首页
社区
课程
招聘
[转帖] Obsidium Olly Scripts By CodeExplorer
发表于: 2019-4-11 07:25 2662

[转帖] Obsidium Olly Scripts By CodeExplorer

2019-4-11 07:25
2662

Obsidium Olly Scripts

ByCodeExplorer

From:_148K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6X3L8%4u0#2L8g2)9J5k6i4c8#2N6s2x3@1P5h3!0#2i4K6u0W2j5$3!0E0i4K6u0r3N6r3!0H3K9h3y4Q4x3V1j5@1x3e0t1I4x3g2)9J5k6r3!0T1M7$3W2V1K9i4g2E0i4K6u0V1L8$3I4D9P5g2)9J5k6s2y4U0M7X3W2H3N6s2y4Q4x3V1j5`.

First load victim on Olly and execute the ObsidiumOEP.txt script; this will lead to near OEP;
Stolen bytes analyses are inside Obsidium Unpacking (Stolen Code).txt tutorial;
after you get the stolen bytes which have to placed before near entry point.
Finally load ObsidiumIAT.txt script to resolve import table.

Attached a fixed version of IAT fixer (now also backup/restore ESP register).


[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课

上传的附件:
收藏
免费 1
支持
分享
最新回复 (0)
游客
登录 | 注册 方可回帖
返回