找回密码
 立即注册
ReflectorthedoubleWindows | 程序非源代码 2021-06-25 408 0star收藏 版权: . 保留作者信息 . 禁止商业使用 . 禁止修改作品

1 - 面向逆向工程,这意味着只记录重要事件
2 - 比以前快得多
3 - 更丰富的数据输出
4 - 隐藏在常见的保护技术之外
5 - 最后,您可以双击任何方法,您将被驱动到 Reflector 以查看代码
6 - 我以后可能会添加插件支持
7 - 您可以在运行时打开/关闭跟踪,直到您打开注册窗口
8 - 您可以将结果保存到 Microsoft excel *.xls 文件以便以后更好地分析
9 - 在 Windows 资源管理器中双击橙色行将被带到加载的模块位置
10 - 双击“父类”以进入调用反射器中方法的类
11 - 双击蓝色行进入反射器中调用的方法
12 - 虚拟机兼容
13 - 由于 UAC,可能需要在 Windows Vista 及更高版本上进行某些设置
* 反射器支持仍然有问题,但这不是我的错
** 确保在使用双击功能之前在 Reflector 中加载了所需的程序集
*** 感谢 whoknows 和 0xd4d 的测试和错误报告


(1 - Reverse engineering oriented which means that only important events will be logged
2 - much faster than before
3 - Richer data output
4 - well-hidden from common protection techniques
5 - Finally you can double click any method and you will be driven to Reflector to see the code
6 - I may add plugins support later
7 - You can toggle tracing ON/OFF in runtime, until you open the registration window for example
8 - You can save results to Microsoft excel *.xls file for better analysis later
9 - Double click orange rows to be taken to the loaded module location in Windows Explorer
10 - Double Click the "Parent Class" to be taken to the Class that invoked the method in reflector
11 - Double Click the blue row to be taken to the Method that was called in Reflector
12 - VM Compatible
13 - may require a certain setup on Windows Vista and later due to UAC
* Reflector Support is still buggy but it's not my fault
** Make sure you loaded the needed assemblies in Reflector before using the double clicking feature
*** Thanks to whoknows and 0xd4d for testing and bug reports)

1624607185782.rar


上一篇:MD5.Checksum.Verifier.4.62.Cracked-REPT
下一篇:Net.reflection And Dynamic Class/method Invocation