Requirements: Visual Studio and CMake. Run the commands below under
"Developer Command Prompt VS 2022"
git clone https://github.com/zrax/pycdc.git
In reverse engineering we often need an executable binary to mapped in memory, stopped at a certain address. One approach is to modify the executable binary temporarily to jump at its own address. I have written a very small c code and compile it with optimization level 2.
#include <stdio.h>
/** | |
* hex_dump.c | |
* Copyright (C) 2022 Blue DeviL <[email protected]> | |
* | |
* This program is free software: you can redistribute it and/or modify | |
* it under the terms of the GNU General Public License as published by | |
* the Free Software Foundation, either version 3 of the License, or | |
* (at your option) any later version. | |
* | |
* This program is distributed in the hope that it will be useful, |
/** | |
* rbdumbper.c <Raw bytes dumper from commandline> | |
* Copyright (C) 2022 Blue DeviL <[email protected]> | |
* | |
* This program is free software: you can redistribute it and/or modify | |
* it under the terms of the GNU General Public License as published by | |
* the Free Software Foundation, either version 3 of the License, or | |
* (at your option) any later version. | |
* | |
* This program is distributed in the hope that it will be useful, |
enum MACRO_WIN10_BUILDNUM | |
{ | |
WIN10_b1507 = 0x2800, | |
WIN10_b1511 = 0x295A, | |
WIN10_b1607 = 0x3839, | |
WIN10_b1703 = 0x3AD7, | |
WIN10_b1709 = 0x3FAB, | |
WIN10_b1803 = 0x42EE, | |
WIN10_b1809 = 0x4563, | |
WIN10_b1903 = 0x47BA, |
I hereby claim:
To claim this, I am signing this object: