This post is by a banned member (Draza_Mihajlovic) - Unhide
OP 05 November, 2019 - 10:03 PM
(This post was last modified: 05 November, 2019 - 10:04 PM by Draza_Mihajlovic.)
Reply
(04 November, 2019 - 05:48 PM)omarasas Wrote: Show MoreThis is a bump
:fuck:
(04 November, 2019 - 05:48 PM)omarasas Wrote: Show MoreThis is a bump
:fuck:
This post is by a banned member (Draza_Mihajlovic) - Unhide
OP 28 December, 2019 - 01:45 AM
Reply
This post is by a banned member (Money-) - Unhide
28 December, 2019 - 03:57 AM
Reply
Do you mean you have obfuscated the code? And want people to reverse engineer and find the original source code?
This post is by a banned member (Draza_Mihajlovic) - Unhide
OP 05 January, 2020 - 06:26 PM
Reply
(28 December, 2019 - 03:57 AM)Money- Wrote: Show MoreDo you mean you have obfuscated the code? And want people to reverse engineer and find the original source code?
Yes, the challenge is to find the original code behind all these protections.
This post is by a banned member (Fraudlash) - Unhide
05 January, 2020 - 06:58 PM
Reply
No clue how to decode the eval data on the runtime but I'm pretty sure base64 and gzinflate are getting used in there
Ad space by @
Dav expires 2/14/2024
SELLING THIS MIDDLE SPOT CONTACT @
Liars FOR PRICING
SELLING THIS BOTTOM SPOT CONTACT @
Liars FOR PRICING
AD BY @ expires 13th November
This post is by a banned member (Draza_Mihajlovic) - Unhide
OP 05 January, 2020 - 09:18 PM
Reply
(05 January, 2020 - 06:58 PM)ForlaxPy Wrote: Show MoreNo clue how to decode the eval data on the runtime but I'm pretty sure base64 and gzinflate are getting used in there
It is encoded and encrypted
This post is by a banned member (awdafdsg) - Unhide
19 January, 2020 - 10:31 PM
Reply
[font][font]tank you bro[/font][/font]