Obsidium Olly Scripts By CodeExplorer
首先在 Olly 上加载受害者并执行 ObsidiumOEP.txt 脚本; 这将导致接近 OEP;被盗字节分析在 Obsidium Unpacking (Stolen Code).txt 教程中;
在获得必须放置在入口点附近的被盗字节之后。
最后加载 ObsidiumIAT.txt 脚本来解析导入表。
附加了一个固定版本的 IAT fixer(现在也备份/恢复 ESP 寄存器)。
(First load victim on Olly and execute the ObsidiumOEP.txt script; this will lead to near OEP;Stolen bytes analyses are inside Obsidium Unpacking (Stolen Code).txt tutorial;after you get the stolen bytes which have to placed before near entry point.Finally load ObsidiumIAT.txt script to resolve import table.
Attached a fixed version of IAT fixer (now also backup/restore ESP register).)
页:
[1]