chaye
  • Home
  • Archives
  • Categories
  • Tags
  • About

esaypyc前面都是正常的py逆向,不过多赘述 有意思的初次碰到rsa算法,虽然是入门的 基础的exp附上12345678910111213141516import gmpy2from Crypto.Util.number import long_to_bytesq = 189239861511125143212536989589123569301p = 38612312537192365119
2026-01-19

easyrebase64加密的反编译代码1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253__int64 __fastcall encode_one(char *a1, int a2, char *a3, int *a4){ int v5; /
2026-01-19

moe 康复训练A_game看了一下是个数独题目 提取box,顺便整理一下 https://sudokusolving.bmcx.com/ 12345678910111213141516171819202122232425box=[ 0, 0, 5, 0, 0, 4, 3, 6, 0, 0, 0, 0, 0, 5, 0, 0
2026-01-19

例题1、进制转换负数的16进制要用补码来表示12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758int __cdecl main(int argc, const char **argv, const char **envp){
2026-01-19

花指令参考链接: https://blog.csdn.net/m0_51246873/article/details/127167749 https://www.cnblogs.com/YenKoc/p/14136012.html https://www.xjx100.cn/news/40167.html?action=onClick https://mp.weixi
2026-01-19

平坦化工具1https://github.com/cq674350529/deflat python deflat.py -f path/to/binary –addr hexaddress 关键之处在于寻找程序的 address python deflat.py -f check_passwd_x8664_flat –addr 0x4009A0 报错 更新: 2025-
2026-01-19

代码混淆 更新: 2024-11-13 14:44:32原文: https://www.yuque.com/chaye-apqbl/vsc85q/gmxzd6x5cicp2tz1
2026-01-19

RE解题思路1、先查壳,看看是32进制还是64进制写的程序 2、放IDA里面(F5)反汇编,寻找main函数 例题 找到处理函数sub_401069 123456result= 'DH~mqqvqxB^||zll@Jq~jkwpmvez{'s=['a']*32for i in range(len(result)): s[i]=chr(o
2026-01-19

RXSSTVhttps://www.cnblogs.com/wutou/p/16154582.htmlhttps://blog.csdn.net/orchid_sea/article/details/138075312 配置 将输出的图片设置为100% SSTV-Engine里RX保持默认设置 将AFC、LMS、BPF全都选上 解码 例题RXSYCsunset
2026-01-19

outguesshttps://blog.csdn.net/qq_45784859/article/details/105057281 outguess下载安装t kail 终端命令输入git clone https://github.com/crorvick/outguess,安装包下载完成到文件夹。打开文件夹,右键空白处选终端打开,输入命令./confi
2026-01-19
1…678910…16

Search

Hexo Fluid