Welcome to the new Woodmann RCE Messageboards Regroupment

This Forum is now strictly read-only. New Memberships and Postings have stopped.

Remember that under the RCE Links tab are the classic sites:

Fravia's Archive of Reverse Engineering
Fravia's Searchlores
CrackZ's Reverse Engineering Page
Yates - Reverse-Engineering.info

Enjoy 20+ years of Reverse Engineering discussions!
So Long.

Hardcoded dll export address: Python approach

All the collected blog posts from the members of our community, and some others
(i.e. both from <a href="http://www.woodmann.com/forum/blog.php">local</a> and external blogs, please let us know about any good external ones to import!). Feel free to discuss/comment any blog post in here.
My Infected Computer
Posts: 25
Joined: Sun Jun 16, 2013 5:42 pm

Hardcoded dll export address: Python approach

Post by My Infected Computer »

Some months ago I did blog about a method I use to find out what’s behind hardcoded export addresses inside a disasmed file (it’s available at http://zairon.wordpress.com/2013/09/26/ ... t-address/). It works fine, but talking with a friend of mine I did realize that the entire process is a little bit mechanical. He told me about a possible […]Image

http://zairon.wordpress.com/2014/05/15/ ... -approach/