- Need help circumventing WinAPI
- Universal HASP Dump->To->Reg converter
- Change application icon
- Compiling FlexLm sdk
- ntoskrnl symbols foobared ?
- Driver installation Programically???Is it possible?
- Seed Key and Algorithms
- HASP calls
- remove bug problem
- [ARTeam-Tool] ARTeam UFD Password Revealer v1.0
- flelxlm 9.5-what's use of vendor_info and dist_info
- Arteam: Primer on Reversing Symbian S60 Applications
- Calcseed ! CrackZ !
- [ARTeam] TheMida r0 exploit
- [ARTUT] A Security Aspect Of USB Flash Drives
- Detouring DriverEntry / Self Debugging
- Building a Sentinel Pro Clone
- BlackBerry OS
- news: intercepting cellphone calls with service sms
- verisign tech reports
- How to load and then patch in 16 bit environments?
- Good old fashioned overlaying
- USING OLLYBONE IN WINDBG (experimental method)
- Windows User Mode Debugging Internals
- F*&king .NET
- Attaching / Detaching "on the Fly"
- ARTeam eZine #2
- A question from who played with GINA
- ARTeam Special Issue: Primer on Reversing .NET Applications
- UNIQUE PROJECT...Looking for the BEST of the BEST to help!
- Weird tamper detection
- Algorithm Help
- Confusing code snippet
- Realtime systems and OS dependency
- Virtual Machine RE-building
- Speed up cracking process?
- AntiRootkit.com site
- Wininternals's Link
- I want to find out loaded DLL-name.
- Article: Software Security Through Targetted Diversification
- Deskey Dongle
- ARTeam: new tute on Removing Sentinel SuperPro dongle
- Problem reversing a call to function
- flexlm vendor_keys problem
- Hardlock Dump/Emulate
- who knows how to generates the VENDOR_INFO string from the license key?
- Inside Windows Rootkits
- Nice .net debugging tut
- eEye Research - Really Cool!!!
- Question: Trying to learn from a program called 'X'
- Reversing client-server application
- PEB ProcessHeaps element
- LINK: Pseudo unpacking stubs
- Well, I'm an idiot...
- Opcode Operand Sizes
- sentinel sdk documentation
- Ring 0 anti-debugger code in Daemon Tools?
- new uninformed released
- Vista Protected Applications
- Remotesoft's Salamander 1.1.6.0 (Native Compiling)
- A call for cooperation - AV
- Compiling code in memory
- Reverse Engineering Libraries
- Vendors Custom Decryption
- Software Key's Protection Plus
- LINK: Microsoft HotPatching Article
- Reverse Engineering Team Recruiting
- Singnatures signed by Verisign
- Fastread dumping error.
- SafeKey's *.FST data files format
- CrypKey in a .dll from Vise installer.
- ARTeam: New tutorials and the eZine Issue #1 (!!)
- Matt Pietrek's new article on debugging on x64
- Dynamical byte manipulation of win32 executables
- C/C++ source for parsing PE header?
- DeviceIoControl problem
- One final masm question about register parsing
- Having a keygen compilation hex error......
- Base-85
- New Syser Debugger 1.3 Release
- Exports and kernel32.dll under w9x
- Olly: adapting menu-bar buttons...
- TLS callbacks
- getting IDT
- OllyDbg and Sysenter
- other serial input methods to break on?
- Need some advice, Stuck with algoithm to my reverse keycode
- writing a new driver for a certain protection
- LINK: Bypassing PatchGuard on Windows x64
- Visual Basic importing win32api functions
- Is it possible to intercept the ReadFile() function of an executable
- The Zen of JIT Debugging
- Which encryption ?
- eEye - Generic Anti-Exploitation Technology for Windows
- Virtual Machine Debugger (Live Admiral thread alone!)
- Problem resolving KERNEL32 imports
- .NET Format: Ntoskrnl vs Pietrek
- Overridable Usermode Debugger?
- MSDOS 7 and 48 BIT LBA
- Symbols for kernel addresses
- Fibers?
- Protected kernel driver
- LINK: Toby Opferman's Driver Development Tutorials
- patching a sys driver
- New antidebug trick
- Reversing a home cooked encryption routine
- loading resource process
- WinXP .rsrc encryption
- FlexLM --> variable job-structure at startup
- Very nice Portable Executable (PE) tutorial
- Brainstorming
- file & section alignment (PE)
- Looking for exported function. The way?
- API hook/programing question?
- Debugging hooks
- IDA Plugin AppWizard (Visual C++ 6.0)
- Algorithmic difficulties
- how do i display/dump process memory on remote pc?
- FLEXNet
- Ever heard of Windows Protection Plus??
- CRC32b
- LINK: API Hooking: a new and fast technique
- SafeDisc API V.2
- about flexlm6.1 lic
- FlexLM 9.2 Crypt Filter --> Getting XOR Table ?
- W9x - locking a full screen dos box
- Protection against spoofing DLL's
- About Flexlm Sign,help
- Not typical question: can we tweak IE image rendering engine?
- [ARTeam] Loading DLL from Memory
- HASP DMP to Emulator_NOT B-studio & cool INFO By ME )
- Flexlm 7.2 LIC file use on Flexlm 9.2 display error -73 ?
- How to write spaghetti code
- *.sys FIleS
- Get IDT address in multiprocessors
- Excel Word File Password Decrypt
- CrackZ explanation of hiding dongle response codes
- Code - *ock
- The error of different vendor ID generator same code
- 16-bit enveloped app.
- converting pic to raw for dib
- playing a mod music file
- [ARTEAM] Creating The Invisible Oraculum by Gabri3l
- HASP4 (TimeHasp) Cracking..
- File Compare
- RECON 2005
- About bad flags of flexlm with CRO open
- OpenRCE
- Fun with prefetch and movsb
- [ARTEAM] Cracking with Loaders in 3 tutorials..
- Reverse Engineering C++ DLL
- Fast Eye Hardlock
- anti-ildasm
- Import mechanisms tutorial
- RDPMC & RDTSC problem
- switching a running program from ring3 to ring0 in WinXP
- how can i obtain a ring3 thread context in ring0
- Guide to creating a Softice Kernel Debugger Extension (KDExtension)
- How to manipulate the IOBitmap in TSS??
- Win Debug API's
- Question about Windows GDT
- writing own plugins/tools
- BGL (babylon glossary) to GLS (babylon glossary source).
- what the hell with windows installer
- How to force data into a specific PE section?
- OSIX Articles: Avoiding Debuggers; Self Modifying Code - Defeating the Disassembler
- JavaCard internal structure (JCOP, CyberFlex, etc.)
- Hardlock HL-CODE
- article on ring0 exploits
- phys @ EE200000h..
- HASP HL
- An unusual driver based Time-trial protection
- Please help...SentinelLM question
- Looking for some help with softice and installshield methods
- Article: Defeating Microsoft Windows XP SP2 Heap protection and DEP bypass
- Multiple same hardware issue in programming
- NEW: Syser Kernel Debugger by wuyanfeng
- The Infamous "VB4 PCODE & sx32w.dll"
- XP using not only ring0/ring3?
- little state of art in decompilation
- DRIVER_OBJECT structures list
- VB reversing
- Reverse engineering a firmware
- Old DOS Stack handling by Win2k
- Hack-a-Bike
- finding documents about CPU cache locking ( for Intel P4)
- protection CD's
- Security Accounts Manager
- Ring 0 -> Ring 3 : Upward calls and downward returns theoretically possible?
- Different paths in different Computers
- Windows undocumented native API, interesting article updated
- Specification of NE executables
- Setting up IDA for analysing Softice functions
- how to build the lmgrypt.exe with the flexlm SDK v8.1?
- multithread application debugging
- Flexlm with CRO...need pointers (Crackz?)
- How to use the genlic32.exe(version 9.2) to generate license?
- Physical to virtual address translation
- Changes in policy related to patching kernel for MS Windows Server 2003 SP1
- Articles: .NET (dotnet) cracking
- Further observations in Flexlm...
- Virtual Drive
- SoftIce Breakpoint Table Structure
- What is the Flags field in the output of a SoftICE Query command?
- FlexLM 7.2d, CRO, SEED, VENDOR n LICENSE
- article on classes restoration by example of Delphi
- iButton
- syncrosoft dongle
- Marx CryptoBox infos
- EXECryptor
- Resources
- Can't set a working Hardware breakpoint
- how to use adb to get the seed on unix?
- Globetrotter Parallel Dongle Clone
- DeviceIOControl and mouse drivers
- interrupt handler problem
- NtQuerySystemInformation and open handles
- Kernel Filter Driver Example & Article
- Ring3 debugger detection stuph (was Please test a program)
- i'm gone lost my mind ...(Kaspersky)
- I want to write a generic static disassemler
- DR7.GD bit and DRX access exception problem
- New memory protection in XP SP2, details and problems
- nice (and new) article about NT-Syscalls
- Nice site for driver development
- help linux shared linked library
- unknown TEB fields
- PEB of another process?
- How to anti crash code in swf files
- Back to INT2E, trash SYSCALL:)
- Adding functionality to RASAPI32.DLL
- code for call processing application
- WIN32 DEBUG API(AGAIN)
- Sentinel sproQuery Again :(
- WIN32 Debug API
- WinXP 10-Client Server Limit
- Need programming tips to achieve this effect
- Can't see WIN32K with SoftIce?
- .NET RCE Info: Salamander obfuscator Anti-ILDASM
- flexlm 8.1a feature problem
- Message Tracking
- Link: Kernel Services in User Space on Win2K
- Dongle Access Codes Problem
- Debugging Kernel Drivers
- Method to Detect Virtual PC
- Reverse engineering poker protocols?
- Change control properties in VC++
- FlexLM v9 clarifications needed...
- Problem to emulate SproQuery
- SoftIce Symbol Retriever - Getting PDB Files aka Symbols