+SplAj
July 28th, 2002, 13:37
anybody....
After spending a few minutes (LOL) fuxin Bi-Tarts latest crap 'Cruchv4' with VirtualProtect and poking back the original header....... I thought hmmm, maybe someone needs to see VirtualProtect and VirtualProtectEx in action ???
So I knocked up a quick Tasm asm shit that utilizes a SEH handler to catch an access_violation attempt and then use VP or VPEx to set PAGE_READWRITE and poke some bytes in PE header of my own process.
Use VirtualProtect when it's your OWN process your changing.
Use VirtualProtectEx when you are fuxin another process.....or ur own.
Maybe it helps some get up to my speed
Spl/\j
the fastest 'cracker' in the world (hehe) and the most arrogant
'patch+play'
After spending a few minutes (LOL) fuxin Bi-Tarts latest crap 'Cruchv4' with VirtualProtect and poking back the original header....... I thought hmmm, maybe someone needs to see VirtualProtect and VirtualProtectEx in action ???
So I knocked up a quick Tasm asm shit that utilizes a SEH handler to catch an access_violation attempt and then use VP or VPEx to set PAGE_READWRITE and poke some bytes in PE header of my own process.
Use VirtualProtect when it's your OWN process your changing.
Use VirtualProtectEx when you are fuxin another process.....or ur own.
Maybe it helps some get up to my speed

Spl/\j
the fastest 'cracker' in the world (hehe) and the most arrogant
'patch+play'