Location:
Search - W32dasm
Search list
Description:
Platform: |
Size: 527697 |
Author: |
Hits:
Description: W32API函数说明-W32API function showed
Platform: |
Size: 527964 |
Author: 肖张 |
Hits:
Description: 反汇编32位intel机器指令的源代码,只写完了80386的指令,没有加入后续指令及浮点指令,不过源代码考虑了可扩展性,可以很容易加入其它指令.由于我还不了解64位的汇编指令,所以没考虑对64位的扩展.反汇编的结果经与W32DASM对比,发现了W32DASM的许多错误,如果发现我的源码译错了请email我(只限80386指令),我的email在源代码文件中-compilation of 32 anti-intel machinery orders source code, only 80,386 finished the instructions not to include follow-up instructions and floating-point instructions, but the source code to consider the scalability, it is very easy to join other directives. Since I do not yet know the compilation of 64 instructions, we had to consider the right 64 expansion. anti-compile the results contrast with the W32DASM found W32DASM many mistakes, I found the source code translation wrong Please email me (only 80,386 directive), I email the source document
Platform: |
Size: 12200 |
Author: 晓宁 |
Hits:
Description: 反汇编32位intel机器指令的源代码,只写完了80386的指令,没有加入后续指令及浮点指令,不过源代码考虑了可扩展性,可以很容易加入其它指令.由于我还不了解64位的汇编指令,所以没考虑对64位的扩展.反汇编的结果经与W32DASM对比,发现了W32DASM的许多错误,如果发现我的源码译错了请email我(只限80386指令),我的email在源代码文件中-compilation of 32 anti-intel machinery orders source code, only 80,386 finished the instructions not to include follow-up instructions and floating-point instructions, but the source code to consider the scalability, it is very easy to join other directives. Since I do not yet know the compilation of 64 instructions, we had to consider the right 64 expansion. anti-compile the results contrast with the W32DASM found W32DASM many mistakes, I found the source code translation wrong Please email me (only 80,386 directive), I email the source document
Platform: |
Size: 12781 |
Author: 晓宁 |
Hits:
Description: 反汇编32位intel机器指令的源代码,只写完了80386的指令,没有加入后续指令及浮点指令,不过源代码考虑了可扩展性,可以很容易加入其它指令.由于我还不了解64位的汇编指令,所以没考虑对64位的扩展.反汇编的结果经与W32DASM对比,发现了W32DASM的许多错误,如果发现我的源码译错了请email我(只限80386指令),我的email在源代码文件中-compilation of 32 anti-intel machinery orders source code, only 80,386 finished the instructions not to include follow-up instructions and floating-point instructions, but the source code to consider the scalability, it is very easy to join other directives. Since I do not yet know the compilation of 64 instructions, we had to consider the right 64 expansion. anti-compile the results contrast with the W32DASM found W32DASM many mistakes, I found the source code translation wrong Please email me (only 80,386 directive), I email the source document
Platform: |
Size: 12706 |
Author: 晓宁 |
Hits:
Description: 步骤一 查壳步骤二 脱壳步骤三 试运行程序 发现突破点步骤四 W32DASM 寻找突破点(可以跳过)步骤五 查询软件的编译类型步骤六 采用GetVBRes v0.51 对付VB程序步骤七 用W32Dasm载入修改后的文件步骤八 制作内存补丁 KeyMake v1.73-steps to check a shell two steps Shelling three steps trial operation procedures found breakthrough steps to find a breakthrough W32DASM four points (can skip) Step 5 inquiries software compiler used six types of steps to deal with VB GetVBRes v0.51 procedural steps included seven NodeManager Professional with the revised document produced eight steps memory patch KeyMake v1 .73
Platform: |
Size: 2226118 |
Author: 刘文剑 |
Hits:
Description: W32dasm破解的超详细图文教程
Platform: |
Size: 1383936 |
Author: youling9993 |
Hits:
Description: W32API函数说明-W32API function showed
Platform: |
Size: 527360 |
Author: 肖张 |
Hits:
Description: 步骤一 查壳步骤二 脱壳步骤三 试运行程序 发现突破点步骤四 W32DASM 寻找突破点(可以跳过)步骤五 查询软件的编译类型步骤六 采用GetVBRes v0.51 对付VB程序步骤七 用W32Dasm载入修改后的文件步骤八 制作内存补丁 KeyMake v1.73-steps to check a shell two steps Shelling three steps trial operation procedures found breakthrough steps to find a breakthrough W32DASM four points (can skip) Step 5 inquiries software compiler used six types of steps to deal with VB GetVBRes v0.51 procedural steps included seven NodeManager Professional with the revised document produced eight steps memory patch KeyMake v1 .73
Platform: |
Size: 2226176 |
Author: 刘文剑 |
Hits:
Description: 反汇编32位intel机器指令的源代码,只写完了80386的指令,没有加入后续指令及浮点指令,不过源代码考虑了可扩展性,可以很容易加入其它指令.由于我还不了解64位的汇编指令,所以没考虑对64位的扩展.反汇编的结果经与W32DASM对比,发现了W32DASM的许多错误,如果发现我的源码译错了请email我(只限80386指令),我的email在源代码文件中-compilation of 32 anti-intel machinery orders source code, only 80,386 finished the instructions not to include follow-up instructions and floating-point instructions, but the source code to consider the scalability, it is very easy to join other directives. Since I do not yet know the compilation of 64 instructions, we had to consider the right 64 expansion. anti-compile the results contrast with the W32DASM found W32DASM many mistakes, I found the source code translation wrong Please email me (only 80,386 directive), I email the source document
Platform: |
Size: 12288 |
Author: 晓宁 |
Hits:
Description: 反汇编32位intel机器指令的源代码,只写完了80386的指令,没有加入后续指令及浮点指令,不过源代码考虑了可扩展性,可以很容易加入其它指令.由于我还不了解64位的汇编指令,所以没考虑对64位的扩展.反汇编的结果经与W32DASM对比,发现了W32DASM的许多错误,如果发现我的源码译错了请email我(只限80386指令),我的email在源代码文件中-compilation of 32 anti-intel machinery orders source code, only 80,386 finished the instructions not to include follow-up instructions and floating-point instructions, but the source code to consider the scalability, it is very easy to join other directives. Since I do not yet know the compilation of 64 instructions, we had to consider the right 64 expansion. anti-compile the results contrast with the W32DASM found W32DASM many mistakes, I found the source code translation wrong Please email me (only 80,386 directive), I email the source document
Platform: |
Size: 12288 |
Author: 晓宁 |
Hits:
Description: 反汇编32位intel机器指令的源代码,只写完了80386的指令,没有加入后续指令及浮点指令,不过源代码考虑了可扩展性,可以很容易加入其它指令.由于我还不了解64位的汇编指令,所以没考虑对64位的扩展.反汇编的结果经与W32DASM对比,发现了W32DASM的许多错误,如果发现我的源码译错了请email我(只限80386指令),我的email在源代码文件中-compilation of 32 anti-intel machinery orders source code, only 80,386 finished the instructions not to include follow-up instructions and floating-point instructions, but the source code to consider the scalability, it is very easy to join other directives. Since I do not yet know the compilation of 64 instructions, we had to consider the right 64 expansion. anti-compile the results contrast with the W32DASM found W32DASM many mistakes, I found the source code translation wrong Please email me (only 80,386 directive), I email the source document
Platform: |
Size: 12288 |
Author: 晓宁 |
Hits:
Description: ASPack 2.12 汉化注册版
1.先解压Zip包,双击SAC.reg注册。
2.运行ASPack.exe
程序员必备压缩利器!用于压缩exe dll程序!
压缩比例大!出错少!把自己写出的程序打包,既方便自己,又方便使用者!
Platform: |
Size: 194560 |
Author: jiang |
Hits:
Description:
W32Dasm是一个强大的反汇编工具,操作简单,使用方便。通常被程序员使用,当然也可被用来Crack软件了,很适合Cracker使用。-W32Dasm is a powerful tool to disassemble, easy to operate and easy to use. Programmers often use, of course, can be used to Crack software, it is suitable for use Cracker.
Platform: |
Size: 287744 |
Author: shezhiqun |
Hits:
Description: 一个静态反汇编工具,也是破解人常用的工具之一-W32Dasm is a static disassembly tool, but also break one of the tools were used
Platform: |
Size: 434176 |
Author: 张生 |
Hits:
Description: 静态反汇编工具W32Dasm,反汇编工具-w32dasm
Platform: |
Size: 438272 |
Author: renjihe |
Hits:
Description: 反汇编 W32Dasm简单使用说明 以及相关的资源-Disassembly W32Dasm simple instructions and related resources
Platform: |
Size: 658432 |
Author: 陈伦广 |
Hits:
Description: 功能极为强大的可视化汉化集成工具,可直接浏览、修改软件资源,包括菜单、对话框、字符串表等; 另外,还具备有 W32DASM 软件的反编译能力和PEditor 软件的 PE 文件头编辑功能,可以更容易的分析源代码,修复损坏了的资源,可以处理 PE 格式的文件如:EXE、DLL、DRV、BPL、DPL、SYS、CPL、OCX、SCR 等 32 位可执行程序。-Extremely powerful integrated visual localization tool that can directly view, modify the software resources, including menus, dialog boxes, string tables, etc. In addition, it also has a W32DASM decompile the software capabilities and software of the PE file header PEditor editing can more easily analyze the source code, repair damaged resources, can handle the PE file format, such as: EXE, DLL, DRV, BPL, DPL, SYS, CPL, OCX, SCR and other 32-bit executable.
Platform: |
Size: 498688 |
Author: 梁生 |
Hits:
Description: Reverse Engineering Code with IDA Pro
IDA Pro 是一个世界顶级的交互式反汇编工具,它的使用者囊括了软件安全专家,军事工业,国家安全信息部门,逆向工程学者,黑客。从功能上它大大胜过了w32dasm。近来它的盗版已经在网上传播开了,你可以很轻松得到它。 -IDA is one of the most popular debugging tools for Windows. First, IDA Pro is a disassembler, in that it shows the assembly code of a binary. It also comes with advanced features that try to make understanding the assembly code as easy as possible. Second, it is also a debugger, in that it allows the user to step through the binary file to determine the actual instructions being executed, and the sequence in which the execution occurs. IDA Pro is widely used for malware analysis and software vulnerability research, among other purposes.
Platform: |
Size: 3752960 |
Author: huangkeqiang |
Hits:
Description: 一个能和dede W32Dasm keymake overlay importrec集合的一个汇编便利工具-A can and dede W32Dasm keymake overlay importrec convenient tool for the collection of a compilation
Platform: |
Size: 766976 |
Author: salte |
Hits: