Relyze Version 3.2.0 (29 April 2020)
Interactive Software Reverse Engineering
Relyze Desktop lets you reverse engineer, decompile and diff x86, x64, ARM32 and ARM64 software
_03cK9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2J5k6h3I4&6P5X3g2Q4x3X3g2U0L8$3#2Q4x3V1k6X3k6h3q4@1N6i4u0W2M7#2)9J5k6h3S2@1L8h3H3`.
Whats New
Version 3.2.0 (29 April 2020)
Bugfix/Analysis: Resolving PE imports from ordinal to the expected symbol may fail.
Bugfix/Analysis: Incorrect register sizes may be identified for memory operands during function data type analysis.
Bugfix/Analysis: Honor the analysis option 'Generate Data Types from Mangled Names' for TDS symbols.
Bugfix/Analysis: ASCII strings with a length less than a native pointer size may fail to be identified.
Bugfix/Analysis: For mangled function names with no explicit return type, use FDTA to discover potential return type.
Bugfix/Decompiler/TCG: Phi simplification to handle multiple dependent phi instructions.
Bugfix/Decompiler/TCG: Dead store elimination may eliminate an aliased store.
Bugfix/Decompiler/AST: AST can fail to emit expected anonymous member access.
_2d8K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2J5k6h3I4&6P5X3g2Q4x3X3g2U0L8$3#2Q4x3V1k6V1L8%4N6F1L8r3!0S2k6q4)9J5k6h3S2@1L8h3H3`.
_a69K9s2c8@1M7s2y4Q4x3@1q4Q4x3V1k6Q4x3V1k6%4N6%4N6Q4x3X3g2J5k6h3I4&6P5X3g2Q4x3X3g2U0L8$3#2Q4x3V1k6d9k6h3I4&6P5X3g2Q4y4h3k6p5k6i4y4C8N6r3!0H3i4K6g2X3x3#2)9#2k6U0u0Q4y4h3j5H3i4K6g2X3N6$3W2F1y4U0c8Q4x3X3g2W2P5r3f1`.
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课