02-05-2025, 04:22 AM
Quote:But you can generate An asm function in a completely separate program, extract the binary and chop it about as you please. The advantage of Asm is that you can create custom fully relocatable code without any telltale PB function headers/tails.
How to do that ?
Quote:I trust this is for an ethical purpose
Yes, this is for an ethical purpose -- it is use to counter Reverse Engineering by hackers.
Hackers will use decompiler like IDA Pro to disassemble a program into C or ASM.
They will trace through the control flows of the program and then to modify it by
removing any protection system or password. Once these protection are removed,
the hacker will resell the program at a fraction of the cost of the original program.