<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[الفريق العربي للهندسة العكسية - البرامج و أدوات الهندسة العكسية - RCE Tools]]></title>
		<link>https://www.at4re.net/f/</link>
		<description><![CDATA[الفريق العربي للهندسة العكسية - https://www.at4re.net/f]]></description>
		<pubDate>Fri, 01 May 2026 17:41:33 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[Binary Ninja 5.3.9434 Personal Edition]]></title>
			<link>https://www.at4re.net/f/thread-5147.html</link>
			<pubDate>Tue, 28 Apr 2026 07:36:02 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=4197">Lauda937</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-5147.html</guid>
			<description><![CDATA[Binary Ninja 5.3.9434 Personal (Windows only):<br />
<br />
Binary Ninja is an interactive decompiler, disassembler, debugger, and binary analysis platform created by reverse engineers for reverse engineers. Designed with a focus on providing a high-quality automation API and a clean, easy-to-use graphical interface, Binary Ninja is actively used by malware analysts, vulnerability researchers, and software developers worldwide. Decompile software built for many common architectures on Windows, macOS, and Linux.<br />
<br />
Homepage:<br />
<br />
<pre class="block-code line-numbers"><code class="language-none">https://binary.ninja/
</code></pre><br />
Preview:<br />
<br />
<a href="https://postimage.me/image/9lNt" target="_blank" rel="noopener" class="mycode_url">https://postimage.me/image/9lNt</a><br />
<br />
Download (Google Drive):<br />
<br />
<a href="https://drive.google.com/file/d/1cM2A2FEkboekqSvy3j49tay6GMV8CEyT/view?usp=drive_link" target="_blank" rel="noopener" class="mycode_url">https://drive.google.com/file/d/1cM2A2FE...drive_link</a><br />
<br />
Replace with this patched DLL file (or you can patch it yourself), and then use the license provided below.<br />
<br />
Download (Google Drive):<br />
<br />
Patcher code:<br />
<br />
<pre class="block-code line-numbers"><code class="language-python">if __name__ == &quot;__main__&quot;:
f=open(&quot;binaryninjacore.dll&quot;,&quot;r+b&quot;)
f.seek(0x014A386D)
f.write(b&quot;\x85&quot;)
</code></pre><br />
Patched DLL file:<br />
<br />
<a href="https://drive.google.com/file/d/1jxLEiRLueG5_d1FLGy2K_vFEeHaJ82gV/view?usp=drive_link" target="_blank" rel="noopener" class="mycode_url">https://drive.google.com/file/d/1jxLEiRL...drive_link</a><br />
<br />
License:<br />
<br />
<a href="https://drive.google.com/file/d/1VNTydas6hqDswnoJ1EUz_gv2hyae056j/view?usp=drive_link" target="_blank" rel="noopener" class="mycode_url">https://drive.google.com/file/d/1VNTydas...drive_link</a>]]></description>
			<content:encoded><![CDATA[Binary Ninja 5.3.9434 Personal (Windows only):<br />
<br />
Binary Ninja is an interactive decompiler, disassembler, debugger, and binary analysis platform created by reverse engineers for reverse engineers. Designed with a focus on providing a high-quality automation API and a clean, easy-to-use graphical interface, Binary Ninja is actively used by malware analysts, vulnerability researchers, and software developers worldwide. Decompile software built for many common architectures on Windows, macOS, and Linux.<br />
<br />
Homepage:<br />
<br />
<pre class="block-code line-numbers"><code class="language-none">https://binary.ninja/
</code></pre><br />
Preview:<br />
<br />
<a href="https://postimage.me/image/9lNt" target="_blank" rel="noopener" class="mycode_url">https://postimage.me/image/9lNt</a><br />
<br />
Download (Google Drive):<br />
<br />
<a href="https://drive.google.com/file/d/1cM2A2FEkboekqSvy3j49tay6GMV8CEyT/view?usp=drive_link" target="_blank" rel="noopener" class="mycode_url">https://drive.google.com/file/d/1cM2A2FE...drive_link</a><br />
<br />
Replace with this patched DLL file (or you can patch it yourself), and then use the license provided below.<br />
<br />
Download (Google Drive):<br />
<br />
Patcher code:<br />
<br />
<pre class="block-code line-numbers"><code class="language-python">if __name__ == &quot;__main__&quot;:
f=open(&quot;binaryninjacore.dll&quot;,&quot;r+b&quot;)
f.seek(0x014A386D)
f.write(b&quot;\x85&quot;)
</code></pre><br />
Patched DLL file:<br />
<br />
<a href="https://drive.google.com/file/d/1jxLEiRLueG5_d1FLGy2K_vFEeHaJ82gV/view?usp=drive_link" target="_blank" rel="noopener" class="mycode_url">https://drive.google.com/file/d/1jxLEiRL...drive_link</a><br />
<br />
License:<br />
<br />
<a href="https://drive.google.com/file/d/1VNTydas6hqDswnoJ1EUz_gv2hyae056j/view?usp=drive_link" target="_blank" rel="noopener" class="mycode_url">https://drive.google.com/file/d/1VNTydas...drive_link</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[ExeinfoPE v0.0.9.6 Test 3]]></title>
			<link>https://www.at4re.net/f/thread-5140.html</link>
			<pubDate>Wed, 22 Apr 2026 21:06:21 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=4197">Lauda937</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-5140.html</guid>
			<description><![CDATA[ExeinfoPE v0.0.9.6 Test 3<br />
<br />
<img src="https://i.postimg.cc/SnsFNHzb/1.jpg" loading="lazy"  alt="[صورة مرفقة: 1.jpg]" class="mycode_img" /><br />
<br />
This is still test version.<br />
<br />
<a href="https://mega.nz/file/IUEw0JSK#RGlQiZ0uTHPAcU2mtr82a2QhrrHk9ZvsVCrLYAtP474" target="_blank" rel="noopener" class="mycode_url">https://mega.nz/file/IUEw0JSK#RGlQiZ0uTH...CrLYAtP474</a>]]></description>
			<content:encoded><![CDATA[ExeinfoPE v0.0.9.6 Test 3<br />
<br />
<img src="https://i.postimg.cc/SnsFNHzb/1.jpg" loading="lazy"  alt="[صورة مرفقة: 1.jpg]" class="mycode_img" /><br />
<br />
This is still test version.<br />
<br />
<a href="https://mega.nz/file/IUEw0JSK#RGlQiZ0uTHPAcU2mtr82a2QhrrHk9ZvsVCrLYAtP474" target="_blank" rel="noopener" class="mycode_url">https://mega.nz/file/IUEw0JSK#RGlQiZ0uTH...CrLYAtP474</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[x64dbg 2026-04-20_19-04 Snapshot]]></title>
			<link>https://www.at4re.net/f/thread-5139.html</link>
			<pubDate>Wed, 22 Apr 2026 20:27:50 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=4197">Lauda937</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-5139.html</guid>
			<description><![CDATA[<img src="https://i.postimg.cc/Pf89jQBR/Screenshot-(579).png" loading="lazy"  alt="[صورة مرفقة: Screenshot-(579).png]" class="mycode_img" /><br />
<br />
An open-source binary debugger for Windows, aimed at malware analysis and reverse engineering of executables you do not have the source code for. It offers a wide range of advanced debugging features along with a powerful plugin system, allowing you to extend and customize functionality to fit your workflow. More information is available on the official site and documentation.<br />
<br />
Features:<br />
Open-source<br />
Intuitive and familiar, yet modern user interface<br />
C-like expression parser<br />
Full-featured debugging of DLL and EXE files (TitanEngine)<br />
IDA-like sidebar with jump arrows<br />
IDA-like instruction token highlighter (highlight registers, etc.)<br />
Memory map<br />
Symbol view<br />
Thread view<br />
Source code view<br />
Graph view (exportable as PDF)<br />
Content-sensitive register view<br />
Fully customizable color scheme<br />
Dynamically recognize modules and strings<br />
Import reconstructor integrated (Scylla)<br />
Fast disassembler (BeaEngine)<br />
User database (JSON) for comments, labels, bookmarks, etc.<br />
Plugin support with growing API<br />
Extendable, debuggable scripting language for automation<br />
Multi-datatype memory dump<br />
Basic debug symbol (PDB) support<br />
Dynamic stack view<br />
Built-in assembler (XEDParse)<br />
Executable patching<br />
Analysis tools<br />
Accessibility support (screen readers &amp; UI automation)<br />
Improved pattern finding and breakpoint validation<br />
Bulk breakpoint toggling &amp; enhanced search/filter tools<br />
Overview:<br />
Active development<br />
x64dbg continues to receive frequent updates with fixes, improvements, and new features.<br />
GPLv3<br />
Both executable and source code are available. Contributions are welcome.<br />
Customizable<br />
Write plugins in C++, customize UI colors, and tailor the debugger to your needs.<br />
x64/x32 support<br />
Debug both 64-bit and 32-bit applications within a single interface.<br />
Built on open-source libraries<br />
Uses Qt, TitanEngine, BeaEngine, Scylla, Jansson, lz4, XEDParse, and more.<br />
Modern improvements<br />
Includes ongoing UX polish, stability fixes, and early accessibility groundwork.<br />
Scriptable<br />
Integrated, debuggable scripting language for automation and workflows.<br />
Community-driven<br />
Features are heavily influenced by the reverse engineering community.<br />
Extendable<br />
Create plugins to add commands or integrate external tools.<br />
Homepage:<br />
x64dbg<br />
<a href="https://x64dbg.com/" target="_blank" rel="noopener" class="mycode_url">https://x64dbg.com/</a><br />
GitHub<br />
<a href="https://github.com/x64dbg/x64dbg" target="_blank" rel="noopener" class="mycode_url">https://github.com/x64dbg/x64dbg</a><br />
Plugins:<br />
<a href="https://plugins.x64dbg.com/" target="_blank" rel="noopener" class="mycode_url">https://plugins.x64dbg.com/</a><br />
<br />
Wiki:<br />
<a href="https://wiki.x64dbg.com/" target="_blank" rel="noopener" class="mycode_url">https://wiki.x64dbg.com/</a><br />
<br />
Download:<br />
<a href="https://github.com/x64dbg/x64dbg/releases/download/2026.04.20/snapshot_2026-04-20_19-04.zip" target="_blank" rel="noopener" class="mycode_url">https://github.com/x64dbg/x64dbg/release..._19-04.zip</a>]]></description>
			<content:encoded><![CDATA[<img src="https://i.postimg.cc/Pf89jQBR/Screenshot-(579).png" loading="lazy"  alt="[صورة مرفقة: Screenshot-(579).png]" class="mycode_img" /><br />
<br />
An open-source binary debugger for Windows, aimed at malware analysis and reverse engineering of executables you do not have the source code for. It offers a wide range of advanced debugging features along with a powerful plugin system, allowing you to extend and customize functionality to fit your workflow. More information is available on the official site and documentation.<br />
<br />
Features:<br />
Open-source<br />
Intuitive and familiar, yet modern user interface<br />
C-like expression parser<br />
Full-featured debugging of DLL and EXE files (TitanEngine)<br />
IDA-like sidebar with jump arrows<br />
IDA-like instruction token highlighter (highlight registers, etc.)<br />
Memory map<br />
Symbol view<br />
Thread view<br />
Source code view<br />
Graph view (exportable as PDF)<br />
Content-sensitive register view<br />
Fully customizable color scheme<br />
Dynamically recognize modules and strings<br />
Import reconstructor integrated (Scylla)<br />
Fast disassembler (BeaEngine)<br />
User database (JSON) for comments, labels, bookmarks, etc.<br />
Plugin support with growing API<br />
Extendable, debuggable scripting language for automation<br />
Multi-datatype memory dump<br />
Basic debug symbol (PDB) support<br />
Dynamic stack view<br />
Built-in assembler (XEDParse)<br />
Executable patching<br />
Analysis tools<br />
Accessibility support (screen readers &amp; UI automation)<br />
Improved pattern finding and breakpoint validation<br />
Bulk breakpoint toggling &amp; enhanced search/filter tools<br />
Overview:<br />
Active development<br />
x64dbg continues to receive frequent updates with fixes, improvements, and new features.<br />
GPLv3<br />
Both executable and source code are available. Contributions are welcome.<br />
Customizable<br />
Write plugins in C++, customize UI colors, and tailor the debugger to your needs.<br />
x64/x32 support<br />
Debug both 64-bit and 32-bit applications within a single interface.<br />
Built on open-source libraries<br />
Uses Qt, TitanEngine, BeaEngine, Scylla, Jansson, lz4, XEDParse, and more.<br />
Modern improvements<br />
Includes ongoing UX polish, stability fixes, and early accessibility groundwork.<br />
Scriptable<br />
Integrated, debuggable scripting language for automation and workflows.<br />
Community-driven<br />
Features are heavily influenced by the reverse engineering community.<br />
Extendable<br />
Create plugins to add commands or integrate external tools.<br />
Homepage:<br />
x64dbg<br />
<a href="https://x64dbg.com/" target="_blank" rel="noopener" class="mycode_url">https://x64dbg.com/</a><br />
GitHub<br />
<a href="https://github.com/x64dbg/x64dbg" target="_blank" rel="noopener" class="mycode_url">https://github.com/x64dbg/x64dbg</a><br />
Plugins:<br />
<a href="https://plugins.x64dbg.com/" target="_blank" rel="noopener" class="mycode_url">https://plugins.x64dbg.com/</a><br />
<br />
Wiki:<br />
<a href="https://wiki.x64dbg.com/" target="_blank" rel="noopener" class="mycode_url">https://wiki.x64dbg.com/</a><br />
<br />
Download:<br />
<a href="https://github.com/x64dbg/x64dbg/releases/download/2026.04.20/snapshot_2026-04-20_19-04.zip" target="_blank" rel="noopener" class="mycode_url">https://github.com/x64dbg/x64dbg/release..._19-04.zip</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[اخر اصدار من الاسطوانه الشامله الكامله]]></title>
			<link>https://www.at4re.net/f/thread-5105.html</link>
			<pubDate>Wed, 01 Apr 2026 03:43:15 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=4868">elswah79</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-5105.html</guid>
			<description><![CDATA[الان يمكنك تحميل اي اداه تريدها من خلال الاسطوانه    <br />
<img src="https://raw.githubusercontent.com/Jakiboy/ReVens/main/assets/preview/screenshot.png" loading="lazy"  alt="[صورة مرفقة: screenshot.png]" class="mycode_img" /><br />
فحص الاسطوانه علي فيرس توتال <a href="https://www.virustotal.com/gui/file/5efb2f00b0f8b0cbc56aca1df52f7440acb1483b7efeffcb250d711a01a9e87a?nocache=1" target="_blank" rel="noopener" class="mycode_url">https://www.virustotal.com/gui/file/5efb...?nocache=1</a><br />
لنك تحميل مباشر <a href="https://github.com/Jakiboy/ReVens/releases/download/1.5.5/ReVens-v1.5.5-Windows-Installer-x64.exe" target="_blank" rel="noopener" class="mycode_url">https://github.com/Jakiboy/ReVens/releas...er-x64.exe</a>]]></description>
			<content:encoded><![CDATA[الان يمكنك تحميل اي اداه تريدها من خلال الاسطوانه    <br />
<img src="https://raw.githubusercontent.com/Jakiboy/ReVens/main/assets/preview/screenshot.png" loading="lazy"  alt="[صورة مرفقة: screenshot.png]" class="mycode_img" /><br />
فحص الاسطوانه علي فيرس توتال <a href="https://www.virustotal.com/gui/file/5efb2f00b0f8b0cbc56aca1df52f7440acb1483b7efeffcb250d711a01a9e87a?nocache=1" target="_blank" rel="noopener" class="mycode_url">https://www.virustotal.com/gui/file/5efb...?nocache=1</a><br />
لنك تحميل مباشر <a href="https://github.com/Jakiboy/ReVens/releases/download/1.5.5/ReVens-v1.5.5-Windows-Installer-x64.exe" target="_blank" rel="noopener" class="mycode_url">https://github.com/Jakiboy/ReVens/releas...er-x64.exe</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[All RCE tools]]></title>
			<link>https://www.at4re.net/f/thread-5101.html</link>
			<pubDate>Tue, 31 Mar 2026 00:43:36 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=6691">cesar85</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-5101.html</guid>
			<description><![CDATA[Here you can find many RCE tools ready to download<br />
<a href="https://down.52pojie.cn/Tools/" target="_blank" rel="noopener" class="mycode_url">https://down.52pojie.cn/Tools/</a>]]></description>
			<content:encoded><![CDATA[Here you can find many RCE tools ready to download<br />
<a href="https://down.52pojie.cn/Tools/" target="_blank" rel="noopener" class="mycode_url">https://down.52pojie.cn/Tools/</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[HexRays IDA Pro 9.3.260327 sp1]]></title>
			<link>https://www.at4re.net/f/thread-5096.html</link>
			<pubDate>Sun, 29 Mar 2026 08:56:33 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=35">Th3-R3p4ck3r</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-5096.html</guid>
			<description><![CDATA[<div style="text-align: center;" class="mycode_align">
بسم الله الرحمن الرحيم<br />
<br />
HexRays IDA Pro 9.3.260327 sp1<br />
<br />
<img src="https://docs.hex-rays.com/~gitbook/image?url=https%3A%2F%2F3899235193-files.gitbook.io%2F%7E%2Ffiles%2Fv0%2Fb%2Fgitbook-x-prod.appspot.com%2Fo%2Fspaces%252Fd4yKxBBBv1qcoSuL2US4%252Fuploads%252Fgit-blob-3fc7f0f8929f3b668f5b73b97863424467dee618%252Fida9_3.png%3Falt%3Dmedia&amp;width=768&amp;dpr=1&amp;quality=100&amp;sign=9fc5ec68&amp;sv=2" loading="lazy"  width="768" height="435" alt="[صورة مرفقة: image?url=https%3A%2F%2F3899235193-files...5ec68&amp;sv=2]" class="mycode_img" /><br />
<br />
<br />
A powerful disassembler, decompiler and a versatile debugger. In one tool.<br />
</div><ul class="mycode_list"><li>التفكيك (Disassembler): يدعم عددًا كبيرًا من المعالجات وصيغ الملفات، مما يجعله مناسبًا لتحليل الأنظمة المدمجة، تطبيقات الهواتف، والبرامج المعقدة.<br />
</li>
<li>إخراج عالي الجودة: ينتج مخرجات تفكيك واضحة وقابلة للفهم مع إمكانية إضافة أسماء وتعليقات وبُنى عالية المستوى.<br />
</li>
<li>إعادة الترجمة (Decompiler): يولد كود شبه برمجي (Pseudocode) مقروء وقابل للصيانة، مع الحفاظ على البنية والمعنى الأصلي.<br />
</li>
<li>خدمة Lumina: توفر بيانات وصفية عن الدوال المعروفة (مثل الأسماء وأنواع المعاملات)، مع خيار تشغيل خادم خاص للتحكم بالبيانات.<br />
</li>
<li>تقنية FLIRT: تساعد في التعرف على المكتبات المدمجة داخل الملفات التنفيذية، مما يسهل فهم الكود.<br />
</li>
<li>خيارات المنتجات: تتضمن نسخًا مختلفة مثل IDA Free، IDA Home، ونسخة IDA Pro الكاملة، بالإضافة إلى إضافات مثل Lumina الخاصة، ودورات تدريبية.<br />
</li>
<li>مجالات الاستخدام: تحليل البرمجيات الخبيثة، اختبار الثغرات، الأمن في السيارات، التوافقية، والتقييمات البرمجية.<br />
</li>
<li>المجتمع والموارد: يتوفر منتدى، مدونة، إضافات، مسابقات، وبرامج تحفيزية للمطورين.<br />
</li>
</ul>
<div style="text-align: center;" class="mycode_align">
الجديد فى هذا الاصدار<br />
<br />
<a href="https://docs.hex-rays.com/release-notes/9_3sp1" target="_blank" rel="noopener" class="mycode_url">IDA 9.3 | Hex-Rays Docs</a><br />
<br />
التحميل بالمرفقات</div><br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://www.at4re.net/f/images/attachtypes/txt.png" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=3572" target="_blank" title="">IDA PRO 9.3 SP1.txt</a> (الحجم : 162 bytes / التحميلات : 2)
<!-- end: postbit_attachments_attachment -->]]></description>
			<content:encoded><![CDATA[<div style="text-align: center;" class="mycode_align">
بسم الله الرحمن الرحيم<br />
<br />
HexRays IDA Pro 9.3.260327 sp1<br />
<br />
<img src="https://docs.hex-rays.com/~gitbook/image?url=https%3A%2F%2F3899235193-files.gitbook.io%2F%7E%2Ffiles%2Fv0%2Fb%2Fgitbook-x-prod.appspot.com%2Fo%2Fspaces%252Fd4yKxBBBv1qcoSuL2US4%252Fuploads%252Fgit-blob-3fc7f0f8929f3b668f5b73b97863424467dee618%252Fida9_3.png%3Falt%3Dmedia&amp;width=768&amp;dpr=1&amp;quality=100&amp;sign=9fc5ec68&amp;sv=2" loading="lazy"  width="768" height="435" alt="[صورة مرفقة: image?url=https%3A%2F%2F3899235193-files...5ec68&amp;sv=2]" class="mycode_img" /><br />
<br />
<br />
A powerful disassembler, decompiler and a versatile debugger. In one tool.<br />
</div><ul class="mycode_list"><li>التفكيك (Disassembler): يدعم عددًا كبيرًا من المعالجات وصيغ الملفات، مما يجعله مناسبًا لتحليل الأنظمة المدمجة، تطبيقات الهواتف، والبرامج المعقدة.<br />
</li>
<li>إخراج عالي الجودة: ينتج مخرجات تفكيك واضحة وقابلة للفهم مع إمكانية إضافة أسماء وتعليقات وبُنى عالية المستوى.<br />
</li>
<li>إعادة الترجمة (Decompiler): يولد كود شبه برمجي (Pseudocode) مقروء وقابل للصيانة، مع الحفاظ على البنية والمعنى الأصلي.<br />
</li>
<li>خدمة Lumina: توفر بيانات وصفية عن الدوال المعروفة (مثل الأسماء وأنواع المعاملات)، مع خيار تشغيل خادم خاص للتحكم بالبيانات.<br />
</li>
<li>تقنية FLIRT: تساعد في التعرف على المكتبات المدمجة داخل الملفات التنفيذية، مما يسهل فهم الكود.<br />
</li>
<li>خيارات المنتجات: تتضمن نسخًا مختلفة مثل IDA Free، IDA Home، ونسخة IDA Pro الكاملة، بالإضافة إلى إضافات مثل Lumina الخاصة، ودورات تدريبية.<br />
</li>
<li>مجالات الاستخدام: تحليل البرمجيات الخبيثة، اختبار الثغرات، الأمن في السيارات، التوافقية، والتقييمات البرمجية.<br />
</li>
<li>المجتمع والموارد: يتوفر منتدى، مدونة، إضافات، مسابقات، وبرامج تحفيزية للمطورين.<br />
</li>
</ul>
<div style="text-align: center;" class="mycode_align">
الجديد فى هذا الاصدار<br />
<br />
<a href="https://docs.hex-rays.com/release-notes/9_3sp1" target="_blank" rel="noopener" class="mycode_url">IDA 9.3 | Hex-Rays Docs</a><br />
<br />
التحميل بالمرفقات</div><br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://www.at4re.net/f/images/attachtypes/txt.png" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=3572" target="_blank" title="">IDA PRO 9.3 SP1.txt</a> (الحجم : 162 bytes / التحميلات : 2)
<!-- end: postbit_attachments_attachment -->]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[HexRays IDA Pro 9.3.260213]]></title>
			<link>https://www.at4re.net/f/thread-5059.html</link>
			<pubDate>Sun, 15 Feb 2026 08:42:46 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=35">Th3-R3p4ck3r</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-5059.html</guid>
			<description><![CDATA[<div style="text-align: center;" class="mycode_align">بسم الله الرحمن الرحيم<br />
<br />
HexRays IDA Pro 9.3.260213<br />
<br />
<img src="https://docs.hex-rays.com/~gitbook/image?url=https%3A%2F%2F3899235193-files.gitbook.io%2F%7E%2Ffiles%2Fv0%2Fb%2Fgitbook-x-prod.appspot.com%2Fo%2Fspaces%252Fd4yKxBBBv1qcoSuL2US4%252Fuploads%252Fgit-blob-3fc7f0f8929f3b668f5b73b97863424467dee618%252Fida9_3.png%3Falt%3Dmedia&amp;width=768&amp;dpr=1&amp;quality=100&amp;sign=9fc5ec68&amp;sv=2" loading="lazy"  width="768" height="435" alt="[صورة مرفقة: image?url=https%3A%2F%2F3899235193-files...5ec68&amp;sv=2]" class="mycode_img" /><br />
<br />
<br />
A powerful disassembler, decompiler and a versatile debugger. In one tool.<br />
 <ul class="mycode_list"><li><span style="font-weight: bold;" class="mycode_b">التفكيك (Disassembler):</span> يدعم عددًا كبيرًا من المعالجات وصيغ الملفات، مما يجعله مناسبًا لتحليل الأنظمة المدمجة، تطبيقات الهواتف، والبرامج المعقدة.<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">إخراج عالي الجودة:</span> ينتج مخرجات تفكيك واضحة وقابلة للفهم مع إمكانية إضافة أسماء وتعليقات وبُنى عالية المستوى.<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">إعادة الترجمة (Decompiler):</span> يولد كود شبه برمجي (Pseudocode) مقروء وقابل للصيانة، مع الحفاظ على البنية والمعنى الأصلي.<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">خدمة Lumina:</span> توفر بيانات وصفية عن الدوال المعروفة (مثل الأسماء وأنواع المعاملات)، مع خيار تشغيل خادم خاص للتحكم بالبيانات.<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">تقنية FLIRT:</span> تساعد في التعرف على المكتبات المدمجة داخل الملفات التنفيذية، مما يسهل فهم الكود.<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">خيارات المنتجات:</span> تتضمن نسخًا مختلفة مثل IDA Free، IDA Home، ونسخة IDA Pro الكاملة، بالإضافة إلى إضافات مثل Lumina الخاصة، ودورات تدريبية.<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">مجالات الاستخدام:</span> تحليل البرمجيات الخبيثة، اختبار الثغرات، الأمن في السيارات، التوافقية، والتقييمات البرمجية.<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">المجتمع والموارد:</span> يتوفر منتدى، مدونة، إضافات، مسابقات، وبرامج تحفيزية للمطورين.<br />
</li>
</ul>
<br />
الجديد فى هذا الاصدار<br />
<br />
<a href="https://docs.hex-rays.com/release-notes/9_3" target="_blank" rel="noopener" class="mycode_url">IDA 9.3 | Hex-Rays Docs</a><br />
<br />
التحميل بالمرفقات</div><br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://www.at4re.net/f/images/attachtypes/txt.png" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=3552" target="_blank" title="">ida pro 9.3.txt</a> (الحجم : 204 bytes / التحميلات : 12)
<!-- end: postbit_attachments_attachment -->]]></description>
			<content:encoded><![CDATA[<div style="text-align: center;" class="mycode_align">بسم الله الرحمن الرحيم<br />
<br />
HexRays IDA Pro 9.3.260213<br />
<br />
<img src="https://docs.hex-rays.com/~gitbook/image?url=https%3A%2F%2F3899235193-files.gitbook.io%2F%7E%2Ffiles%2Fv0%2Fb%2Fgitbook-x-prod.appspot.com%2Fo%2Fspaces%252Fd4yKxBBBv1qcoSuL2US4%252Fuploads%252Fgit-blob-3fc7f0f8929f3b668f5b73b97863424467dee618%252Fida9_3.png%3Falt%3Dmedia&amp;width=768&amp;dpr=1&amp;quality=100&amp;sign=9fc5ec68&amp;sv=2" loading="lazy"  width="768" height="435" alt="[صورة مرفقة: image?url=https%3A%2F%2F3899235193-files...5ec68&amp;sv=2]" class="mycode_img" /><br />
<br />
<br />
A powerful disassembler, decompiler and a versatile debugger. In one tool.<br />
 <ul class="mycode_list"><li><span style="font-weight: bold;" class="mycode_b">التفكيك (Disassembler):</span> يدعم عددًا كبيرًا من المعالجات وصيغ الملفات، مما يجعله مناسبًا لتحليل الأنظمة المدمجة، تطبيقات الهواتف، والبرامج المعقدة.<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">إخراج عالي الجودة:</span> ينتج مخرجات تفكيك واضحة وقابلة للفهم مع إمكانية إضافة أسماء وتعليقات وبُنى عالية المستوى.<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">إعادة الترجمة (Decompiler):</span> يولد كود شبه برمجي (Pseudocode) مقروء وقابل للصيانة، مع الحفاظ على البنية والمعنى الأصلي.<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">خدمة Lumina:</span> توفر بيانات وصفية عن الدوال المعروفة (مثل الأسماء وأنواع المعاملات)، مع خيار تشغيل خادم خاص للتحكم بالبيانات.<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">تقنية FLIRT:</span> تساعد في التعرف على المكتبات المدمجة داخل الملفات التنفيذية، مما يسهل فهم الكود.<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">خيارات المنتجات:</span> تتضمن نسخًا مختلفة مثل IDA Free، IDA Home، ونسخة IDA Pro الكاملة، بالإضافة إلى إضافات مثل Lumina الخاصة، ودورات تدريبية.<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">مجالات الاستخدام:</span> تحليل البرمجيات الخبيثة، اختبار الثغرات، الأمن في السيارات، التوافقية، والتقييمات البرمجية.<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">المجتمع والموارد:</span> يتوفر منتدى، مدونة، إضافات، مسابقات، وبرامج تحفيزية للمطورين.<br />
</li>
</ul>
<br />
الجديد فى هذا الاصدار<br />
<br />
<a href="https://docs.hex-rays.com/release-notes/9_3" target="_blank" rel="noopener" class="mycode_url">IDA 9.3 | Hex-Rays Docs</a><br />
<br />
التحميل بالمرفقات</div><br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://www.at4re.net/f/images/attachtypes/txt.png" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=3552" target="_blank" title="">ida pro 9.3.txt</a> (الحجم : 204 bytes / التحميلات : 12)
<!-- end: postbit_attachments_attachment -->]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[WinAPIOverride]]></title>
			<link>https://www.at4re.net/f/thread-5044.html</link>
			<pubDate>Mon, 09 Feb 2026 07:52:46 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=35">Th3-R3p4ck3r</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-5044.html</guid>
			<description><![CDATA[<div style="text-align: center;" class="mycode_align"> <br />
<div style="text-align: right;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b">بسم الله الرحمن الرحيم</span></div>
<hr class="mycode_hr" />
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">WinAPIOverride</div>
<div style="text-align: center;" class="mycode_align"> <br />
<br />
<a href="https://imgbb.com/" target="_blank" rel="noopener" class="mycode_url"><img src="https://i.ibb.co/ym6qSR7Y/api.jpg" loading="lazy"  alt="[صورة مرفقة: api.jpg]" class="mycode_img" /></a></div>
<div style="text-align: center;" class="mycode_align"> هو برنامج متقدم لمراقبة واجهات برمجة التطبيقات (API) للعمليات بنظامي 32 و64 بت.<br />
يمكنك مراقبة أو تعديل أي دالة داخل عملية ما، سواء كانت دوال API أو دوال داخلية في الملف التنفيذي.</div>
<div style="text-align: center;" class="mycode_align">يحاول هذا البرنامج سد الفجوة بين برامج مراقبة الـ API التقليدية وبين أدوات التصحيح (Debuggers).<br />
فهو قادر على إيقاف التطبيق المستهدف قبل أو بعد استدعاء الدالة،<br />
مما يسمح بتغيير الذاكرة أو السجلات، كما يمكنه استدعاء دوال التطبيق المستهدف مباشرة.</div>
<div style="text-align: center;" class="mycode_align">
<br />
<span style="font-weight: bold;" class="mycode_b">أهم الفروقات عن برامج مراقبة الـ API الأخرى:</span></div><ul class="mycode_list"><li><div style="text-align: center;" class="mycode_align">يمكنك تحديد مرشحات (Filters) على المعاملات أو نتائج الدوال.</div>
</li>
<li><div style="text-align: center;" class="mycode_align">يمكنك تحديد مرشحات على ملفات DLL لاستبعاد الاستدعاءات القادمة من مكتبات النظام الخاصة بويندوز.</div>
</li>
<li><div style="text-align: center;" class="mycode_align">يمكنك ربط (Hook) دوال داخل العملية المستهدفة، وليس فقط دوال الـ API.</div>
</li>
<li><div style="text-align: center;" class="mycode_align">يمكنك ربط دوال بلغة التجميع (ASM) التي تمرر المعاملات عبر السجلات.</div>
</li>
<li><div style="text-align: center;" class="mycode_align">يمكنك ربط الاستثناءات البرمجية والعتادية.</div>
</li>
<li><div style="text-align: center;" class="mycode_align">يتم تسجيل نتائج النوعين Double وFloat.</div>
</li>
<li><div style="text-align: center;" class="mycode_align">يمكنك بسهولة تعديل أي دالة API أو أي دالة داخلية في العملية.</div>
</li>
<li><div style="text-align: center;" class="mycode_align">يمكنك إيقاف العملية قبل أو بعد استدعاء الدالة لتغيير الذاكرة أو السجلات.</div>
</li>
<li><div style="text-align: center;" class="mycode_align">يمكنك تخطي استدعاء دالة من نافذة الإيقاف (لن يتم استدعاؤها في هذه المرة).</div>
</li>
<li><div style="text-align: center;" class="mycode_align">يمكنك استدعاء دوال موجودة داخل العمليات البعيدة (Remote Processes).</div>
</li>
<li><div style="text-align: center;" class="mycode_align">يمكنه ربط واجهات COM OLE وActiveX.</div>
</li>
<li><div style="text-align: center;" class="mycode_align">يدعم الأنواع المعرفة من قبل المستخدم (enum, struct, union) والتعريفات الخاصة.</div>
</li>
<li><div style="text-align: center;" class="mycode_align">كل شيء يتم بطريقة وحدات (Modules): يمكنك تسجيل أو تعديل أي دالة بشكل مستقل.</div>
</li>
<li><div style="text-align: center;" class="mycode_align">يمكنك إجراء <span style="font-weight: bold;" class="mycode_b">Fuzzing</span> لملف ثنائي، حيث يتم ذلك مباشرة من ملف المراقبة دون الحاجة لعمل إضافي.<br />
يمكن أن يتم الـ Fuzzing بمعاملات صفرية أو عشوائية، ويتم تسجيل هذه العمليات مثل استدعاءات الدوال.</div>
</li>
</ul>
<div style="text-align: center;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b">كيف يختلف عن البرامج المشابهة:</span></div><ul class="mycode_list"><li><div style="text-align: center;" class="mycode_align">مرشحات حسب معاملات الدوال ونتائجها.</div>
</li>
<li><div style="text-align: center;" class="mycode_align">مرشحات حسب ملفات DLL، بحيث يمكنك قطع استدعاءات النظام ورؤية ما هو مهم فقط.</div>
</li>
<li><div style="text-align: center;" class="mycode_align">الربط ليس فقط على دوال الـ API، بل أيضاً على الدوال الداخلية للعملية.</div>
</li>
<li><div style="text-align: center;" class="mycode_align">يعمل مع دوال التجميع (ASM).</div>
</li>
<li><div style="text-align: center;" class="mycode_align">التقاط الاستثناءات العتادية والبرمجية.</div>
</li>
<li><div style="text-align: center;" class="mycode_align">تسجيل نتائج Double وFloat.</div>
</li>
<li><div style="text-align: center;" class="mycode_align">إمكانية التلاعب (Spoofing) بأي دوال API أو دوال داخلية للعملية.</div>
</li>
<li><div style="text-align: center;" class="mycode_align">نقاط توقف قبل وبعد الاستدعاء مع القدرة على تعديل الذاكرة والسجلات.</div>
</li>
<li><div style="text-align: center;" class="mycode_align">استدعاء دوال داخل العمليات البعيدة.</div>
</li>
<li><div style="text-align: center;" class="mycode_align">ربط واجهات COM OLE وActiveX.</div>
</li>
<li><div style="text-align: center;" class="mycode_align">دعم الأنواع المخصصة.</div>
</li>
<li><div style="text-align: center;" class="mycode_align">نظام وحدات، التسجيل والاستبدال بشكل مستقل.</div>
</li>
</ul>
<hr class="mycode_hr" />
<div style="text-align: center;" class="mycode_align">Download<br />
المرفقات</div>
<div style="text-align: right;" class="mycode_align"> </div>
</div><br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://www.at4re.net/f/images/attachtypes/txt.png" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=3543" target="_blank" title="">WinAPI.txt</a> (الحجم : 331 bytes / التحميلات : 3)
<!-- end: postbit_attachments_attachment -->]]></description>
			<content:encoded><![CDATA[<div style="text-align: center;" class="mycode_align"> <br />
<div style="text-align: right;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b">بسم الله الرحمن الرحيم</span></div>
<hr class="mycode_hr" />
<div style="text-align: center;" class="mycode_align"> </div>
<div style="text-align: center;" class="mycode_align">WinAPIOverride</div>
<div style="text-align: center;" class="mycode_align"> <br />
<br />
<a href="https://imgbb.com/" target="_blank" rel="noopener" class="mycode_url"><img src="https://i.ibb.co/ym6qSR7Y/api.jpg" loading="lazy"  alt="[صورة مرفقة: api.jpg]" class="mycode_img" /></a></div>
<div style="text-align: center;" class="mycode_align"> هو برنامج متقدم لمراقبة واجهات برمجة التطبيقات (API) للعمليات بنظامي 32 و64 بت.<br />
يمكنك مراقبة أو تعديل أي دالة داخل عملية ما، سواء كانت دوال API أو دوال داخلية في الملف التنفيذي.</div>
<div style="text-align: center;" class="mycode_align">يحاول هذا البرنامج سد الفجوة بين برامج مراقبة الـ API التقليدية وبين أدوات التصحيح (Debuggers).<br />
فهو قادر على إيقاف التطبيق المستهدف قبل أو بعد استدعاء الدالة،<br />
مما يسمح بتغيير الذاكرة أو السجلات، كما يمكنه استدعاء دوال التطبيق المستهدف مباشرة.</div>
<div style="text-align: center;" class="mycode_align">
<br />
<span style="font-weight: bold;" class="mycode_b">أهم الفروقات عن برامج مراقبة الـ API الأخرى:</span></div><ul class="mycode_list"><li><div style="text-align: center;" class="mycode_align">يمكنك تحديد مرشحات (Filters) على المعاملات أو نتائج الدوال.</div>
</li>
<li><div style="text-align: center;" class="mycode_align">يمكنك تحديد مرشحات على ملفات DLL لاستبعاد الاستدعاءات القادمة من مكتبات النظام الخاصة بويندوز.</div>
</li>
<li><div style="text-align: center;" class="mycode_align">يمكنك ربط (Hook) دوال داخل العملية المستهدفة، وليس فقط دوال الـ API.</div>
</li>
<li><div style="text-align: center;" class="mycode_align">يمكنك ربط دوال بلغة التجميع (ASM) التي تمرر المعاملات عبر السجلات.</div>
</li>
<li><div style="text-align: center;" class="mycode_align">يمكنك ربط الاستثناءات البرمجية والعتادية.</div>
</li>
<li><div style="text-align: center;" class="mycode_align">يتم تسجيل نتائج النوعين Double وFloat.</div>
</li>
<li><div style="text-align: center;" class="mycode_align">يمكنك بسهولة تعديل أي دالة API أو أي دالة داخلية في العملية.</div>
</li>
<li><div style="text-align: center;" class="mycode_align">يمكنك إيقاف العملية قبل أو بعد استدعاء الدالة لتغيير الذاكرة أو السجلات.</div>
</li>
<li><div style="text-align: center;" class="mycode_align">يمكنك تخطي استدعاء دالة من نافذة الإيقاف (لن يتم استدعاؤها في هذه المرة).</div>
</li>
<li><div style="text-align: center;" class="mycode_align">يمكنك استدعاء دوال موجودة داخل العمليات البعيدة (Remote Processes).</div>
</li>
<li><div style="text-align: center;" class="mycode_align">يمكنه ربط واجهات COM OLE وActiveX.</div>
</li>
<li><div style="text-align: center;" class="mycode_align">يدعم الأنواع المعرفة من قبل المستخدم (enum, struct, union) والتعريفات الخاصة.</div>
</li>
<li><div style="text-align: center;" class="mycode_align">كل شيء يتم بطريقة وحدات (Modules): يمكنك تسجيل أو تعديل أي دالة بشكل مستقل.</div>
</li>
<li><div style="text-align: center;" class="mycode_align">يمكنك إجراء <span style="font-weight: bold;" class="mycode_b">Fuzzing</span> لملف ثنائي، حيث يتم ذلك مباشرة من ملف المراقبة دون الحاجة لعمل إضافي.<br />
يمكن أن يتم الـ Fuzzing بمعاملات صفرية أو عشوائية، ويتم تسجيل هذه العمليات مثل استدعاءات الدوال.</div>
</li>
</ul>
<div style="text-align: center;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b">كيف يختلف عن البرامج المشابهة:</span></div><ul class="mycode_list"><li><div style="text-align: center;" class="mycode_align">مرشحات حسب معاملات الدوال ونتائجها.</div>
</li>
<li><div style="text-align: center;" class="mycode_align">مرشحات حسب ملفات DLL، بحيث يمكنك قطع استدعاءات النظام ورؤية ما هو مهم فقط.</div>
</li>
<li><div style="text-align: center;" class="mycode_align">الربط ليس فقط على دوال الـ API، بل أيضاً على الدوال الداخلية للعملية.</div>
</li>
<li><div style="text-align: center;" class="mycode_align">يعمل مع دوال التجميع (ASM).</div>
</li>
<li><div style="text-align: center;" class="mycode_align">التقاط الاستثناءات العتادية والبرمجية.</div>
</li>
<li><div style="text-align: center;" class="mycode_align">تسجيل نتائج Double وFloat.</div>
</li>
<li><div style="text-align: center;" class="mycode_align">إمكانية التلاعب (Spoofing) بأي دوال API أو دوال داخلية للعملية.</div>
</li>
<li><div style="text-align: center;" class="mycode_align">نقاط توقف قبل وبعد الاستدعاء مع القدرة على تعديل الذاكرة والسجلات.</div>
</li>
<li><div style="text-align: center;" class="mycode_align">استدعاء دوال داخل العمليات البعيدة.</div>
</li>
<li><div style="text-align: center;" class="mycode_align">ربط واجهات COM OLE وActiveX.</div>
</li>
<li><div style="text-align: center;" class="mycode_align">دعم الأنواع المخصصة.</div>
</li>
<li><div style="text-align: center;" class="mycode_align">نظام وحدات، التسجيل والاستبدال بشكل مستقل.</div>
</li>
</ul>
<hr class="mycode_hr" />
<div style="text-align: center;" class="mycode_align">Download<br />
المرفقات</div>
<div style="text-align: right;" class="mycode_align"> </div>
</div><br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://www.at4re.net/f/images/attachtypes/txt.png" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=3543" target="_blank" title="">WinAPI.txt</a> (الحجم : 331 bytes / التحميلات : 3)
<!-- end: postbit_attachments_attachment -->]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[C++ Enigma Protector 5.x–7.x Dumper & PE Fixer Tool [Dump + Auto IAT + EP Repair]]]></title>
			<link>https://www.at4re.net/f/thread-5038.html</link>
			<pubDate>Sat, 07 Feb 2026 01:20:40 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=6577">zelda</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-5038.html</guid>
			<description><![CDATA["The program may respond slowly due to packing. If the console screen appears blank, press ENTER once or twice and the interface will load."<br />
<br />
? This C++ tool helps you dump and fix Enigma Protector–protected EXE files (tested from v5.x up to v7.80).<br />
<br />
It automatically dumps the main executable from memory, resets critical PE structures like IAT, OEP, relocations, and more.<br />
<br />
⚠️ Note: As of Enigma v7.80, the dumped EXE may not run correctly due to deeper anti-dump mechanisms. The tool still extracts valid memory and headers — allowing you to continue manually.<br />
<br />
✅ What This Tool Does:<br />
<br />
Performs multiple anti-debug checks (PEB, DebugPort, IsDebuggerPresent).<br />
<br />
Suspends other threads for stable dumping.<br />
<br />
Identifies and validates the main module in memory.<br />
<br />
Detects inline hooks to prevent faulty dumps.<br />
<br />
Dumps the full memory image of the main EXE.<br />
<br />
Rebuilds PE headers:<br />
<br />
Sets new OEP<br />
<br />
Clears relocations, TLS, and resource sections<br />
<br />
Resets checksum<br />
<br />
Finds the section where OEP resides and logs it.<br />
<br />
Performs a basic Import Address Table (IAT) rebuild.<br />
<br />
Dumps all loaded DLLs into a Dumps/ folder for further analysis.<br />
<br />
❌ Why the Dumped EXE May Not Work (Especially in 7.x):<br />
<br />
Enigma uses dynamic unpacking, loading code in stages.<br />
<br />
Real EntryPoint (OEP) may only be valid after several layers finish.<br />
<br />
Some APIs remain encrypted or virtualized in memory, and aren’t dumped cleanly.<br />
<br />
IAT fixing is basic — no redirection or advanced import fixing is handled.<br />
<br />
.reloc, .tls, and .rsrc are cleared to avoid loader errors but may affect app logic.<br />
<br />
?️ Manual Fixing Instructions:<br />
<br />
If the dumped fixed_dump.exe doesn’t run:<br />
<br />
Use a debugger like x64dbg:<br />
<br />
Run the target until all UI/windows show.<br />
<br />
Dump process memory manually from that point.<br />
<br />
Get the actual OEP from the execution trace.<br />
<br />
Use tools like:<br />
<br />
Scylla or ImpREC to rebuild IAT manually.<br />
<br />
PE-bear to fix headers or corrupt sections.<br />
<br />
Patch anti-debug or integrity checks:<br />
<br />
Most failures are due to runtime checks on dumped memory.<br />
<br />
Patch .text or .vmp sections if needed.<br />
<br />
? Future Improvements:<br />
<br />
Full IAT reconstruction with thunk redirection<br />
<br />
Delayed import and forwarded DLL fix<br />
<br />
Resource rebuild or extraction<br />
<br />
VM section cleanup (devirtualizer plugins)<br />
<br />
? Output Files:<br />
<br />
File Description<br />
C++ Enigma Protector 5.x–7.x Dumper &amp; PE Fixer Tool [Dump + Auto IAT + EP Repair]<br />
<br />
<br />
dump_raw.bin Raw dumped memory of EXE<br />
<br />
fixed_dump.exe PE header–repaired executable<br />
<br />
Dumps/*.dll All loaded dependent DLLs dumped<br />
<br />
? Tested On:<br />
<br />
✅ Enigma 5.70<br />
<br />
✅ Enigma 6.30<br />
<br />
✅ Enigma 7.80<br />
<br />
⚠️ Enigma<br />
<br />
⚠️ Disclaimer:<br />
<br />
This tool is meant for educational and reverse-engineering research purposes only.<br />
<br />
Use it only on software you own or have legal rights to reverse-engineer.<br />
<br />
Author is not responsible for misuse or any resulting damages]]></description>
			<content:encoded><![CDATA["The program may respond slowly due to packing. If the console screen appears blank, press ENTER once or twice and the interface will load."<br />
<br />
? This C++ tool helps you dump and fix Enigma Protector–protected EXE files (tested from v5.x up to v7.80).<br />
<br />
It automatically dumps the main executable from memory, resets critical PE structures like IAT, OEP, relocations, and more.<br />
<br />
⚠️ Note: As of Enigma v7.80, the dumped EXE may not run correctly due to deeper anti-dump mechanisms. The tool still extracts valid memory and headers — allowing you to continue manually.<br />
<br />
✅ What This Tool Does:<br />
<br />
Performs multiple anti-debug checks (PEB, DebugPort, IsDebuggerPresent).<br />
<br />
Suspends other threads for stable dumping.<br />
<br />
Identifies and validates the main module in memory.<br />
<br />
Detects inline hooks to prevent faulty dumps.<br />
<br />
Dumps the full memory image of the main EXE.<br />
<br />
Rebuilds PE headers:<br />
<br />
Sets new OEP<br />
<br />
Clears relocations, TLS, and resource sections<br />
<br />
Resets checksum<br />
<br />
Finds the section where OEP resides and logs it.<br />
<br />
Performs a basic Import Address Table (IAT) rebuild.<br />
<br />
Dumps all loaded DLLs into a Dumps/ folder for further analysis.<br />
<br />
❌ Why the Dumped EXE May Not Work (Especially in 7.x):<br />
<br />
Enigma uses dynamic unpacking, loading code in stages.<br />
<br />
Real EntryPoint (OEP) may only be valid after several layers finish.<br />
<br />
Some APIs remain encrypted or virtualized in memory, and aren’t dumped cleanly.<br />
<br />
IAT fixing is basic — no redirection or advanced import fixing is handled.<br />
<br />
.reloc, .tls, and .rsrc are cleared to avoid loader errors but may affect app logic.<br />
<br />
?️ Manual Fixing Instructions:<br />
<br />
If the dumped fixed_dump.exe doesn’t run:<br />
<br />
Use a debugger like x64dbg:<br />
<br />
Run the target until all UI/windows show.<br />
<br />
Dump process memory manually from that point.<br />
<br />
Get the actual OEP from the execution trace.<br />
<br />
Use tools like:<br />
<br />
Scylla or ImpREC to rebuild IAT manually.<br />
<br />
PE-bear to fix headers or corrupt sections.<br />
<br />
Patch anti-debug or integrity checks:<br />
<br />
Most failures are due to runtime checks on dumped memory.<br />
<br />
Patch .text or .vmp sections if needed.<br />
<br />
? Future Improvements:<br />
<br />
Full IAT reconstruction with thunk redirection<br />
<br />
Delayed import and forwarded DLL fix<br />
<br />
Resource rebuild or extraction<br />
<br />
VM section cleanup (devirtualizer plugins)<br />
<br />
? Output Files:<br />
<br />
File Description<br />
C++ Enigma Protector 5.x–7.x Dumper &amp; PE Fixer Tool [Dump + Auto IAT + EP Repair]<br />
<br />
<br />
dump_raw.bin Raw dumped memory of EXE<br />
<br />
fixed_dump.exe PE header–repaired executable<br />
<br />
Dumps/*.dll All loaded dependent DLLs dumped<br />
<br />
? Tested On:<br />
<br />
✅ Enigma 5.70<br />
<br />
✅ Enigma 6.30<br />
<br />
✅ Enigma 7.80<br />
<br />
⚠️ Enigma<br />
<br />
⚠️ Disclaimer:<br />
<br />
This tool is meant for educational and reverse-engineering research purposes only.<br />
<br />
Use it only on software you own or have legal rights to reverse-engineer.<br />
<br />
Author is not responsible for misuse or any resulting damages]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[طلب النسخة الاخيرة لـ IDA pro]]></title>
			<link>https://www.at4re.net/f/thread-5013.html</link>
			<pubDate>Mon, 19 Jan 2026 10:09:02 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=2799">mostfa</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-5013.html</guid>
			<description><![CDATA[السلام عليكم<br />
فضلا وليس امرا احتاج النسخة الاخيره من IDA pro    النسخة الكاملة يلي فيها المميزات الكاملة 9.2]]></description>
			<content:encoded><![CDATA[السلام عليكم<br />
فضلا وليس امرا احتاج النسخة الاخيره من IDA pro    النسخة الكاملة يلي فيها المميزات الكاملة 9.2]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[افضل البرامج والادوات في الهندسة العكسية]]></title>
			<link>https://www.at4re.net/f/thread-5010.html</link>
			<pubDate>Sun, 18 Jan 2026 06:35:23 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=2799">mostfa</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-5010.html</guid>
			<description><![CDATA[ماهي افضل الادوات حاليا من وجهة نظركم للهندسة العكسية <img src="https://www.at4re.net/f/images/smilies/huh.gif" alt="Huh" title="Huh" class="smilie smilie_17" />]]></description>
			<content:encoded><![CDATA[ماهي افضل الادوات حاليا من وجهة نظركم للهندسة العكسية <img src="https://www.at4re.net/f/images/smilies/huh.gif" alt="Huh" title="Huh" class="smilie smilie_17" />]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Sogen emulator]]></title>
			<link>https://www.at4re.net/f/thread-4991.html</link>
			<pubDate>Thu, 08 Jan 2026 06:20:38 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=6522">j4n1t0r</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-4991.html</guid>
			<description><![CDATA[Sogen is a high-performance Windows user space emulator that operates at syscall level, providing full control over process execution through comprehensive hooking capabilities.<br />
Perfect for security research, malware analysis, and DRM research where fine-grained control over process execution is required.<br />
<br />
<br />
<a href="https://github.com/momo5502/sogen" target="_blank" rel="noopener" class="mycode_url">https://github.com/momo5502/sogen</a><br />
<br />
 Tested with VMProtect 3.9.6 Ultimate and it works  <img src="https://www.at4re.net/f/images/smilies/cool.gif" alt="Cool" title="Cool" class="smilie smilie_3" />]]></description>
			<content:encoded><![CDATA[Sogen is a high-performance Windows user space emulator that operates at syscall level, providing full control over process execution through comprehensive hooking capabilities.<br />
Perfect for security research, malware analysis, and DRM research where fine-grained control over process execution is required.<br />
<br />
<br />
<a href="https://github.com/momo5502/sogen" target="_blank" rel="noopener" class="mycode_url">https://github.com/momo5502/sogen</a><br />
<br />
 Tested with VMProtect 3.9.6 Ultimate and it works  <img src="https://www.at4re.net/f/images/smilies/cool.gif" alt="Cool" title="Cool" class="smilie smilie_3" />]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Proxyman Premium 6.3.0]]></title>
			<link>https://www.at4re.net/f/thread-4953.html</link>
			<pubDate>Tue, 30 Dec 2025 23:08:08 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=2537">mounirsoltan</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-4953.html</guid>
			<description><![CDATA[<div style="text-align: center;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b">Proxyman Premium 6.3.0</span><br />
<br />
Proxyman is a modern and intuitive HTTP Debugging Proxy app. Don't let cumbersome web debugging tools hold you back. With Proxyman's native macOS app, you can capture, inspect, and manipulate HTTP(s) traffic with ease.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Basic Features</span><br />
• Inspect HTTP/HTTPS traffic in plain text<br />
• SSL Proxying<br />
• Proxying on iOS Devices, iOS Simulator and Android<br />
• Export Requests/ Responses<br />
• Content Filter<br />
• Body Syntax Highlighting<br />
• JSON/ Tree View Format<br />
• Horizontal/Vertical Layout<br />
• Finder Categorize<br />
• Multiple Tabs<br />
• Custom Previewer Tabs<br />
• Custom Header Columns<br />
• Highlight with Color &amp; Add Comment<br />
• MessagePack Body Previewer<br />
• JSONPath Filter<br />
• Customize Toolbar<br />
<br />
<span style="font-weight: bold;" class="mycode_b">SSL Proxying</span><br />
Proxyman acts as a man-in-the-middle server that capture the traffic between your applications and SSL Web Server. With built-in macOS setup, so you can inspect your HTTP/HTTPS Request and Responses in plain text with just one click.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Multiple Filters</span><br />
Narrow down your search with Proxyman's Multiple Filters. You can combine complex filtered criteria like Protocol, Content-Type, URL, Request Header, Response Header, Body, etc that find exact what you're looking for.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">GraphQL Debugging</span><br />
Easily debug GraphQL Request by defining a matching rule with a particular GraphQL QueryName. Works with Breakpoint, Map Local, Map Remote, and Scripting Tool.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Scripting Tool</span><br />
Breakpoint, Map local GUI is so slow?<br />
Try Scripting Tool: Use Javascript code to manipulate the Request/Response with your own logic.<br />
We provide a handful of Snippet Code, common Add-ons and JS Libraries to facilitate your debugging procedure and make it 100x faster.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Breakpoint Tool</span><br />
Breakpoint Tool helps you to modify Requests/Responses Data on the fly without changing any client code. Supports URL, Headers, Body, Status Code, Raw Message, etc.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Map Local Tool</span><br />
Map Local Tool allows developers to mock a Response with a local file. Boost development speed up by directly modifying the response with Status Code, Header, and Body without waiting for the backend.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Spot your bugs with ease</span><br />
Quickly find the differences between requests/responses with built-in Diff Tool<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Zero-Setup for Backend Developments</span><br />
One-click to inspect HTTP(s) traffic from NodeJS, Ruby, and Python<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Support Popular Network Libraries</span><br />
• NodeJS - axios, fetch (v18+), node-fetch, got,https, and superagent.<br />
• Ruby -http, net/http, net/https,httparty, and faraday.<br />
• Python - request, aiohttp,http.client, urllib3, andhttpx.<br />
• Other - cURL,httpie, ElectronJS.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Advanced Features</span><br />
• Proxy Helper Tool<br />
• Map Local (File/Directory)<br />
• Map Remote<br />
• Breakpoint<br />
• No Caching<br />
• Repeat Requests<br />
• Compose Requests<br />
• WebSocket Debugging<br />
• Save Session<br />
• Block List<br />
• Allow List<br />
• External Proxying (HTTP/HTTPS/SOCKS/PAC)<br />
• Protobuf<br />
• Import Charles Proxy files<br />
• Custom Root &amp; Client &amp; Server Certificates<br />
• Wildcard &amp; Regex Matching Rules<br />
• Scripting (ReWrite)<br />
• JS Addons and Snippet Code<br />
• Atlantis framework for iOS<br />
• GraphQL Debugging<br />
• Network Condition (Network Throttling)<br />
• Multiple Filters<br />
• Publish to Gist<br />
• Reverse Proxy<br />
• Code Generator<br />
• Command Line<br />
• Diff for Request/Response<br />
• Access Control<br />
• Automatic/Manual Setup<br />
<br />
Proxyman is the HTTP Debugging Proxy app, which is capable of proxying and intercepts the HTTP/HTTPS requests.<br />
<br />
Proxyman is a handy tool to help you debug your HTTPS request from apps, domain, remote devices and iOS simulator.<br />
<br />
You can also review the JSON response and compose your request with new parameters.<br />
<br />
It definitely boosts your productivity significantly.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Supported Operation System</span><br />
• macOS 11 or later<br />
• Apple Silicon or Intel Core processor</div><br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://www.at4re.net/f/images/attachtypes/txt.png" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=3513" target="_blank" title="">link.txt</a> (الحجم : 48 bytes / التحميلات : 0)
<!-- end: postbit_attachments_attachment -->]]></description>
			<content:encoded><![CDATA[<div style="text-align: center;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b">Proxyman Premium 6.3.0</span><br />
<br />
Proxyman is a modern and intuitive HTTP Debugging Proxy app. Don't let cumbersome web debugging tools hold you back. With Proxyman's native macOS app, you can capture, inspect, and manipulate HTTP(s) traffic with ease.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Basic Features</span><br />
• Inspect HTTP/HTTPS traffic in plain text<br />
• SSL Proxying<br />
• Proxying on iOS Devices, iOS Simulator and Android<br />
• Export Requests/ Responses<br />
• Content Filter<br />
• Body Syntax Highlighting<br />
• JSON/ Tree View Format<br />
• Horizontal/Vertical Layout<br />
• Finder Categorize<br />
• Multiple Tabs<br />
• Custom Previewer Tabs<br />
• Custom Header Columns<br />
• Highlight with Color &amp; Add Comment<br />
• MessagePack Body Previewer<br />
• JSONPath Filter<br />
• Customize Toolbar<br />
<br />
<span style="font-weight: bold;" class="mycode_b">SSL Proxying</span><br />
Proxyman acts as a man-in-the-middle server that capture the traffic between your applications and SSL Web Server. With built-in macOS setup, so you can inspect your HTTP/HTTPS Request and Responses in plain text with just one click.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Multiple Filters</span><br />
Narrow down your search with Proxyman's Multiple Filters. You can combine complex filtered criteria like Protocol, Content-Type, URL, Request Header, Response Header, Body, etc that find exact what you're looking for.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">GraphQL Debugging</span><br />
Easily debug GraphQL Request by defining a matching rule with a particular GraphQL QueryName. Works with Breakpoint, Map Local, Map Remote, and Scripting Tool.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Scripting Tool</span><br />
Breakpoint, Map local GUI is so slow?<br />
Try Scripting Tool: Use Javascript code to manipulate the Request/Response with your own logic.<br />
We provide a handful of Snippet Code, common Add-ons and JS Libraries to facilitate your debugging procedure and make it 100x faster.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Breakpoint Tool</span><br />
Breakpoint Tool helps you to modify Requests/Responses Data on the fly without changing any client code. Supports URL, Headers, Body, Status Code, Raw Message, etc.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Map Local Tool</span><br />
Map Local Tool allows developers to mock a Response with a local file. Boost development speed up by directly modifying the response with Status Code, Header, and Body without waiting for the backend.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Spot your bugs with ease</span><br />
Quickly find the differences between requests/responses with built-in Diff Tool<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Zero-Setup for Backend Developments</span><br />
One-click to inspect HTTP(s) traffic from NodeJS, Ruby, and Python<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Support Popular Network Libraries</span><br />
• NodeJS - axios, fetch (v18+), node-fetch, got,https, and superagent.<br />
• Ruby -http, net/http, net/https,httparty, and faraday.<br />
• Python - request, aiohttp,http.client, urllib3, andhttpx.<br />
• Other - cURL,httpie, ElectronJS.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Advanced Features</span><br />
• Proxy Helper Tool<br />
• Map Local (File/Directory)<br />
• Map Remote<br />
• Breakpoint<br />
• No Caching<br />
• Repeat Requests<br />
• Compose Requests<br />
• WebSocket Debugging<br />
• Save Session<br />
• Block List<br />
• Allow List<br />
• External Proxying (HTTP/HTTPS/SOCKS/PAC)<br />
• Protobuf<br />
• Import Charles Proxy files<br />
• Custom Root &amp; Client &amp; Server Certificates<br />
• Wildcard &amp; Regex Matching Rules<br />
• Scripting (ReWrite)<br />
• JS Addons and Snippet Code<br />
• Atlantis framework for iOS<br />
• GraphQL Debugging<br />
• Network Condition (Network Throttling)<br />
• Multiple Filters<br />
• Publish to Gist<br />
• Reverse Proxy<br />
• Code Generator<br />
• Command Line<br />
• Diff for Request/Response<br />
• Access Control<br />
• Automatic/Manual Setup<br />
<br />
Proxyman is the HTTP Debugging Proxy app, which is capable of proxying and intercepts the HTTP/HTTPS requests.<br />
<br />
Proxyman is a handy tool to help you debug your HTTPS request from apps, domain, remote devices and iOS simulator.<br />
<br />
You can also review the JSON response and compose your request with new parameters.<br />
<br />
It definitely boosts your productivity significantly.<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Supported Operation System</span><br />
• macOS 11 or later<br />
• Apple Silicon or Intel Core processor</div><br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://www.at4re.net/f/images/attachtypes/txt.png" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=3513" target="_blank" title="">link.txt</a> (الحجم : 48 bytes / التحميلات : 0)
<!-- end: postbit_attachments_attachment -->]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[AT4RE S&R 2 RVA v0.1 (x32,x64)]]></title>
			<link>https://www.at4re.net/f/thread-4911.html</link>
			<pubDate>Thu, 11 Dec 2025 08:49:28 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=4783">Str0x</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-4911.html</guid>
			<description><![CDATA[<div style="text-align: center;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b">AT4RE S&amp;R 2 RVA v0.1 (x32,x64)</span><br />
<br />
<img src="https://i.imgur.com/0AORRT0.png" loading="lazy"  alt="[صورة مرفقة: 0AORRT0.png]" class="mycode_img" /><br />
<br />
 <br />
<pre class="block-code line-numbers"><code class="language-none">AT4RE S&amp;R 2 RVA v0.1 (x32,x64)

[+] Convert Your Search &amp; Replace To RVAs.
[+] Coded In Delphi By Str0x | AT4RE.
[+] Work With Protected &amp; Unprotected EXE Files.
[+] Search &amp; Replace With WildCards Feature.
[+] Support Single or Multiple Lines.
[+] Auto Export RVAs &amp; Changes in 1337 File.
[+] Maximum Search Length is 1024 characters.
[+] Maximum Replace Length is 1024 characters.
[+] Clear (S,R) For Clear Fields.
[+] Paste (S,R) For Paste Clipboard To Fields. 
</code></pre><br />
Download From Attachment</div><br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://www.at4re.net/f/images/attachtypes/rar.png" title="RAR File" border="0" alt=".rar" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=3489" target="_blank" title="">AT4RE S&amp;R 2 RVA (x64).rar</a> (الحجم : 1.23 MB / التحميلات : 12)
<!-- end: postbit_attachments_attachment --><br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://www.at4re.net/f/images/attachtypes/rar.png" title="RAR File" border="0" alt=".rar" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=3488" target="_blank" title="">AT4RE S&amp;R 2 RVA (x32).rar</a> (الحجم : 1,005.23 KB / التحميلات : 5)
<!-- end: postbit_attachments_attachment -->]]></description>
			<content:encoded><![CDATA[<div style="text-align: center;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b">AT4RE S&amp;R 2 RVA v0.1 (x32,x64)</span><br />
<br />
<img src="https://i.imgur.com/0AORRT0.png" loading="lazy"  alt="[صورة مرفقة: 0AORRT0.png]" class="mycode_img" /><br />
<br />
 <br />
<pre class="block-code line-numbers"><code class="language-none">AT4RE S&amp;R 2 RVA v0.1 (x32,x64)

[+] Convert Your Search &amp; Replace To RVAs.
[+] Coded In Delphi By Str0x | AT4RE.
[+] Work With Protected &amp; Unprotected EXE Files.
[+] Search &amp; Replace With WildCards Feature.
[+] Support Single or Multiple Lines.
[+] Auto Export RVAs &amp; Changes in 1337 File.
[+] Maximum Search Length is 1024 characters.
[+] Maximum Replace Length is 1024 characters.
[+] Clear (S,R) For Clear Fields.
[+] Paste (S,R) For Paste Clipboard To Fields. 
</code></pre><br />
Download From Attachment</div><br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://www.at4re.net/f/images/attachtypes/rar.png" title="RAR File" border="0" alt=".rar" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=3489" target="_blank" title="">AT4RE S&amp;R 2 RVA (x64).rar</a> (الحجم : 1.23 MB / التحميلات : 12)
<!-- end: postbit_attachments_attachment --><br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://www.at4re.net/f/images/attachtypes/rar.png" title="RAR File" border="0" alt=".rar" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=3488" target="_blank" title="">AT4RE S&amp;R 2 RVA (x32).rar</a> (الحجم : 1,005.23 KB / التحميلات : 5)
<!-- end: postbit_attachments_attachment -->]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Baymax Patch Tools v3.5.1.7]]></title>
			<link>https://www.at4re.net/f/thread-4884.html</link>
			<pubDate>Wed, 03 Dec 2025 01:50:17 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=6394">Cavoni</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-4884.html</guid>
			<description><![CDATA[Baymax Patch Tools releases the hijacked DLL for the target process to load the functional module PYG.DLL, to achieve dynamic patching of the target process.Baymax not only supports dynamic modification of the instructions and data of the target module, but also simulates the interrupt function of OD. After the target module is disconnected, the corresponding registers, flag registers, and memory data pointed to the memory by the register can be modified, and the target file can be cracked without modifying it.<br />
<br />
Support the following two patch functions: search for replacement patches, locate the memory address through the signature code or offset address, and directly modify the instruction code or memory data in the process memory.The exception interrupt patch supports the simulation of the exception interrupt function of the debugger, and modifies the register, memory and other data after setting and triggering the interrupt to achieve the purpose of modifying the program execution process.<br />
<br />
The tool is protected by a shell, and the tool and patch files may be misreported if the software is killed!Due to the use of Shell's SDK, all components of the tool (including the generated patches) do not contain networking functions!The generated patch will not modify any files in the system when it runs (except for overwriting patch files).The tool itself has a verification mechanism, and the verification module will only be loaded after it is successfully verified at startup, but for security reasons, please be sure to download and use it from the official website.<br />
<br />
Function introduction：<br />
. Support the creation of hijacking and injection of patches, without modifying the target file to achieve cracking<br />
. Support process patching of dynamic base address (ASLR)<br />
. Support multiple DLL modules for patching target processes<br />
. Support simultaneous patching of different EXES in the same directory<br />
. Support memory data patching for process-specified addresses<br />
. Support patching processes using signature matching<br />
. Support setting the API HOOK for the shelled program, decoding and then patching the data<br />
. Support setting software and hardware breakpoints for the process before patching data after interruption<br />
. Support setting abnormal breakpoints for the process to modify the register or the memory pointed to by the register after the interrupt<br />
. Support setting conditional breakpoints for the process to determine whether to execute a patch based on the number of interrupts, register, or memory values<br />
. Support setting different conditional breakpoints for the same address to make corresponding patches for eligible interrupts<br />
. Support extracting global variable storage and modification from instructions<br />
. Support storing data and using stored data during process execution<br />
. Support patching the memory pointed to by the storage label after the interrupt<br />
. Support basic arithmetic operations on data after interruption<br />
. Support reading patch data from ini files<br />
. Support for creating memory keygen<br />
. Support the creation of debugging patches, and you can troubleshoot patch problems by yourself<br />
 <br />
<pre class="block-code line-numbers"><code class="language-none">https://www.mediafire.com/file/9rk9uaxlne9movx/Baymax_Patch_Tools_v3.5.1.7.rar/file
Password: www.at4re.net
</code></pre>]]></description>
			<content:encoded><![CDATA[Baymax Patch Tools releases the hijacked DLL for the target process to load the functional module PYG.DLL, to achieve dynamic patching of the target process.Baymax not only supports dynamic modification of the instructions and data of the target module, but also simulates the interrupt function of OD. After the target module is disconnected, the corresponding registers, flag registers, and memory data pointed to the memory by the register can be modified, and the target file can be cracked without modifying it.<br />
<br />
Support the following two patch functions: search for replacement patches, locate the memory address through the signature code or offset address, and directly modify the instruction code or memory data in the process memory.The exception interrupt patch supports the simulation of the exception interrupt function of the debugger, and modifies the register, memory and other data after setting and triggering the interrupt to achieve the purpose of modifying the program execution process.<br />
<br />
The tool is protected by a shell, and the tool and patch files may be misreported if the software is killed!Due to the use of Shell's SDK, all components of the tool (including the generated patches) do not contain networking functions!The generated patch will not modify any files in the system when it runs (except for overwriting patch files).The tool itself has a verification mechanism, and the verification module will only be loaded after it is successfully verified at startup, but for security reasons, please be sure to download and use it from the official website.<br />
<br />
Function introduction：<br />
. Support the creation of hijacking and injection of patches, without modifying the target file to achieve cracking<br />
. Support process patching of dynamic base address (ASLR)<br />
. Support multiple DLL modules for patching target processes<br />
. Support simultaneous patching of different EXES in the same directory<br />
. Support memory data patching for process-specified addresses<br />
. Support patching processes using signature matching<br />
. Support setting the API HOOK for the shelled program, decoding and then patching the data<br />
. Support setting software and hardware breakpoints for the process before patching data after interruption<br />
. Support setting abnormal breakpoints for the process to modify the register or the memory pointed to by the register after the interrupt<br />
. Support setting conditional breakpoints for the process to determine whether to execute a patch based on the number of interrupts, register, or memory values<br />
. Support setting different conditional breakpoints for the same address to make corresponding patches for eligible interrupts<br />
. Support extracting global variable storage and modification from instructions<br />
. Support storing data and using stored data during process execution<br />
. Support patching the memory pointed to by the storage label after the interrupt<br />
. Support basic arithmetic operations on data after interruption<br />
. Support reading patch data from ini files<br />
. Support for creating memory keygen<br />
. Support the creation of debugging patches, and you can troubleshoot patch problems by yourself<br />
 <br />
<pre class="block-code line-numbers"><code class="language-none">https://www.mediafire.com/file/9rk9uaxlne9movx/Baymax_Patch_Tools_v3.5.1.7.rar/file
Password: www.at4re.net
</code></pre>]]></content:encoded>
		</item>
	</channel>
</rss>