-
-
[转帖] Obsidium Olly Scripts By CodeExplorer
-
发表于: 2019-4-11 07:25 2662
-
Obsidium Olly Scripts
ByCodeExplorer
From:_148K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6X3L8%4u0#2L8g2)9J5k6i4c8#2N6s2x3@1P5h3!0#2i4K6u0W2j5$3!0E0i4K6u0r3N6r3!0H3K9h3y4Q4x3V1j5@1x3e0t1I4x3g2)9J5k6r3!0T1M7$3W2V1K9i4g2E0i4K6u0V1L8$3I4D9P5g2)9J5k6s2y4U0M7X3W2H3N6s2y4Q4x3V1j5`.
First load victim on Olly and execute the ObsidiumOEP.txt script; this will lead to near OEP;
Stolen bytes analyses are inside Obsidium Unpacking (Stolen Code).txt tutorial;
after you get the stolen bytes which have to placed before near entry point.
Finally load ObsidiumIAT.txt script to resolve import table.
Attached a fixed version of IAT fixer (now also backup/restore ESP register).
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课
赞赏
他的文章
赞赏
雪币:
留言: