Where communities thrive


  • Join over 1.5M+ people
  • Join over 100K+ communities
  • Free without limits
  • Create your own community
People
Repo info
Activity
  • Jun 15 13:34
    torusrxxx commented #1764
  • Jun 14 14:26

    mrexodia on development

    Simplify and improve process cr… (compare)

  • Jun 14 00:12
    mrexodia closed #2668
  • Jun 14 00:12
    mrexodia commented #2668
  • Jun 12 10:04

    mrexodia on development

    Break when there is an error in… Allow the user to cancel reload… Merge pull request #2661 from t… (compare)

  • Jun 12 10:04
    mrexodia closed #2661
  • Jun 12 10:04
    mrexodia commented #2661
  • Jun 12 10:03
    mrexodia closed #2663
  • Jun 12 10:03

    mrexodia on development

    hActiveThread is now being upda… Merge pull request #2673 from t… (compare)

  • Jun 12 10:03
    mrexodia commented #2673
  • Jun 12 10:02
    mrexodia closed #2673
  • Jun 12 03:59
    AppVeyorBot commented #2673
  • Jun 12 03:41
    thejanit0r opened #2673
  • Jun 12 03:28
    thejanit0r closed #2672
  • Jun 12 02:45
    thejanit0r opened #2672
  • Jun 11 05:01
    rishabh147-png opened #2671
  • Jun 10 13:52
    mrexodia commented #2669
  • Jun 10 00:14
    MarianD edited #2670
  • Jun 10 00:13
    MarianD opened #2670
  • Jun 09 15:16
    CaledoniaProject edited #2669
x64dbgbot
@x64dbgbot
<CSGAEE> What's the best way to find main() function if you inside crt initializaton code
I normally open the same program in ida then rebase it according to base addr of program image in "memory map" tab in x64dbg
Then try to find main address then go to that address in x64dbg
<CSGAEE> How can i propogate func names in x64dbg like what ida does ???
<CSGAEE>
x64dbgbot
@x64dbgbot
<xqc0w> What do you mean? (re @CSGAEE: How can i propogate func names in x64dbg like what ida does ???)
x64dbgbot
@x64dbgbot
<CSGAEE> For example the name of the function at address 401342 in
X32dbg is --> packified.401616
IDAPro. --> ___security_init_cookie
All function in x64dbg is named with it's address
x64dbgbot
@x64dbgbot
<xqc0w> You want the debugger says __security_init_cookie instead?
x64dbgbot
@x64dbgbot
<Admofficial25> I want to hack
<Admofficial25> Apk like netflix trials please👌🙏🙏🙏🙏
<Admofficial25> Tutorial for x64dbg apk
x64dbgbot
@x64dbgbot
<testpil0t> You cannot debug apk files with x64dbg
<p01ym0r4ic> 1. Android Studio
  1. No hacks (re @testpil0t: You cannot debug apk files with x64dbg)
x64dbgbot
@x64dbgbot
<xqc0w> Even if you were, that wouldn't help (re @testpil0t: You cannot debug apk files with x64dbg)
x64dbgbot
@x64dbgbot
<CSGAEE> Yes .. (re @xqc0w: You want the debugger says __security_init_cookie instead?)
<CSGAEE> How to do this
x64dbgbot
@x64dbgbot
<Brianwuz> how can I edit multiple values in the dump window without clicking on each one
<Brianwuz> I tried highlighting all 5 values but it still comes up with modify value
x64dbgbot
@x64dbgbot
<mrexodia> It’s not supported
<mrexodia> Also not supported (re @CSGAEE: How to do this)
<mrexodia> You can export ida names though and import them
x64dbgbot
@x64dbgbot
<gand0lf> Or use one of the many syncing plugins
<gand0lf> since youre using both anyways
<gand0lf> look at me, hours later..
x64dbgbot
@x64dbgbot
<mrfearless> Is that Alison Martin in the x64dbg Google groups a bot or a scam or is it legit?
x64dbgbot
@x64dbgbot
<mrexodia> Just some bullshit
<mrexodia> They want paid product placement
x64dbgbot
@x64dbgbot
<bally120> Can I use this tool to edit .exe file to evade av detections
x64dbgbot
@x64dbgbot
<xqc0w> Yes this
x64dbgbot
@x64dbgbot
<GroupAnonymousBot> ^ (re @mrexodia: Official x64dbg group chat.
Rules:
x64dbgbot
@x64dbgbot
<xqc0w> What to use if class informer not work?
x64dbgbot
@x64dbgbot
<bally120> Any link to study how to use this tool to edit my .exe file for avoiding av detection (re @GroupAnonymousBot: ^)
x64dbgbot
@x64dbgbot
<mrexodia> It’s not possible and not a good subject for this group (re @bally120: Any link to study how to use this tool to edit my .exe file for avoiding av detection)
x64dbgbot
@x64dbgbot
<bally120> ok
x64dbgbot
@x64dbgbot
<Brianwuz> is it possible to have a second cpu window to look at different parts of code at the same time?
x64dbgbot
@x64dbgbot
<mrfearless> A second x64dbg instance is your best bet
<Brianwuz> Thanks, I figured it had 4 more dump windows, why not a split cpu window with multiple views
x64dbgbot
@x64dbgbot
<Badman> Ahh
x64dbgbot
@x64dbgbot
<mrexodia> Yes, follow the address you want in the dump (re @x64dbg_bot: <Brianwuz> is it possible to have a second cpu window to look at different parts of code at the same time?)
<mrexodia> Right click -> disassembly
x64dbgbot
@x64dbgbot
<vient> hi, how can i jump to relative dll addresses?
for example, jump to a.exe:$0 works but mfc140.dll:$0 is not recognized as valid expression
x64dbgbot
@x64dbgbot
<vient> it seems that jumps work randomly, i can jump to ntdll and mfc140 now (somehow), but still can't jump to other dlls
ζeh Matt
@ZehMatt
try "modulename":$xxx
x64dbgbot
@x64dbgbot
<vient> oh, i see
my dll contains - in name, that's why it only works with quotes? thanks a lot
x64dbgbot
@x64dbgbot
<mrexodia> Just leave out the .dll part
<mrexodia> mfc140:$1223 should work
x64dbgbot
@x64dbgbot
<clightning> Search about api runtime obfuscation, binary comperssion, and other technqiues that related to av evasion. nowadays, because of heavily using machine learning and other AI based solutions you can not easily evade from anti viruses like sophos ... (re @bally120: Any link to study how to use this tool to edit my .exe file for avoiding av detection)
x64dbgbot
@x64dbgbot
<saiestyas> necesita mas perro
https://www.youtube.com/watch?v=JB7IblGybEw&t=14
x64dbgbot
@x64dbgbot
<PlasmaStar> Would any original channel owners like ownership back?
<mrexodia> Yeah
<mrexodia> But I can’t come on irc rn
x64dbgbot
@x64dbgbot
<PlasmaStar> Ok. Contact me any time.