esaypyc前面都是正常的py逆向,不过多赘述 有意思的初次碰到rsa算法,虽然是入门的 基础的exp附上12345678910111213141516import gmpy2from Crypto.Util.number import long_to_bytesq = 189239861511125143212536989589123569301p = 38612312537192365119
easyrebase64加密的反编译代码1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253__int64 __fastcall encode_one(char *a1, int a2, char *a3, int *a4){ int v5; /
moe 康复训练A_game看了一下是个数独题目 提取box,顺便整理一下 https://sudokusolving.bmcx.com/ 12345678910111213141516171819202122232425box=[ 0, 0, 5, 0, 0, 4, 3, 6, 0, 0, 0, 0, 0, 5, 0, 0
例题1、进制转换负数的16进制要用补码来表示12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758int __cdecl main(int argc, const char **argv, const char **envp){
花指令参考链接: https://blog.csdn.net/m0_51246873/article/details/127167749 https://www.cnblogs.com/YenKoc/p/14136012.html https://www.xjx100.cn/news/40167.html?action=onClick https://mp.weixi
平坦化工具1https://github.com/cq674350529/deflat python deflat.py -f path/to/binary –addr hexaddress 关键之处在于寻找程序的 address python deflat.py -f check_passwd_x8664_flat –addr 0x4009A0 报错 更新: 2025-
RE解题思路1、先查壳,看看是32进制还是64进制写的程序 2、放IDA里面(F5)反汇编,寻找main函数 例题 找到处理函数sub_401069 123456result= 'DH~mqqvqxB^||zll@Jq~jkwpmvez{'s=['a']*32for i in range(len(result)): s[i]=chr(o