。 -source D.boy thank D.boy selfless dedication source! Very cool OEP search tools.
Update : 2025-02-17 Size : 56kb Publisher : waterwhu

破解相关的内容,非常适合初学破解的朋友,希望大家喜欢-crack-related content, very suitable for beginners decipher friend, hope you like
Update : 2025-02-17 Size : 5kb Publisher : 张扬

OEP是每个PE文件读取时的起始地址,该程序给出两种方法来读取OEP,一种是直接从PE文件读取;另一种是将PE映射到内存中来读取。-OEP each PE file read at the opening address, the program gives two ways to read OEP. A PE is directly from the document read. Another is to PE Maps memory to read.
Update : 2025-02-17 Size : 32kb Publisher : byron

这些天新壳大爆发啊,我也来凑个热闹。 又是一个自娱自乐的产物,和netsowell发布过源码的那个不一样,这个壳90%的代码是用delphi写成的。 仅在win2k+sp4上测试过,不支持9x系统。因为用了一个可能不安全的隐藏oep的方法,xp系统上有可能会出问题。 没花,没anti代码,适合初学者了解壳。 现在只能压缩exe文件。 压缩包里含源码,算是为这里的delphi初学者的小礼物。-These days the new shell explosion ah, I have to凑个热闹. Is also a fun product, and issued a netsowell source that are not the same, 90 percent of the shell code is written in delphi. Only in win2k+ Sp4 test before, do not support 9x systems. As may be unsafe to use a hidden OEP method, xp system may have problems. No flower, no anti code, suitable for beginners to understand the shell. Now only compressed exe file. Compression bag containing source code, for here is a small gift delphi beginners.
Update : 2025-02-17 Size : 273kb Publisher : guo

加壳软件,自己练习用的!功能有使用次数和时间限制!没有进行区段合并!对OEP进行了加密处理!-加壳software, used to practice their own! Function using frequency and time constraints! No merger section! Of OEP is encrypted to deal with!
Update : 2025-02-17 Size : 240kb Publisher :

DL : 0
基于visual c++的 可以获取pe文件的oep,即每个exe或dll文件加载的起始地址。-Based on visual c++ Can obtain pe documents oep, that is, each exe or dll file to load the starting address.
Update : 2025-02-17 Size : 31kb Publisher : 李乐

ExetCryptor Unpacker
Update : 2025-02-17 Size : 5kb Publisher : v01d

DL : 0
读取各种类型文件的oep码,可以用来对文件进行修改判断-Read various types of documents OEP code, can be used to modify the document to determine
Update : 2025-02-17 Size : 9kb Publisher : roody

DL : 0
读取PE文件OEP值,带源码,VC++编写-Read the Address Entry Point of PE File
Update : 2025-02-17 Size : 32kb Publisher : beggar

DL : 0
Delphi程序脱TMD修复OEP,脱壳脚本-Delphi program off TMD repair OEP, shelling the script
Update : 2025-02-17 Size : 7kb Publisher : 刘雪梅

分析可执行文件的入口代码,识别感染文件,计算原OEP并修复,删除病毒节-Analysis of the executable file OEP code, identifying infected files, calculate the original OEP and repair, remove virus Section..
Update : 2025-02-17 Size : 51kb Publisher : 木木

UPXupack 程序执行文件pe头检测,判断upx特征码,由此在(oep)程序入口点,savedump-UPXupack pe first test program execution files, judge upx signature, resulting in the (oep) program entry point, savedump
Update : 2025-02-17 Size : 183kb Publisher : naiooit

OEP感染注入呢,最主要我们要了解OEP的概念。OEP就是程序的入口,比如我们编写一个DLL,那么OEP就相当于DllMain,如果编写一个EXE,那么OEP就相当于main或者WinMain。当windows把一个pe文件装载完成之后,就会直接执行OEP入口,即:AddressOfEntryPoint。我们学过PE知识得知,AddressOfEntryPoint是在IMAGE_OPTIONAL_HEADER32 结构的定义里面。-OEP infection injection, the main we need to understand the concept of the OEP. OEP is the entrance to the program, for example, we write a DLL, so OEP is equivalent to DllMain, if write an EXE, then OEP is equivalent to the main or WinMain. When the Windows a PE file loading is completed, will be directly executed OEP entrance, namely: AddressOfEntryPoint. We learned knowledge, PE AddressOfEntryPoint is inside the IMAGE_OPTIONAL_HEADER32 structure definition.
Update : 2025-02-17 Size : 169kb Publisher : mrbang

DL : 0
change the OEP of an executable file
Update : 2021-05-01 Size : 1011byte Publisher : temp550055
« 12 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.