52ky 发表于 2021-8-13 10:07:53

Obsidium Olly Scripts By CodeExplorer

首先在 Olly 上加载受害者并执行 ObsidiumOEP.txt 脚本; 这将导致接近 OEP;
被盗字节分析在 Obsidium Unpacking (Stolen Code).txt 教程中;
在获得必须放置在入口点附近的被盗字节之后。
最后加载 ObsidiumIAT.txt 脚本来解析导入表。


附加了一个固定版本的 IAT fixer(现在也备份/恢复 ESP 寄存器)。

(First load victim on Olly and execute the ObsidiumOEP.txt script; this will lead to near OEP;Stolen bytes analyses are inside Obsidium Unpacking (Stolen Code).txt tutorial;after you get the stolen bytes which have to placed before near entry point.Finally load ObsidiumIAT.txt script to resolve import table.
Attached a fixed version of IAT fixer (now also backup/restore ESP register).)

页: [1]
查看完整版本: Obsidium Olly Scripts By CodeExplorer