Case insensitive string functio…Merge pull request #2889 from j…(compare)
x64dbgbot
@x64dbgbot
<some> idk
<Matti> is this user a bot or something
x64dbgbot
@x64dbgbot
<Matti> what with the 'idk' answers to questions like are you on the latest version combined with the URL in the profile
<Matti> discord profile* to clarify
x64dbgbot
@x64dbgbot
<EvilSapphire> Dang bots debugging other programs now? They're evolving Morty!
x64dbgbot
@x64dbgbot
<Matti> oh I legit read zero of the context
<Matti> so maybe I'm just a moron
<Matti> but I don't see how anyone could be so lazy as to answer 'idk' to a question someone asks you because they're trying to help you
<Matti> namely is that the same version as the latest on the site
<Matti> I've had this problem before where I couldn't tell if someone was simply lazy/stupid or an actual bot
<Matti> this AI thing is getting out of hand
x64dbgbot
@x64dbgbot
<mrfearless> should charge the amount of bitcoin it would cost to buy the product for #2797 - lol
<mrexodia> I banned that user and deleted the issue (re @mrfearless: should charge the amount of bitcoin it would cost to buy the product for #2797 - lol)
<mrfearless> concur
<mrfearless> looks like very specialized software anyhow
<mrfearless> requiring hardware keys and licenses
x64dbgbot
@x64dbgbot
<exploit1337> It's possible to get dump automatically after virtualalloc to save time ?
x64dbgbot
@x64dbgbot
<exploit1337> Or similar script to archive this
x64dbgbot
@x64dbgbot
<mrfearless> I imagine you could do it in a plugin, have breakpoints on VirtualAlloc - either manually or from the plugin itself perhaps. Then when breakpoint is triggered, plugin can check if it was for VirtualAlloc call, (determine length of alloc and store that) then it can single step, collect the value in eax, check its not null, then dump to file based on debuggee name + concat of "_dump"+ dumpNo for the length of the alloc
<exploit1337> Which script I should check to get help?
x64dbgbot
@x64dbgbot
<exploit1337> So with xAnalyzer can i get exact argument values ?
<exploit1337> Only constants are shown
_
x64dbgbot
@x64dbgbot
<Gdhkeix> Hi all! Im facing some problem on arm based Win11 with x64 emulation. For example if im injecting simple code to x64 process like int 3 mov rbp, 0x11223344 nop so when i hit first bp and step then mov instruction i see 0x11223344 in rbp, but when i step to nop rbp becomes zero (rbp == 0)!!! Is it binary translation bug? Thnx in advance
<Rainb0wCodes_484> only the applicationframehost is there
<Rainb0wCodes_484> i am running as administrator
<mrexodia> program:0 is already the base
<mrexodia> but yeah looks like a bug
x64dbgbot
@x64dbgbot
<Dimy> Oh got it thanks !
x64dbgbot
@x64dbgbot
<Diacaprio> How to extract source code of application using this
<lpcvoid> You can't
x64dbgbot
@x64dbgbot
<Diacaprio> Oh ok how can we do it
<Diacaprio> Any other options
x64dbgbot
@x64dbgbot
<GroupAnonymousBot> You can’t - and you can’t decompile application with x64dbg if that’s the question. (re @Diacaprio: Any other options)
x64dbgbot
@x64dbgbot
<kaens> You can't, full stop You can pretend to have done that using decompilers but w
x64dbgbot
@x64dbgbot
<Yakov5776> With enough effort, decompiling could be enough to reconstruct the source and compile
x64dbgbot
@x64dbgbot
<c0rt3x0> @mrexodia I pm u Tuts4you for the name
x64dbgbot
@x64dbgbot
<mrexodia> ? (re @c0rt3x0: @mrexodia I pm u Tuts4you for the name)
<mrexodia> Read the rules
<c0rt3x0> Yes sorry my mistacke
<kaens> Compilers optimise; that alone makes it impossible to get the exact source, not to mention all the formatting and comments which are sometimes http://uguu.org/sources.html :)