Detect-It-Easy
x64dbg
Our great sponsors
Detect-It-Easy | x64dbg | |
---|---|---|
18 | 32 | |
6,567 | 43,170 | |
- | 0.9% | |
9.4 | 9.1 | |
6 days ago | 7 days ago | |
JavaScript | C++ | |
MIT License | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Detect-It-Easy
-
E-book piracy - a weird ZIP file
If it was me, I'd first run something like DIE on it (I have a few such programs installed)- https://github.com/horsicq/Detect-It-Easy
- How do I debug software that detaches as soon as I attach the debugger
- Detect It Easy 3.07 Program for determining types of files for Windows, Linux and MacOS.
-
An error occurred while unpacking a game (ISDONE.DLL). How do I get rid of this in wine emulator?
You could try to run https://github.com/horsicq/Detect-It-Easy to maybe find out how it got packed... Would help narrow it down.
- Detect It Easy 3.06 Program for determining types of files for Windows, Linux and MacOS.
- Detect It Easy 3.05 Program for determining types of files for Windows, Linux and MacOS.
-
Decompiling MPRESS packed Autohotkey scripts!
First to confirm suspicions we will download and launch Detect it easy and click THIS button and select your executable and it should say "MPRESS 2.19" right HERE, that's how you know it's an MPRESS packed executable
- How do I decompile Windows' setup.exe?
- Detect It Easy 3.04 Program for determining types of files for Windows, Linux and MacOS.
- What language/Technology used by anydesk ? The application seems to be small and is able to run on all platforms natively. my closest guess is delphi suites.. but unsure.
x64dbg
- we need a 2015E revival.
-
Too Many Fonts in Windows 10 Can Cause Slow Application Starts
I have never heard anyone say anything good about the Visual Studio debugger before. Now, I'm not a Windows person but I'm not gonna argue for gdb or lldb here. RemedyBG and x64dbg are the two debuggers I've heard good things about though I've never used them because, again, not a Windows person.
[1] https://remedybg.handmade.network/
[2] https://x64dbg.com/
-
Advice needed on disabling license checks on some old proprietary abandonware
I'd help you out but because of circumstances I have no laptop with me. You need x86/x64 debugger to do this. This one for example Find a registration procedure and look for possible brenching to other parts of code in assembly. It's probably somewhere in the beginning. Exclude code validation and export new program version.
- Looking for x64 emulator to learn assembly ?
-
C/C++: Where is the address of a declared variable stores?
One interesting thing you can do is download an app like https://x64dbg.com/ or cheat engine, which will let you see the memory. You can look at the process for something you’ve made and explore it. Log a memory address from your app then go find it in the tool and interpret the bytes as an integer. Find a string and see how that works. Find a pointer, read the address it’s pointing then go look at that address. You start to see how different containers store data. I find it fascinating.
-
Is there a tool that can show you an EIP trace of a game?
If you want to also do dynamic analysis (debugging) you can use https://x64dbg.com.
-
Star Wars Squadrons Windows 7 help (epic games ea origin)
close origin and download this debugger https://github.com/x64dbg/x64dbg/releases
- Lulu não foi eleito pelo povo brasileiro. Foi escolhido pelo sistema eleitoral
-
How do I get opcode instructions from hexdump
.exe is a complex format and not something you're going to extract raw instructions from using a hexdump. What you need is a "disassembler". For Windows I'd recommend x64dbg.
-
DayZ running on Apple Silicon 🔥
Patch the DayZServer_x64.exe, change "test al, al" to "cmp al, 2". i used x64dbg (https://x64dbg.com) a good video for the whole process: https://drive.google.com/file/d/1F1A0lpumREPXtVeoTMq1HiEnvaZp-NUU/view
What are some alternatives?
drakvuf-sandbox - DRAKVUF Sandbox - automated hypervisor-level malware analysis system
ghidra - Ghidra is a software reverse engineering (SRE) framework
radare2 - UNIX-like reverse engineering framework and command-line toolset
dnSpy - .NET debugger and assembly editor [Moved to: https://github.com/dnSpy/dnSpy]
Nauz-File-Detector - Linker/Compiler/Tool detector for Windows, Linux and MacOS.
dnSpy
youtube-dl-gui - A cross platform front-end GUI of the popular youtube-dl written in wxPython.
ImHex - 🔍 A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM.
flare-vm - A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering environment on a VM.
pycdc - C++ python bytecode disassembler and decompiler
PEpper - An open source script to perform malware static analysis on Portable Executable
Disassembler