📚 OpenRCE is preserved as a read-only archive. Launched at RECon Montreal in 2005. Registration and posting are disabled.








Flag: Tornado! Hurricane!

vam's Repository

Name Size Uploaded On
crcVert.zip 845 KB Nov 17 2006
This is based on Shadow Walker/"inverse-Pax" applied to user-space executables instead. Idea can be used to reverse ring3 executables that have self-checksums in place for tamper resistance. Basically, user-space exes can be code-patched arbitrarily - the exe's self-checksums do not fail; however, the exe executes the patched-code instead. Pretty handy in reversing armoured malware and "DRM protections".

Tested only on Windows XP SP2, non-PAE, uniprocessor system.. doesN't work under VMWare etc.
RE_DLLCodeInj.zip 6 KB Mar 2 2006
Thought I'd share this RevEngg tool I have been using for a while. It's essentially "Hot Code Patching" via "AppInit_DLLs" DLL injection trick. I have found it useful where MS Detours can't be used (explained in the Readme). I have provided a sample application on Skype 2.0 .

Skype left at least two logging functions in their 2.0 release. These are called from all over the binary with low level debugging info. These logs can be used to study Skype's behavior (local logging, logging into the Skype cloud, interaction with supernodes, searches, NAT holepunching, STUN/TURN variants used etc etc). Due to certain global variables, these are never really written to an external file, but the RE_DLLCodeInj tool can be used to extract these logs easily.

It's fairly reliable, customizable, relocatable.. Questions, suggestions are welcome.. email me directly.

There are 31,328 total registered users.


Recently Created Topics
[help] Unpacking VMP...
Mar/12
Reverse Engineering ...
Jul/06
let 'IDAPython' impo...
Sep/24
set 'IDAPython' as t...
Sep/24
GuessType return une...
Sep/20
About retrieving the...
Sep/07
How to find specific...
Aug/15
How to get data depe...
Jul/07
Identify RVA data in...
May/06
Question about memor...
Dec/12


Recent Forum Posts
Finding the procedur...
rolEYder
Question about debbu...
rolEYder
Identify RVA data in...
sohlow
let 'IDAPython' impo...
sohlow
How to find specific...
hackgreti
Problem with ollydbg
sh3dow
How can I write olly...
sh3dow
New LoadMAP plugin v...
mefisto...
Intel pin in loaded ...
djnemo
OOP_RE tool available?
Bl4ckm4n


Recent Blog Entries
halsten
Mar/14
Breaking IonCUBE VM

oleavr
Oct/24
Anatomy of a code tracer

hasherezade
Sep/24
IAT Patcher - new tool for ...

oleavr
Aug/27
CryptoShark: code tracer ba...

oleavr
Jun/25
Build a debugger in 5 minutes

More ...


Recent Blog Comments
nieo on:
Mar/22
IAT Patcher - new tool for ...

djnemo on:
Nov/17
Kernel debugger vs user mod...

acel on:
Nov/14
Kernel debugger vs user mod...

pedram on:
Dec/21
frida.github.io: scriptable...

capadleman on:
Jun/19
Using NtCreateThreadEx for ...

More ...


Imagery
SoySauce Blueprint
Jun 6, 2008

[+] expand

View Gallery (11) / Submit