C’est l’instruction qui suit (au ret de main) donc l’instruction pop eip que a plante, apres avoir dpil sur la stack la valeur de ebp donc si vous avez bien suivi 0圆1616161. I did this from this website and they seemingly provide on one way obfuscation services available on their website.this was my test code during a learning so would be greatful if anyone could help me out. Du coup, lors de l’epilog de main() cette fois, ebp va prendre comme valeur 0圆1616161. var _0xf17f= function call_func(_0x41dcx2) Ĭan anyone guide me the URL or any method to make it readable. For example, feature sets in Windows Workflow Foundation (WF), Windows Communication Foundation (WCF), Windows Presentation Foundation (WPF) and Windows CardSpace. I hate to bring this here, while doing the learning of obfuscating the JS code, I encoded my code and then over wrote the orginal one without any backup :) Following is my obfuscated code.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
March 2023
Categories |