<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[الفريق العربي للهندسة العكسية - برامج فك الضغط والتشفير - Unpacking Tools]]></title>
		<link>https://www.at4re.net/f/</link>
		<description><![CDATA[الفريق العربي للهندسة العكسية - https://www.at4re.net/f]]></description>
		<pubDate>Sat, 04 Apr 2026 03:37:56 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[NET Deobfuscators.]]></title>
			<link>https://www.at4re.net/f/thread-5102.html</link>
			<pubDate>Tue, 31 Mar 2026 00:52:39 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=6691">cesar85</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-5102.html</guid>
			<description><![CDATA[Lists of .NET Deobfuscator / Unpacker<br />
download link: <br />
<a href="https://github.com/NotPrab/.NET-Deobfuscator" target="_blank" rel="noopener" class="mycode_url">https://github.com/NotPrab/.NET-Deobfuscator</a>]]></description>
			<content:encoded><![CDATA[Lists of .NET Deobfuscator / Unpacker<br />
download link: <br />
<a href="https://github.com/NotPrab/.NET-Deobfuscator" target="_blank" rel="noopener" class="mycode_url">https://github.com/NotPrab/.NET-Deobfuscator</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[ZenDeobfuscator]]></title>
			<link>https://www.at4re.net/f/thread-5064.html</link>
			<pubDate>Wed, 18 Feb 2026 11:05:16 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=6589">hanan59564</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-5064.html</guid>
			<description><![CDATA[<a href="https://github.com/backdoor831246/ZenDeobfuscator" target="_blank" rel="noopener" class="mycode_url">https://github.com/backdoor831246/ZenDeobfuscator</a><br />
<br />
Features<br />
<br />
Removes ObfuscatedByProjectZen module name watermark<br />
<br />
Removes fake attributes and junk types<br />
<br />
Removes anti-de4dot FormXXX attribute types<br />
<br />
Decrypts Base64 string protection]]></description>
			<content:encoded><![CDATA[<a href="https://github.com/backdoor831246/ZenDeobfuscator" target="_blank" rel="noopener" class="mycode_url">https://github.com/backdoor831246/ZenDeobfuscator</a><br />
<br />
Features<br />
<br />
Removes ObfuscatedByProjectZen module name watermark<br />
<br />
Removes fake attributes and junk types<br />
<br />
Removes anti-de4dot FormXXX attribute types<br />
<br />
Decrypts Base64 string protection]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Guardsquare DexGuard]]></title>
			<link>https://www.at4re.net/f/thread-5003.html</link>
			<pubDate>Fri, 16 Jan 2026 19:02:57 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=3325">H@wk0</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-5003.html</guid>
			<description><![CDATA[هل توجد أداة أو طريقة لفك برامج الأندرويد المحمية ببرنامج Guardsquare <span style="font-weight: bold;" class="mycode_b">DexGuard؟<br />
<br />
رابط الأداة:</span><br />
 <br />
<pre class="block-code line-numbers"><code class="language-none">https://www.guardsquare.com/dexguard
</code></pre>]]></description>
			<content:encoded><![CDATA[هل توجد أداة أو طريقة لفك برامج الأندرويد المحمية ببرنامج Guardsquare <span style="font-weight: bold;" class="mycode_b">DexGuard؟<br />
<br />
رابط الأداة:</span><br />
 <br />
<pre class="block-code line-numbers"><code class="language-none">https://www.guardsquare.com/dexguard
</code></pre>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Confuser EX Unpaker]]></title>
			<link>https://www.at4re.net/f/thread-4870.html</link>
			<pubDate>Sat, 29 Nov 2025 05:51:15 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=6212">Lucky0786</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-4870.html</guid>
			<description><![CDATA[Confuser Ex 1.0 Unpaker<br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://www.at4re.net/f/images/attachtypes/txt.png" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=3459" target="_blank" title="">Link.txt</a> (الحجم : 73 bytes / التحميلات : 0)
<!-- end: postbit_attachments_attachment -->]]></description>
			<content:encoded><![CDATA[Confuser Ex 1.0 Unpaker<br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://www.at4re.net/f/images/attachtypes/txt.png" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=3459" target="_blank" title="">Link.txt</a> (الحجم : 73 bytes / التحميلات : 0)
<!-- end: postbit_attachments_attachment -->]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Enigma Virtual Box Unpaker Letest]]></title>
			<link>https://www.at4re.net/f/thread-4869.html</link>
			<pubDate>Sat, 29 Nov 2025 05:46:13 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=6212">Lucky0786</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-4869.html</guid>
			<description><![CDATA[<div style="text-align: left;" class="mycode_align"> Today<span style="font-style: italic;" class="mycode_i"> i share with you Letest Enigma Virtual Box Unpacker so let,s Enjoy</span></div><br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://www.at4re.net/f/images/attachtypes/txt.png" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=3460" target="_blank" title="">Link.txt</a> (الحجم : 73 bytes / التحميلات : 0)
<!-- end: postbit_attachments_attachment -->]]></description>
			<content:encoded><![CDATA[<div style="text-align: left;" class="mycode_align"> Today<span style="font-style: italic;" class="mycode_i"> i share with you Letest Enigma Virtual Box Unpacker so let,s Enjoy</span></div><br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://www.at4re.net/f/images/attachtypes/txt.png" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=3460" target="_blank" title="">Link.txt</a> (الحجم : 73 bytes / التحميلات : 0)
<!-- end: postbit_attachments_attachment -->]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Inno Setup Unpaker]]></title>
			<link>https://www.at4re.net/f/thread-4837.html</link>
			<pubDate>Tue, 18 Nov 2025 06:31:26 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=6212">Lucky0786</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-4837.html</guid>
			<description><![CDATA[<div style="text-align: left;" class="mycode_align">Today i will share with you inno setup unpaker hope you enjoy...... <img src="https://www.at4re.net/f/images/smilies/cool.gif" alt="Cool" title="Cool" class="smilie smilie_3" /> ​​​​​​</div><br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://www.at4re.net/f/images/attachtypes/txt.png" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=3446" target="_blank" title="">Link.txt</a> (الحجم : 73 bytes / التحميلات : 0)
<!-- end: postbit_attachments_attachment -->]]></description>
			<content:encoded><![CDATA[<div style="text-align: left;" class="mycode_align">Today i will share with you inno setup unpaker hope you enjoy...... <img src="https://www.at4re.net/f/images/smilies/cool.gif" alt="Cool" title="Cool" class="smilie smilie_3" /> ​​​​​​</div><br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://www.at4re.net/f/images/attachtypes/txt.png" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=3446" target="_blank" title="">Link.txt</a> (الحجم : 73 bytes / التحميلات : 0)
<!-- end: postbit_attachments_attachment -->]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Unpacker tools]]></title>
			<link>https://www.at4re.net/f/thread-4820.html</link>
			<pubDate>Mon, 10 Nov 2025 01:16:33 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=6324">dummypro07</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-4820.html</guid>
			<description><![CDATA[Unpacker tools<br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://www.at4re.net/f/images/attachtypes/txt.png" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=3433" target="_blank" title="">Unpacker Tools.txt</a> (الحجم : 70 bytes / التحميلات : 8)
<!-- end: postbit_attachments_attachment -->]]></description>
			<content:encoded><![CDATA[Unpacker tools<br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://www.at4re.net/f/images/attachtypes/txt.png" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=3433" target="_blank" title="">Unpacker Tools.txt</a> (الحجم : 70 bytes / التحميلات : 8)
<!-- end: postbit_attachments_attachment -->]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Baymax patch tools 3.3.3]]></title>
			<link>https://www.at4re.net/f/thread-4785.html</link>
			<pubDate>Mon, 13 Oct 2025 09:54:28 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=1346">mahfouz</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-4785.html</guid>
			<description><![CDATA[عملاق الباتش الصيني Baymax patcher 3.3.3 احدث إصدار 3.3.3 للنواتين 32 &amp; 64 bit<br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://www.at4re.net/f/images/attachtypes/txt.png" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=3357" target="_blank" title="">Baymax patcher tools 3.3.3.txt</a> (الحجم : 78 bytes / التحميلات : 4)
<!-- end: postbit_attachments_attachment -->]]></description>
			<content:encoded><![CDATA[عملاق الباتش الصيني Baymax patcher 3.3.3 احدث إصدار 3.3.3 للنواتين 32 &amp; 64 bit<br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://www.at4re.net/f/images/attachtypes/txt.png" title="Text Document" border="0" alt=".txt" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=3357" target="_blank" title="">Baymax patcher tools 3.3.3.txt</a> (الحجم : 78 bytes / التحميلات : 4)
<!-- end: postbit_attachments_attachment -->]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Helium Hex-Editor]]></title>
			<link>https://www.at4re.net/f/thread-4655.html</link>
			<pubDate>Fri, 18 Jul 2025 18:14:02 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=218">c0re3</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-4655.html</guid>
			<description><![CDATA[السلام علیکم و رحمت الله. <img src="https://www.at4re.net/f/images/smilies/shy.gif" alt="Shy" title="Shy" class="smilie smilie_7" /><br />
<br />
<br />
I found an interesting tool, which has many features<br />
It also has other tools<br />
I'll post the link to the program so that friends can use it <img src="https://www.at4re.net/f/images/smilies/flower.gif" alt="flower" title="flower" class="smilie smilie_27" /><br />
 <br />
<pre class="block-code line-numbers"><code class="language-php">http://jacquelin.potier.free.fr/HeliumHexEditor/
</code></pre><br />
<br />
مَنْ عَمِلَ صَالِحًا فَلِنَفْسِهِ وَمَنْ أَسَاءَ فَعَلَيْهَا ثُمَّ إِلَى رَبِّكُمْ تُرْجَعُونَ <img src="https://www.at4re.net/f/images/smilies/rose.gif" alt="rose" title="rose" class="smilie smilie_35" />]]></description>
			<content:encoded><![CDATA[السلام علیکم و رحمت الله. <img src="https://www.at4re.net/f/images/smilies/shy.gif" alt="Shy" title="Shy" class="smilie smilie_7" /><br />
<br />
<br />
I found an interesting tool, which has many features<br />
It also has other tools<br />
I'll post the link to the program so that friends can use it <img src="https://www.at4re.net/f/images/smilies/flower.gif" alt="flower" title="flower" class="smilie smilie_27" /><br />
 <br />
<pre class="block-code line-numbers"><code class="language-php">http://jacquelin.potier.free.fr/HeliumHexEditor/
</code></pre><br />
<br />
مَنْ عَمِلَ صَالِحًا فَلِنَفْسِهِ وَمَنْ أَسَاءَ فَعَلَيْهَا ثُمَّ إِلَى رَبِّكُمْ تُرْجَعُونَ <img src="https://www.at4re.net/f/images/smilies/rose.gif" alt="rose" title="rose" class="smilie smilie_35" />]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[MPRESS Unpacker v1.0_by_Rue]]></title>
			<link>https://www.at4re.net/f/thread-4312.html</link>
			<pubDate>Mon, 10 Feb 2025 22:17:08 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=183">Zanda</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-4312.html</guid>
			<description><![CDATA[ٱلسَّلَامُ عَلَيْكُمْ وَرَحْمَةُ ٱللهِ وَبَرَكَاتُهُ<br />
 <br />
<pre class="block-code line-numbers"><code class="language-none">From SunBeam

Just a heads-up - from what I tested with latest version, all one needs to do is F7 over first PUSHAD, hardware breakpoint on ESP, on access, then Shift+F9. And you'll land at JMP to OEP T_T.. Reminds me of UPX.. 
</code></pre><br />
<br />
<br />
أداة لفك ضغط حماية  {MPRESS }<br />
<br />
<img src="https://i.imgur.com/tCZDHPI.png" loading="lazy"  alt="[صورة مرفقة: tCZDHPI.png]" class="mycode_img" /><br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://www.at4re.net/f/images/attachtypes/zip.gif" title="ZIP File" border="0" alt=".zip" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=2969" target="_blank" title="">MPRESS Unpacker v1.0_by_Rue.zip</a> (الحجم : 29.85 KB / التحميلات : 70)
<!-- end: postbit_attachments_attachment -->]]></description>
			<content:encoded><![CDATA[ٱلسَّلَامُ عَلَيْكُمْ وَرَحْمَةُ ٱللهِ وَبَرَكَاتُهُ<br />
 <br />
<pre class="block-code line-numbers"><code class="language-none">From SunBeam

Just a heads-up - from what I tested with latest version, all one needs to do is F7 over first PUSHAD, hardware breakpoint on ESP, on access, then Shift+F9. And you'll land at JMP to OEP T_T.. Reminds me of UPX.. 
</code></pre><br />
<br />
<br />
أداة لفك ضغط حماية  {MPRESS }<br />
<br />
<img src="https://i.imgur.com/tCZDHPI.png" loading="lazy"  alt="[صورة مرفقة: tCZDHPI.png]" class="mycode_img" /><br /><!-- start: postbit_attachments_attachment -->
<br /><!-- start: attachment_icon -->
<img src="https://www.at4re.net/f/images/attachtypes/zip.gif" title="ZIP File" border="0" alt=".zip" />
<!-- end: attachment_icon -->&nbsp;&nbsp;<a href="attachment.php?aid=2969" target="_blank" title="">MPRESS Unpacker v1.0_by_Rue.zip</a> (الحجم : 29.85 KB / التحميلات : 70)
<!-- end: postbit_attachments_attachment -->]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Magicmida - Themida unpacker]]></title>
			<link>https://www.at4re.net/f/thread-4259.html</link>
			<pubDate>Mon, 20 Jan 2025 19:19:56 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=64">TeRcO</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-4259.html</guid>
			<description><![CDATA[<div style="text-align: center;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"> ٱلسَّلَامُ عَلَيْكُمْ وَرَحْمَةُ ٱللهِ وَبَرَكَاتُهُ</span></div>
<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Magicmida </span>هو برنامج فك ضغط لحماية <span style="font-weight: bold;" class="mycode_b">Themida </span>..... يعمل على <span style="color: #2980b9;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u">بعض </span></span></span>تطبيقات  32 بت.<br />
<br />
<br />
<pre class="block-code line-numbers"><code class="language-php">Magicmida

Magicmida is a Themida auto unpacker that works on some 32-bit applications.

Functions:

    Unpack: Unpacks the binary you select. The unpacked binary will be saved with an U suffix.
    Auto create data sections: Restores .rdata/.data sections. Only works on specific targets. This is a must for MSVC applications using Thread Local Storage because they dont work properly otherwise.
    
Dump process: Allows you to enter the PID of a running process whose .text section will be dumped (overwritten) into an already unpacked file. This is useful after using Oreans Unvirtualizer in OllyDbg. Only works properly if data sections were created.
    Shrink: Deletes all sections that are no longer needed (if you unvirtualized or if your binary does not use virtualization). Warning: This will break your binary for non-MSVC compilers.

Note: The tool focuses on cleanness of the resulting binaries. Things such as VM anti-dump are explicitly not fixed. If your target has a virtualized entrypoint, the resulting dump will be broken and won't run (except for MSVC6, which has special fixup code to restore the OEP).

Important: Never activate any compatibility mode options for Magicmida or for the target you're unpacking. It would very likely screw up the unpacking process due to shimming.

Windows sometimes decides to auto-apply compatibility patches to an executable if it crashed before. This AppCompat information is stored in the registry and is linked to the exact path of your executable. This can be a problem if you're upgrading to a newer Magicmida version that has fixes for your target. You can try moving your target to a different path or look around in the subkeys of HKCU:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags.

Old targets from 2007-2009 often don't run on Windows 10 and require an older OS version to unpack. The unpacked binaries should then work on newer Windows versions, given that the application itself doesn't have incompatibilities.
Anti-anti-debugging

Newer versions of Themida detect hardware breakpoints. In order to deal with this, injecting ScyllaHide is supported. A suitable profile is shipped with Magicmida. You just need to download SycllaHide and put HookLibraryx86.dll and InjectorCLIx86.exe next to Magicmida.exe. Do not overwrite scylla_hide.ini unless you know what you're doing.
Command line usage

If you'd like to automate unpacking, it's possible to invoke Magicmida as a command line application. To do so, pass the parameters /unpack &lt;filename&gt;.
Unpacking applications with uiAccess=true

When unpacking an application that has uiAccess=&quot;true&quot; in its manifest, you'll likely get process creation error code 740 even when running Magicmida as Administrator. To get around this, you need to perform the following steps:

    In Magicmida.exe.manifest, change uiAccess to true and recompile.
    You need to have some version of Windows SDK installed.
    Run makecert.exe -r -pe -ss MMTestCert MMTestCert.cer.
    Run certmgr -add MMTestCert.cer -s -r localMachine root.
    In my case, I also had to manually copy the cert to the &quot;Trusted Root Certificate&quot; store.
    Run signtool.exe sign /s MMTestCert Magicmida.exe.
    Copy Magicmida to C:\Program Files (x86)\Magicmida and run it from there. This step is important because uiAccess applications need to be in a &quot;trusted location&quot;.

</code></pre><br />
<br />
<br />
<pre class="block-code line-numbers"><code class="language-none">https://github.com/Hendi48/Magicmida
</code></pre>]]></description>
			<content:encoded><![CDATA[<div style="text-align: center;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"> ٱلسَّلَامُ عَلَيْكُمْ وَرَحْمَةُ ٱللهِ وَبَرَكَاتُهُ</span></div>
<br />
<br />
<span style="font-weight: bold;" class="mycode_b">Magicmida </span>هو برنامج فك ضغط لحماية <span style="font-weight: bold;" class="mycode_b">Themida </span>..... يعمل على <span style="color: #2980b9;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b"><span style="text-decoration: underline;" class="mycode_u">بعض </span></span></span>تطبيقات  32 بت.<br />
<br />
<br />
<pre class="block-code line-numbers"><code class="language-php">Magicmida

Magicmida is a Themida auto unpacker that works on some 32-bit applications.

Functions:

    Unpack: Unpacks the binary you select. The unpacked binary will be saved with an U suffix.
    Auto create data sections: Restores .rdata/.data sections. Only works on specific targets. This is a must for MSVC applications using Thread Local Storage because they dont work properly otherwise.
    
Dump process: Allows you to enter the PID of a running process whose .text section will be dumped (overwritten) into an already unpacked file. This is useful after using Oreans Unvirtualizer in OllyDbg. Only works properly if data sections were created.
    Shrink: Deletes all sections that are no longer needed (if you unvirtualized or if your binary does not use virtualization). Warning: This will break your binary for non-MSVC compilers.

Note: The tool focuses on cleanness of the resulting binaries. Things such as VM anti-dump are explicitly not fixed. If your target has a virtualized entrypoint, the resulting dump will be broken and won't run (except for MSVC6, which has special fixup code to restore the OEP).

Important: Never activate any compatibility mode options for Magicmida or for the target you're unpacking. It would very likely screw up the unpacking process due to shimming.

Windows sometimes decides to auto-apply compatibility patches to an executable if it crashed before. This AppCompat information is stored in the registry and is linked to the exact path of your executable. This can be a problem if you're upgrading to a newer Magicmida version that has fixes for your target. You can try moving your target to a different path or look around in the subkeys of HKCU:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags.

Old targets from 2007-2009 often don't run on Windows 10 and require an older OS version to unpack. The unpacked binaries should then work on newer Windows versions, given that the application itself doesn't have incompatibilities.
Anti-anti-debugging

Newer versions of Themida detect hardware breakpoints. In order to deal with this, injecting ScyllaHide is supported. A suitable profile is shipped with Magicmida. You just need to download SycllaHide and put HookLibraryx86.dll and InjectorCLIx86.exe next to Magicmida.exe. Do not overwrite scylla_hide.ini unless you know what you're doing.
Command line usage

If you'd like to automate unpacking, it's possible to invoke Magicmida as a command line application. To do so, pass the parameters /unpack &lt;filename&gt;.
Unpacking applications with uiAccess=true

When unpacking an application that has uiAccess=&quot;true&quot; in its manifest, you'll likely get process creation error code 740 even when running Magicmida as Administrator. To get around this, you need to perform the following steps:

    In Magicmida.exe.manifest, change uiAccess to true and recompile.
    You need to have some version of Windows SDK installed.
    Run makecert.exe -r -pe -ss MMTestCert MMTestCert.cer.
    Run certmgr -add MMTestCert.cer -s -r localMachine root.
    In my case, I also had to manually copy the cert to the &quot;Trusted Root Certificate&quot; store.
    Run signtool.exe sign /s MMTestCert Magicmida.exe.
    Copy Magicmida to C:\Program Files (x86)\Magicmida and run it from there. This step is important because uiAccess applications need to be in a &quot;trusted location&quot;.

</code></pre><br />
<br />
<br />
<pre class="block-code line-numbers"><code class="language-none">https://github.com/Hendi48/Magicmida
</code></pre>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[فك تشفير TILSv1.2  بين تطبيق و السيرفر الخاص به]]></title>
			<link>https://www.at4re.net/f/thread-3771.html</link>
			<pubDate>Wed, 28 Feb 2024 19:34:11 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=3325">H@wk0</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-3771.html</guid>
			<description><![CDATA[السلام عليكم<br />
<br />
لدي تطبيق أعمل على دراسة طريقة أتصاله بالسيرفر الخاص به و هو يستخدم بروتكول TILSv1.2 و التطبيق يستخدم هذه الطريقة لتبادل البيانات بشكل مشفر مع السيرفر الخاص به عبر برتكول الـ TCP المعروف. حيث أني أستخدمت برنامج Wireshark لهذا الغرض.<br />
<br />
هل هنالك أحد يعرف طريقة لفك تشفير الـ Application Data المتبادله بين التطبيق المحلي و السيرفر.<br />
 <br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.ibb.co/fvB96ry/image.png" loading="lazy"  alt="[صورة مرفقة: image.png]" class="mycode_img" /></div>]]></description>
			<content:encoded><![CDATA[السلام عليكم<br />
<br />
لدي تطبيق أعمل على دراسة طريقة أتصاله بالسيرفر الخاص به و هو يستخدم بروتكول TILSv1.2 و التطبيق يستخدم هذه الطريقة لتبادل البيانات بشكل مشفر مع السيرفر الخاص به عبر برتكول الـ TCP المعروف. حيث أني أستخدمت برنامج Wireshark لهذا الغرض.<br />
<br />
هل هنالك أحد يعرف طريقة لفك تشفير الـ Application Data المتبادله بين التطبيق المحلي و السيرفر.<br />
 <br />
<div style="text-align: center;" class="mycode_align"><img src="https://i.ibb.co/fvB96ry/image.png" loading="lazy"  alt="[صورة مرفقة: image.png]" class="mycode_img" /></div>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[فك حماية Themida / Winlicense v3.0.0.0]]></title>
			<link>https://www.at4re.net/f/thread-3754.html</link>
			<pubDate>Sun, 11 Feb 2024 21:52:28 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=238">Bosalem</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-3754.html</guid>
			<description><![CDATA[السلام عليكم اداة مبرمجة في لغة البايثون<br />
<br />
لفك حماية Themida / Winlicense v3.0.0.0 واصلاح المكتبات <br />
<br />
الاداة لها نسختين 32bit و 64bit حمل الاصدار حسب التارقت الي تبي تفك حماية <br />
<br />
موقع الاداة في القيت هاب   <br />
 <br />
 <br />
<pre class="block-code line-numbers"><code class="language-php">https://github.com/ergrelet/unlicense

</code></pre><div style="text-align: center;" class="mycode_align">
<br />
ملاحظة تم تجربة الاداة فعاله 100% </div>]]></description>
			<content:encoded><![CDATA[السلام عليكم اداة مبرمجة في لغة البايثون<br />
<br />
لفك حماية Themida / Winlicense v3.0.0.0 واصلاح المكتبات <br />
<br />
الاداة لها نسختين 32bit و 64bit حمل الاصدار حسب التارقت الي تبي تفك حماية <br />
<br />
موقع الاداة في القيت هاب   <br />
 <br />
 <br />
<pre class="block-code line-numbers"><code class="language-php">https://github.com/ergrelet/unlicense

</code></pre><div style="text-align: center;" class="mycode_align">
<br />
ملاحظة تم تجربة الاداة فعاله 100% </div>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[MSI Unpacker v1.3]]></title>
			<link>https://www.at4re.net/f/thread-3527.html</link>
			<pubDate>Wed, 01 Mar 2023 21:54:08 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=3325">H@wk0</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-3527.html</guid>
			<description><![CDATA[<div style="text-align: center;" class="mycode_align"><img src="https://i.ibb.co/n8J7KtD/image.png" loading="lazy"  alt="[صورة مرفقة: image.png]" class="mycode_img" /></div>
<br />
برنامج متخصص في أستخراج الملفات من برامج MSI<br />
<br />
رابط التنزيل<br />
 <br />
<pre class="block-code line-numbers"><code class="language-php">https://www.mediafire.com/file/ykmhw4ewo5e5gz7/MSI+Unpacker+v1.3.zip/file
</code></pre>]]></description>
			<content:encoded><![CDATA[<div style="text-align: center;" class="mycode_align"><img src="https://i.ibb.co/n8J7KtD/image.png" loading="lazy"  alt="[صورة مرفقة: image.png]" class="mycode_img" /></div>
<br />
برنامج متخصص في أستخراج الملفات من برامج MSI<br />
<br />
رابط التنزيل<br />
 <br />
<pre class="block-code line-numbers"><code class="language-php">https://www.mediafire.com/file/ykmhw4ewo5e5gz7/MSI+Unpacker+v1.3.zip/file
</code></pre>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[DotNetPackerCleaner]]></title>
			<link>https://www.at4re.net/f/thread-3476.html</link>
			<pubDate>Fri, 20 Jan 2023 15:20:58 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://www.at4re.net/f/member.php?action=profile&uid=4292">mohamed elbanna</a>]]></dc:creator>
			<guid isPermaLink="false">https://www.at4re.net/f/thread-3476.html</guid>
			<description><![CDATA[Cleaner/Deobfuscator for DotNetPacker/DotNetPatcher (tested on v4.6.6.0)<br />
<br />
<img src="https://camo.githubusercontent.com/28def54f978a75ac3899dcb204756253afe90275984489a6652992b452e3dbd7/68747470733a2f2f692e696d6775722e636f6d2f6d61734b7565382e706e67" loading="lazy"  alt="[صورة مرفقة: 68747470733a2f2f692e696d6775722e636f6d2f...382e706e67]" class="mycode_img" /><br />
<br />
<img src="https://camo.githubusercontent.com/cccc879470c5a639272524d5275efedfa87d86618f847b0163460f2d258cf21b/68747470733a2f2f692e696d6775722e636f6d2f787256654f62592e706e67" loading="lazy"  alt="[صورة مرفقة: 68747470733a2f2f692e696d6775722e636f6d2f...592e706e67]" class="mycode_img" /><br />
<br />
<img src="https://camo.githubusercontent.com/88ddbe00a26b8d76bdb272a983b2a20956240274e84e6601531f2a044adfaa59/68747470733a2f2f692e696d6775722e636f6d2f775251356b51722e706e67" loading="lazy"  alt="[صورة مرفقة: 68747470733a2f2f692e696d6775722e636f6d2f...722e706e67]" class="mycode_img" /><br />
<br />
<a href="https://github.com/miso-xyz/DotNetPackerCleaner/releases/tag/v0.9" target="_blank" rel="noopener" class="mycode_url">Download</a>]]></description>
			<content:encoded><![CDATA[Cleaner/Deobfuscator for DotNetPacker/DotNetPatcher (tested on v4.6.6.0)<br />
<br />
<img src="https://camo.githubusercontent.com/28def54f978a75ac3899dcb204756253afe90275984489a6652992b452e3dbd7/68747470733a2f2f692e696d6775722e636f6d2f6d61734b7565382e706e67" loading="lazy"  alt="[صورة مرفقة: 68747470733a2f2f692e696d6775722e636f6d2f...382e706e67]" class="mycode_img" /><br />
<br />
<img src="https://camo.githubusercontent.com/cccc879470c5a639272524d5275efedfa87d86618f847b0163460f2d258cf21b/68747470733a2f2f692e696d6775722e636f6d2f787256654f62592e706e67" loading="lazy"  alt="[صورة مرفقة: 68747470733a2f2f692e696d6775722e636f6d2f...592e706e67]" class="mycode_img" /><br />
<br />
<img src="https://camo.githubusercontent.com/88ddbe00a26b8d76bdb272a983b2a20956240274e84e6601531f2a044adfaa59/68747470733a2f2f692e696d6775722e636f6d2f775251356b51722e706e67" loading="lazy"  alt="[صورة مرفقة: 68747470733a2f2f692e696d6775722e636f6d2f...722e706e67]" class="mycode_img" /><br />
<br />
<a href="https://github.com/miso-xyz/DotNetPackerCleaner/releases/tag/v0.9" target="_blank" rel="noopener" class="mycode_url">Download</a>]]></content:encoded>
		</item>
	</channel>
</rss>