Hikayeler

Reklam vermek için turkmmo@gmail.com

CheatBreakerX Profesyonel AntiCheat

Metin2 EP, Valorant VP dahil tüm oyun ürünlerini en uygun fiyatlarla bulabilir, Item ve Karakterlerinizi hızlıca satabilirsiniz. HEMEN TIKLA!

I forgot to remove the vmprotect macro. I'm still using some of vmprotect's features through its SDK, but I know this will create a security vulnerability. I will protect vmprotect when using its macros. When I use vmprotect completely during updates, I experience a performance loss of more than 600%.
its better idea to use VMProtect/TheMida .map protection features why? your compiler can optimalize function that u want to protect and MACRO TOO so it cant be detected in worse scenerio or just wrong protect your function
 
its better idea to use VMProtect/TheMida .map protection features why? your compiler can optimalize function that u want to protect and MACRO TOO so it cant be detected in worse scenerio or just wrong protect your function
That's what you'll do then.
 
Ekli dosyayı görüntüle 162416

@BlackFullMoon
You forgot about removing VMProtect makro/sdk when u moving to TheMida someone can just put breakpoint in x64dbg and check where is VMProtectBeginUltra come

and also using simply xor string for strings not TheMida .map feature / SDK is bad idea tools like https://github.com/lstaroth/AntiXorstr gonna show all of them u can update it
btw. https://github.com/lstaroth/AntiXor...c907bb5fcad/antixorstr/antixorstr_core.py#L70 look here u can just put call inside xorstr decrypt function to make this IDA Script useless and need manual update :)


Ekli dosyayı görüntüle 162417

and detections based on window fnames are ALWAYS bad idea u can use it as adding score or something in your AC but detecting windows / crashing game if runned is sign to change way how you do AC
I'm not just checking the class, this is just one of them anyway.
 
That's what you'll do then.
in byteshield we have own LLVM Obfuscator with own passes but its playing with compiler and its really hard cuz mistake = memory leak or all whats far worse than it and making mistakes at writing passes to LLVM is really easy to do :)

but in VMProtect u have option like u put your .exe/.dll and .map inside folder and u can select function u want to use then apply protection on it thats safest method what u can do but u have to do it on all functions manually
 
in byteshield we have own LLVM Obfuscator with own passes but its playing with compiler and its really hard cuz mistake = memory leak or all whats far worse than it and making mistakes at writing passes to LLVM is really easy to do :)

but in VMProtect u have option like u put your .exe/.dll and .map inside folder and u can select function u want to use then apply protection on it thats safest method what u can do but u have to do it on all functions manually
Hey buddy, you can message me on Discord if you want.
 

Şu an konuyu görüntüleyenler (Toplam : 1, Üye: 0, Misafir: 1)

Geri
Üst