Where communities thrive


  • Join over 1.5M+ people
  • Join over 100K+ communities
  • Free without limits
  • Create your own community
People
Repo info
Activity
  • Jan 26 14:10
    mrexodia commented #2282
  • Jan 26 12:59
    xujintao commented #2246
  • Jan 26 12:47
    Mattiwatti commented #2246
  • Jan 25 18:45
    lurumdare commented #2282
  • Jan 25 18:42
    mrexodia commented #2282
  • Jan 25 18:36
    lurumdare commented #2282
  • Jan 25 18:32
    mrexodia commented #2282
  • Jan 25 18:29
    lurumdare commented #2282
  • Jan 25 18:21
    mrexodia commented #2282
  • Jan 24 18:36
    lurumdare commented #2282
  • Jan 24 17:04
    mrexodia commented #2282
  • Jan 24 16:10
    lurumdare commented #2282
  • Jan 24 14:24
    mrexodia commented #1908
  • Jan 24 12:03
    stevemk14ebr commented #1908
  • Jan 24 12:02
    stevemk14ebr commented #1908
  • Jan 24 09:56
    mrexodia commented #2282
  • Jan 24 09:51
    mrexodia commented #1908
  • Jan 24 02:38
    stevemk14ebr edited #2283
  • Jan 24 02:37
    stevemk14ebr commented #1908
  • Jan 24 02:24
    stevemk14ebr opened #2283
x64dbgbot
@x64dbgbot
<tomay3000> @x64dbg_bot KernelBase.dll is statically linked to the following files:
ntdll.dll
api-ms-win-eventing-provider-l1-1-0.dll
api-ms-win-core-apiquery-l1-1-0.dll
x64dbgbot
@x64dbgbot
<Lan> Hello
<Lan> Hello all
<Lan> How to debug plugins in Visual Studio?
x64dbgbot
@x64dbgbot
<ARCHANGEL_ahteam> Hi, is it possible to dump region from memory but set it’s location and size manually? For example, if I need to dump several sections from pe in memory but not all of them
x64dbgbot
@x64dbgbot
<ARCHANGEL_ahteam> Thanks, I will try it
x64dbgbot
@x64dbgbot
<orgkoc> x64dbg도 어셈블리스캔이 있나요?
<orgkoc> Does x64dbg even have assembly scans?
<Apuromafo> scan ? (re @orgkoc: Does x64dbg even have assembly scans?)
<Apuromafo> search by assembly ?
<Nukem> right click > search for > module > command
<Apuromafo> search by pattern
<Nukem> if you mean search by instruction
x64dbgbot
@x64dbgbot
<Apuromafo> @Govind_Sharma please not unpack request in dm/ pm ...
x64dbgbot
@x64dbgbot
<system> file Zelix Classmaster 9.0.8.zip too big to download (5202269 > allowed size: 1000000)
<Govind_Sharma> Forwarded from anonymize_bot:
<system> file Stringer 3.0.3 Cracked.zip too big to download (4258151 > allowed size: 1000000)
<Govind_Sharma> Forwarded from anonymize_bot:
<Govind_Sharma> Forwarded from anonymize_bot: JEB 3 Pro
https://mega.nz/#!aRAnFKIY!fpJ7rBMwMNdsTL0m_2OVx1kuIrPKkPtM5AnatL2bMuM
<system> file Stringer9.rar too big to download (4667066 > allowed size: 1000000)
<Govind_Sharma> Forwarded from anonymize_bot:
<Govind_Sharma> Forwarded from anonymize_bot: MediaFire link: DexProtect.zip
https://www.mediafire.com/download/poygs2wolw4tgw5
<Govind_Sharma> Forwarded from anonymize_bot:
<system> file jiagu.rar too big to download (1857295 > allowed size: 1000000)
<Govind_Sharma> Forwarded from anonymize_bot:
<Govind_Sharma> Forwarded from anonymize_bot: JEB 3.7.0 Merry Xmas Edition by DimitarSerg
  1. Maximum license type (copying, scripts, etc. work now).
  2. Fixed integrity check #1.
  3. Fixed integrity check #2.
  4. All the telemetry has been cut out.
  5. Removed the update checks and other shit that tries to connect to the Internet.
  6. Added/reconstructed saving/loading project function.
  7. Decompilation of missing opcodes for Android has been restored.
  8. Restored display of variable values when hovering over them during debugging (Android).
  9. Decompiling for other platforms was fixed (tested x86/x64, webAssembly, MIPS, ARM).
    Instruction:
    1. Replace the original JEB.jar with fixed.
    2. Register it with Keygen (run it: java Keygen)
      Distributive:
      https://www.sendspace.com/file/iivzq3
      FIXED JAR FILE:
      https://www.upload.ee/files/10890835/jeb.jar.html
      KeyGen:
      https://www.upload.ee/files/10890855/Keygen.class.html
<system> file PreEmptive Protection - DashO 8.0.zip too big to download (21146014 > allowed size: 1000000)
<Govind_Sharma> Forwarded from anonymize_bot:
x64dbgbot
@x64dbgbot
<SomeoneYoulovedd> need script to unpack vmp
<SomeoneYoulovedd> vm protect
<SomeoneYoulovedd> for x64dbg
x64dbgbot
@x64dbgbot
<Nukem> this is the wrong place
x64dbgbot
@x64dbgbot
<SomeoneYoulovedd> guys atleast give me a tutorial or pdf so i can recognize vmp version and get a better understanding of it
x64dbgbot
@x64dbgbot
x64dbgbot
@x64dbgbot
<levitanious> Why google, ffs. THE HERESY
<mudlord> ...................no
<mudlord> this is for x64dbg only
<mudlord> not your cracking requests
x64dbgbot
@x64dbgbot
<Codefuser> @levitanious the &s=d at the end of the url makes it duckduckgo
x64dbgbot
@x64dbgbot
<levitanious> Oh snap
<levitanious> I'm getting rusty, lol! Can't keep up with the trendy stuff.
<levitanious> Thanks for the heads up :3
x64dbgbot
@x64dbgbot
<SomeoneYoulovedd> how can i find start of program in x64dbg ?
i end up in nstdll as an entry point then i use this to get to program starting, i press F9 and scroll all-the-way to up and i end up there, is this correct ?
is it possible to only end up in my program as an entrypoint ?
x64dbgbot
@x64dbgbot
<orgkoc> Entry point?
x64dbgbot
@x64dbgbot
<Matti> the first point you are breaking on is the system breakpoint
<Matti> the second one you hit after pressing F9 at the system breakpoint will be the program entry point
<Matti> the system bp can be disabled in the settings if you want