giangnguyen Posted September 2, 2016 Share Posted September 2, 2016 (edited) deleted Edited March 1, 2017 by giangnguyen Link to comment Share on other sites More sharing options...
Moderators JLogan3o13 Posted September 2, 2016 Moderators Share Posted September 2, 2016 @giangnguyen there is a place for making suggestions; the forum is not it: https://www.autoitscript.com/trac/autoit "Profanity is the last vestige of the feeble mind. For the man who cannot express himself forcibly through intellect must do so through shock and awe" - Spencer W. Kimball How to get your question answered on this forum! Link to comment Share on other sites More sharing options...
giangnguyen Posted September 2, 2016 Author Share Posted September 2, 2016 (edited) deleted Edited March 1, 2017 by giangnguyen Link to comment Share on other sites More sharing options...
Danyfirex Posted September 2, 2016 Share Posted September 2, 2016 I think you can do it manually. But probably will be detected as PE File injection. Saludos Danysys.com AutoIt... UDFs: VirusTotal API 2.0 UDF - libZPlay UDF - Apps: Guitar Tab Tester - VirusTotal Hash Checker Examples: Text-to-Speech ISpVoice Interface - Get installed applications - Enable/Disable Network connection PrintHookProc - WINTRUST - Mute Microphone Level - Get Connected NetWorks - Create NetWork Connection ShortCut Link to comment Share on other sites More sharing options...
giangnguyen Posted September 4, 2016 Author Share Posted September 4, 2016 (edited) deleted Edited March 1, 2017 by giangnguyen Link to comment Share on other sites More sharing options...
trancexx Posted September 4, 2016 Share Posted September 4, 2016 Uhm... why would you need to reverse engineer anything? Compiled PE has entry point defined. After compilation is done, change the original entry point and set yours, and then when you're done executing your code, jump to the original entry point for "normal" execution to continue. ♡♡♡ . eMyvnE Link to comment Share on other sites More sharing options...
Danyfirex Posted September 4, 2016 Share Posted September 4, 2016 2 hours ago, trancexx said: Uhm... why would you need to reverse engineer anything? Compiled PE has entry point defined. After compilation is done, change the original entry point and set yours, and then when you're done executing your code, jump to the original entry point for "normal" execution to continue. That's what I was talking about. For that I said that it will be detected as PE injection. Saludos Danysys.com AutoIt... UDFs: VirusTotal API 2.0 UDF - libZPlay UDF - Apps: Guitar Tab Tester - VirusTotal Hash Checker Examples: Text-to-Speech ISpVoice Interface - Get installed applications - Enable/Disable Network connection PrintHookProc - WINTRUST - Mute Microphone Level - Get Connected NetWorks - Create NetWork Connection ShortCut Link to comment Share on other sites More sharing options...
giangnguyen Posted September 6, 2016 Author Share Posted September 6, 2016 (edited) deleted Edited March 1, 2017 by giangnguyen Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now