Intel manual-Chapter7-Task Management, intelmanagement driverThis section describes the task management function of the IA-32 architecture, which is effective only when the processor runs in the protection mode, this section focuses on the 32-bit
←itset Brief Introduction to the implementation of –with-abi and –with-arch in gcc →
PLT Example ExplanationPosted on May, from admin
by XMJ, Yao
First, x86 ABI Handbook original and translation
Original digest from System V application BINARY
Text/figure wastWe usually need to shell the Chinese software and decryption software, because most of the software has shelling. "Shell" is a program dedicated to protecting the software from unauthorized modification or decompilation. They
API hooks are not a new technology, but I am ashamed that I have mastered them recently and have come up with some stupid ways to achieve my goal. There may be many errors or vulnerabilities in this article, and you may want to correct them in time.
Recently, I am very interested in the Armadillo shell due to the changes in its various combinations. However, it seems that the solution to its protection is relatively fixed. The method is similar to several shelling methods (key and cc are
1. Use the ESP Law
After the OD is loaded, right-click the ESP content in the register window (for example, 0012ffa4) at F8 once, and choose "follow in the data window" to go to the memory data window, display the memory data window in the form of
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
and provide relevant evidence. A staff member will contact you within 5 working days.