<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/">
  <channel>
    <title>Reverse Engineering</title>
    <description>Reverse Engineering</description>
    <pubDate>Sun, 24 May 2026 20:39:48 +0000</pubDate>
    <lastBuildDate>Sun, 24 May 2026 20:39:48 +0000</lastBuildDate>
    <generator>iHax Global</generator>
    <link>https://ihaxglobal.com/forums/reverse-engineering.9/</link>
    <atom:link rel="self" type="application/rss+xml" href="https://ihaxglobal.com/forums/reverse-engineering.9/index.rss"/>
    <item>
      <title>NoFuser (Unpack Confuser)</title>
      <pubDate>Sat, 15 Nov 2025 16:14:15 +0000</pubDate>
      <link>https://ihaxglobal.com/threads/nofuser-unpack-confuser.545/</link>
      <guid>https://ihaxglobal.com/threads/nofuser-unpack-confuser.545/</guid>
      <author>invalid@example.com (Sι∂яα∂ι)</author>
      <dc:creator>Sι∂яα∂ι</dc:creator>
      <content:encoded><![CDATA[<div style="text-align: center">Salut communauté  iHaxGlobal  <i class="fa fa-angellist"></i><br />
<br />
Lors de ce <i class="fa fa-graduation-cap"></i> Tutorial,  je vais vous expliquer comment<b> unpack </b>un .exe crypter avec <b>confuser 1.9/1.8 </b>de <i>yck</i><br />
<br />
De premier vue sur .net Reflector<br />
<br />


	<a href="https://www.ihaxglobal.com/attachments/6574/" target="_blank">Voir la pièce jointe 6574</a>
	
<br />
<br />
La maintenant on va glisser le .exe sur Nofuser, vous allez patientez peux le temps que toute les méthodes soient dumper ..<br />
<br />


	<a href="https://www.ihaxglobal.com/attachments/180/" target="_blank">Voir la pièce jointe 180</a>
	
<br />
<br />
Une fois c&#039;est terminer, vous allez avoir un dossier : NoFuser_Outpout...&#8203;</div><br />
<a href="https://ihaxglobal.com/threads/nofuser-unpack-confuser.545/" target="_blank" class="externalLink" rel="nofollow">NoFuser (Unpack Confuser)</a>]]></content:encoded>
      <slash:comments>47</slash:comments>
    </item>
    <item>
      <title>NoFuserEx - ConfuserEx Deobfuscator</title>
      <pubDate>Wed, 22 Oct 2025 06:39:36 +0000</pubDate>
      <link>https://ihaxglobal.com/threads/nofuserex-confuserex-deobfuscator.3148/</link>
      <guid>https://ihaxglobal.com/threads/nofuserex-confuserex-deobfuscator.3148/</guid>
      <author>invalid@example.com (Sι∂яα∂ι)</author>
      <dc:creator>Sι∂яα∂ι</dc:creator>
      <content:encoded><![CDATA[<div style="text-align: center">Salut communauté  iHaxGlobal  <i class="fa fa-angellist"></i><br />
<br />
Je vous partage un outils NoFuserEX, pour enlever la protection de l&#039;obfuscateur .net <b>ConfuserEx</b> de <b>yck<br />
</b><br />
*** v1.0 support ***<br />
- Packer<br />
- Anti-ILDASM<br />
- Anti-Tamper<br />
- Anti-Debugger<br />
- Anti-Dumper<br />
- Invalid MetaData<br />
- Constants<br />
- Control Flow<br />
- Resources<br />
- Proxy Calls (Remove junk methods)<br />
- Name Confusion<br />
<br />


	<a href="https://www.ihaxglobal.com/attachments/2407/" target="_blank">Voir la pièce jointe 2407</a>
	
<br />
<br />
<br />
<br />
&#8203;</div>]]></content:encoded>
      <slash:comments>86</slash:comments>
    </item>
    <item>
      <title>DNGuard HVM Unpacker 3.71</title>
      <pubDate>Tue, 21 Oct 2025 08:54:51 +0000</pubDate>
      <link>https://ihaxglobal.com/threads/dnguard-hvm-unpacker-3-71.1561/</link>
      <guid>https://ihaxglobal.com/threads/dnguard-hvm-unpacker-3-71.1561/</guid>
      <author>invalid@example.com (Sι∂яα∂ι)</author>
      <dc:creator>Sι∂яα∂ι</dc:creator>
      <content:encoded><![CDATA[<div style="text-align: center">Salut communauté iHax<br />
<br />
Je vous partage l&#039;unpacker DNGUARD 3.71<br />
<br />
<b><span style="color: #ff0000">NB :</span></b> Fonctionnel sur .Net Framework 4.0 ( et non 4.5 ) <img src="styles/default/xenforo/clear.png" class="mceSmilieSprite mceSmilie14" alt=";)" title="Wink    ;)" /><br />
<br />


	<a href="https://www.ihaxglobal.com/attachments/1938/" target="_blank">Voir la pièce jointe 1938</a>
	
<br />
<br />
<br />
A très bientôt <i class="fa fa-check-square-o"></i><br />
<span style="font-size: 10px"><i>Crédits : HFdeath &amp; CodeCracker</i></span>&#8203;</div>]]></content:encoded>
      <slash:comments>254</slash:comments>
    </item>
    <item>
      <title>iHax Process Spoof (Comment Bypass les Process Check)</title>
      <pubDate>Sat, 21 Jun 2025 00:47:43 +0000</pubDate>
      <link>https://ihaxglobal.com/threads/ihax-process-spoof-comment-bypass-les-process-check.973/</link>
      <guid>https://ihaxglobal.com/threads/ihax-process-spoof-comment-bypass-les-process-check.973/</guid>
      <author>invalid@example.com (Sι∂яα∂ι)</author>
      <dc:creator>Sι∂яα∂ι</dc:creator>
      <content:encoded><![CDATA[<div style="text-align: center">Salut communauté  iHaxGlobal  <i class="fa fa-angellist"></i><br />
<br />
Aujourd&#039;hui je vous release un petit Tool pour changer le nom du process d&#039;une application sous <i class="fa fa-windows"></i> Windows<br />
<br />
Si vous le savais deja ! le Bypass consiste a faire un deroutage de l&#039;echo php Valide pour avoir accez au tool payant !<br />
Alternative aux &quot;<i>Fuck Tool</i>&quot; ! Bah il y a les <span style="text-decoration: underline"><i>Web Proxy Debugger</i></span> ! comme <i>Wireshark, Fiddler, Charles, HttpProxyDebugger .. etc</i> !<br />
Beaucoup de Dev de Tool RTM, font un...&#8203;</div><br />
<a href="https://ihaxglobal.com/threads/ihax-process-spoof-comment-bypass-les-process-check.973/" target="_blank" class="externalLink" rel="nofollow">iHax Process Spoof (Comment Bypass les Process Check)</a>]]></content:encoded>
      <slash:comments>29</slash:comments>
    </item>
    <item>
      <title>Babel Deofuscator</title>
      <pubDate>Sun, 25 May 2025 19:18:35 +0000</pubDate>
      <link>https://ihaxglobal.com/threads/babel-deofuscator.3906/</link>
      <guid>https://ihaxglobal.com/threads/babel-deofuscator.3906/</guid>
      <author>invalid@example.com (Sι∂яα∂ι)</author>
      <dc:creator>Sι∂яα∂ι</dc:creator>
      <content:encoded><![CDATA[<div style="text-align: center">Salut communauté  iHaxGlobal  <i class="fa fa-angellist"></i>, <br />
<br />
Je vous partage un petit outils de reverse engineering, qui vous permet de retirer la protection de l&#039;obfuscateur .Net Babel<br />
<br />


	<a href="https://www.ihaxglobal.com/attachments/3806/" target="_blank">Voir la pièce jointe 3806</a>
	
 <br />
<br />
Source : <a href="https://github.com/XenocodeRCE/BabelDeobfuscator" target="_blank" class="externalLink" rel="nofollow">https://github.com/XenocodeRCE/BabelDeobfuscator</a><br />
<br />
A très bientôt. :neo:<br />
&#8203;</div>]]></content:encoded>
      <slash:comments>19</slash:comments>
    </item>
    <item>
      <title>Unpack AppFuscator</title>
      <pubDate>Mon, 21 Apr 2025 10:41:18 +0000</pubDate>
      <link>https://ihaxglobal.com/threads/unpack-appfuscator.2085/</link>
      <guid>https://ihaxglobal.com/threads/unpack-appfuscator.2085/</guid>
      <author>invalid@example.com (Sι∂яα∂ι)</author>
      <dc:creator>Sι∂яα∂ι</dc:creator>
      <content:encoded><![CDATA[<div style="text-align: center">Salut communauté  iHaxGlobal  <i class="fa fa-angellist"></i><br />
<br />
Voici les étapes à suivre pour unpack AppFuscator :<br />
<br />
1- Utiliser AppFuscatorUnpacker.exe<br />
<br />


	<a href="https://www.ihaxglobal.com/attachments/1088/" target="_blank">Voir la pièce jointe 1088</a>
	
<br />
<br />
2- Utiliser AppFuscatorStringsDecryptor.exe pour Decrypter les Strings<br />
<br />


	<a href="https://www.ihaxglobal.com/attachments/1089/" target="_blank">Voir la pièce jointe 1089</a>
	
<br />
<br />
3- Utiliser AppFuscatorCalli3 pour restaurer Calli instructions:<br />
<br />


	<a href="https://www.ihaxglobal.com/attachments/1090/" target="_blank">Voir la pièce jointe 1090</a>
	
<br />
<br />
<i><span style="font-size: 12px">Crédits : CodeCracker</span></i><br />
<br />
Ce <i class="fa fa-graduation-cap"></i> Tutorial touche à sa Fin <img src="styles/default/xenforo/clear.png" class="mceSmilieSprite mceSmilie14" alt=";)" title="Wink    ;)" />&#8203;</div>]]></content:encoded>
      <slash:comments>71</slash:comments>
    </item>
    <item>
      <title>Unpack ConfuserEx (Koi' Module)</title>
      <pubDate>Sat, 26 Oct 2024 15:38:56 +0000</pubDate>
      <link>https://ihaxglobal.com/threads/unpack-confuserex-koi-module.816/</link>
      <guid>https://ihaxglobal.com/threads/unpack-confuserex-koi-module.816/</guid>
      <author>invalid@example.com (Sι∂яα∂ι)</author>
      <dc:creator>Sι∂яα∂ι</dc:creator>
      <content:encoded><![CDATA[<div style="text-align: center">Salut communauté  iHaxGlobal  <i class="fa fa-angellist"></i><br />
<br />
Pour mon premier tutorial sur iHax, je vous explique comment unpack le nouveau ConfuserEx de <i>Yck</i>1509 avec<i> Koi&#039; </i>Module.<br />
Pour cet exemple je vais prendre le Tool <b><span style="color: #ffff00">Uncharted 2</span></b> qui est disponible en Section <b><span style="color: rgb(0, 128, 255)">NGU Elite</span></b> !<br />
<br />


	<a href="https://www.ihaxglobal.com/attachments/316/" target="_blank">Voir la pièce jointe 316</a>
	
<br />


	<a href="https://www.ihaxglobal.com/attachments/317/" target="_blank">Voir la pièce jointe 317</a>
	
<br />
<br />
De passage sur .Net Reflector !<br />
<br />


	<a href="https://www.ihaxglobal.com/attachments/315/" target="_blank">Voir la pièce jointe 315</a>
	
<br />
<br />
Faudra simplement executer...&#8203;</div><br />
<a href="https://ihaxglobal.com/threads/unpack-confuserex-koi-module.816/" target="_blank" class="externalLink" rel="nofollow">Unpack ConfuserEx (Koi&#039; Module)</a>]]></content:encoded>
      <slash:comments>45</slash:comments>
    </item>
    <item>
      <title>Utiliser .Net Reflector (Débutant)</title>
      <pubDate>Sun, 28 Jul 2024 08:48:48 +0000</pubDate>
      <link>https://ihaxglobal.com/threads/utiliser-net-reflector-d%C3%A9butant.1351/</link>
      <guid>https://ihaxglobal.com/threads/utiliser-net-reflector-d%C3%A9butant.1351/</guid>
      <author>invalid@example.com (Sι∂яα∂ι)</author>
      <dc:creator>Sι∂яα∂ι</dc:creator>
      <content:encoded><![CDATA[<div style="text-align: center">Salut communauté  iHaxGlobal  <i class="fa fa-angellist"></i><br />
<br />
Suite a la demande de membres, je vais vous expliquer au cours de ce Tutorial comment récupérer une source Visual Studio a partir d&#039;un .exe en utilisant .Net Reflector !<br />
<br />
Version D&#039;evaluation 15 jours : <a href="http://www.red-gate.com/dynamic/products/dotnet-development/reflector/download" target="_blank" class="externalLink" rel="nofollow">http://www.red-gate.com/dynamic/products/dotnet-development/reflector/download</a><br />
<i><span style="font-size: 12px">PS : Patch pour avoir la version complète est en pièce jointe.</span></i><br />
<br />
On va prendre exemple d&#039;un : Crack Me ! que je n&#039;ai pas...&#8203;</div><br />
<a href="https://ihaxglobal.com/threads/utiliser-net-reflector-d%C3%A9butant.1351/" target="_blank" class="externalLink" rel="nofollow">Utiliser .Net Reflector (Débutant)</a>]]></content:encoded>
      <slash:comments>23</slash:comments>
    </item>
    <item>
      <title>Spotify ProxyLess  Brute Checker By ACTEAM</title>
      <pubDate>Sun, 03 Mar 2024 22:42:24 +0000</pubDate>
      <link>https://ihaxglobal.com/threads/spotify-proxyless-brute-checker-by-acteam.39570/</link>
      <guid>https://ihaxglobal.com/threads/spotify-proxyless-brute-checker-by-acteam.39570/</guid>
      <author>invalid@example.com (pikpokeur51)</author>
      <dc:creator>pikpokeur51</dc:creator>
      <content:encoded><![CDATA[APIs : Android<br />
<br />
If Double Click Not Open (Right Click Run as administrator)<br />
<br />
Threads Better Default (10)<br />
<br />
TUT<br />
<br />
<iframe width="500" height="280" src="https://www.youtube.com/embed/8H7POY3OhlU?wmode=opaque" frameborder="0" allowfullscreen></iframe><br />
<br />
Download<br />
<br />
<a href="https://mega.nz/file/kjRTBIrB#suNR1REc7wTeqr4Qg9pAB-yxnozEqC41OzRwBU4oLYI" target="_blank" class="externalLink" rel="nofollow">https://mega.nz/file/kjRTBIrB#suNR1REc7wTeqr4Qg9pAB-yxnozEqC41OzRwBU4oLYI</a>]]></content:encoded>
      <slash:comments>2</slash:comments>
    </item>
    <item>
      <title>MegaDumper (Themida, Xenocode, Enigma, Etc)</title>
      <pubDate>Fri, 04 Aug 2023 08:29:18 +0000</pubDate>
      <link>https://ihaxglobal.com/threads/megadumper-themida-xenocode-enigma-etc.743/</link>
      <guid>https://ihaxglobal.com/threads/megadumper-themida-xenocode-enigma-etc.743/</guid>
      <author>invalid@example.com (Sι∂яα∂ι)</author>
      <dc:creator>Sι∂яα∂ι</dc:creator>
      <content:encoded><![CDATA[<div style="text-align: center">Salut communauté  iHaxGlobal  <i class="fa fa-angellist"></i><br />
<br />
Lors de ce Tutorial on va voir comment unpack (Themida, Xenocode, .Net Reactor) ! en utilisant MegaDumper (<i>By CodeCracker</i>)<br />
<br />


	<a href="https://www.ihaxglobal.com/attachments/6579/" target="_blank">Voir la pièce jointe 6579</a>
	
<br />
<br />
De passage sur Reflector :<br />
<br />


	<a href="https://www.ihaxglobal.com/attachments/6580/" target="_blank">Voir la pièce jointe 6580</a>
	
<br />
<br />
1 - Exécutez l&#039;assembly  .exe à dumper<br />
2 - Lancez MegaDumper, puis clique droit de la souris ==&gt; .Net Dump<br />
<br />


	<a href="https://www.ihaxglobal.com/attachments/6581/" target="_blank">Voir la pièce jointe 6581</a>
	
<br />
<br />
Attendre quelques seconde jusqu’à ce que ce message s&#039;affiche :...&#8203;</div><br />
<a href="https://ihaxglobal.com/threads/megadumper-themida-xenocode-enigma-etc.743/" target="_blank" class="externalLink" rel="nofollow">MegaDumper (Themida, Xenocode, Enigma, Etc)</a>]]></content:encoded>
      <slash:comments>22</slash:comments>
    </item>
    <item>
      <title>Simple Assembly Explorer</title>
      <pubDate>Mon, 07 Jun 2021 21:09:51 +0000</pubDate>
      <link>https://ihaxglobal.com/threads/simple-assembly-explorer.2347/</link>
      <guid>https://ihaxglobal.com/threads/simple-assembly-explorer.2347/</guid>
      <author>invalid@example.com (@root-Devil)</author>
      <dc:creator>@root-Devil</dc:creator>
      <content:encoded><![CDATA[<div style="text-align: center">Salut communauté  iHaxGlobal  <i class="fa fa-angellist"></i><br />
<br />
Aujourd&#039;hui je vous présente un outil nommé Simple Assemblée Explorer ( SAE ) qui est développer par Wicky Hu.<br />
Un puissant <b>dés-assembleur</b> .NET , peut être comparé au célèbre ( mais cher )  .NET Reflector.<br />
<br />
<i class="fa fa-download"></i>Lien : <a href="https://github.com/wickyhu/simple-assembly-explorer" target="_blank" class="externalLink" rel="nofollow">https://github.com/wickyhu/simple-assembly-explorer</a><br />
<br />


	<a href="https://www.ihaxglobal.com/attachments/1350/" target="_blank">Voir la pièce jointe 1350</a>
	
<br />
<br />
Ce sujet touche à sa fin <i class="fa fa-check-square-o"></i>&#8203;</div>]]></content:encoded>
      <slash:comments>8</slash:comments>
    </item>
    <item>
      <title>Coder un Fuck Tool</title>
      <pubDate>Thu, 13 May 2021 12:26:28 +0000</pubDate>
      <link>https://ihaxglobal.com/threads/coder-un-fuck-tool.1576/</link>
      <guid>https://ihaxglobal.com/threads/coder-un-fuck-tool.1576/</guid>
      <author>invalid@example.com (Sι∂яα∂ι)</author>
      <dc:creator>Sι∂яα∂ι</dc:creator>
      <content:encoded><![CDATA[Salut communauté  iHaxGlobal  <i class="fa fa-angellist"></i><br />
<br />
Je vais vous expliquer aujourd&#039;hui comment coder une petit application pour crack des Tools payant (FuckTool) en C#<br />
<br />
Dans ce Tutorial on prendera comme exemple le Launcher de Maxlila<br />
<br />
En utilisant Fiddler Proxy Debugger j&#039;ai récupéré :<br />
L’écho Valide : &quot;<b><span style="color: #0080ff">Accepted</span></b>&quot; sur : <a href="http://www.maxlila12.esy.es/api.php" target="_blank" class="externalLink" rel="nofollow">http://www.maxlila12.esy.es/api.php</a><br />
Le fichier .txt qui gère la mise a jour  : &quot;<span style="color: #0080ff"><b>1.0.1.4</b></span>&quot; sur :...<br />
<br />
<a href="https://ihaxglobal.com/threads/coder-un-fuck-tool.1576/" target="_blank" class="externalLink" rel="nofollow">Coder un Fuck Tool</a>]]></content:encoded>
      <slash:comments>29</slash:comments>
    </item>
    <item>
      <title>Quelqu'un de calé dans le reverse ingeneering pour sauter une protection</title>
      <pubDate>Sun, 11 Mar 2018 12:53:38 +0000</pubDate>
      <link>https://ihaxglobal.com/threads/quelquun-de-cal%C3%A9-dans-le-reverse-ingeneering-pour-sauter-une-protection.17205/</link>
      <guid>https://ihaxglobal.com/threads/quelquun-de-cal%C3%A9-dans-le-reverse-ingeneering-pour-sauter-une-protection.17205/</guid>
      <author>invalid@example.com (Snoopy83)</author>
      <dc:creator>Snoopy83</dc:creator>
      <content:encoded><![CDATA[Bonjour,<br />
<br />
Comme indiqué dans le titre, si quelqu&#039;un est suffisamment calé pour faire sauter une licence sur un programme obfusqué?<br />
<br />
Merci d&#039;avance]]></content:encoded>
    </item>
    <item>
      <title>Patcher l'erreur .Net Reflector : Module contains multiple #Strings heaps</title>
      <pubDate>Sat, 30 Sep 2017 14:01:49 +0000</pubDate>
      <link>https://ihaxglobal.com/threads/patcher-lerreur-net-reflector-module-contains-multiple-strings-heaps.2164/</link>
      <guid>https://ihaxglobal.com/threads/patcher-lerreur-net-reflector-module-contains-multiple-strings-heaps.2164/</guid>
      <author>invalid@example.com (Sι∂яα∂ι)</author>
      <dc:creator>Sι∂яα∂ι</dc:creator>
      <content:encoded><![CDATA[<div style="text-align: center">Bonjour communauté  iHaxGlobal  <i class="fa fa-angellist"></i><br />
<br />
Suite à la demande d&#039;un membre je vous explique comment corrigé ce message d&#039;erreur de .Net Reflector<br />


	<a href="https://www.ihaxglobal.com/attachments/1144/" target="_blank">Voir la pièce jointe 1144</a>
	
<br />
<br />
Pré-requis : <b>CFF Explorer</b> <i class="fa fa-download"></i> <a href="http://www.ntcore.com/files/ExplorerSuite.exe" target="_blank" class="externalLink" rel="nofollow">http://www.ntcore.com/files/ExplorerSuite.exe</a><br />
<br />
Une fois installer, il s&#039;ajoute au <i>menu contextuel</i> de votre OS, ainsi il suffit de faire un clique droit sur l&#039;assembly puis : <i>Open With CFF Explorer</i><br />
<br />


	<a href="https://www.ihaxglobal.com/attachments/1145/" target="_blank">Voir la pièce jointe 1145</a>
	
...&#8203;</div><br />
<a href="https://ihaxglobal.com/threads/patcher-lerreur-net-reflector-module-contains-multiple-strings-heaps.2164/" target="_blank" class="externalLink" rel="nofollow">Patcher l&#039;erreur .Net Reflector : Module contains multiple #Strings heaps</a>]]></content:encoded>
      <slash:comments>4</slash:comments>
    </item>
    <item>
      <title>Le Reverse Engineering</title>
      <pubDate>Tue, 14 Jul 2015 19:26:11 +0000</pubDate>
      <link>https://ihaxglobal.com/threads/le-reverse-engineering.2284/</link>
      <guid>https://ihaxglobal.com/threads/le-reverse-engineering.2284/</guid>
      <author>invalid@example.com (Infinity)</author>
      <dc:creator>Infinity</dc:creator>
      <content:encoded><![CDATA[<div style="text-align: center">

	<a href="https://www.ihaxglobal.com/attachments/1356/" target="_blank">Voir la pièce jointe 1356</a>
	
<br />
<br />
<span style="font-family: 'Verdana'"><span style="text-decoration: underline">Le Reverse Engineering</span></span><br />
<br />
<span style="font-family: 'Arial'"><b>Bonsoir,</b><br />
<span style="font-size: 12px">Aujourd&#039;hui tout nouveau sujet le <b>Reverse Engineering</b> ou plus communément appelé <b>ingénierie inversée</b> en langue française.</span></span><br />
<br />
<span style="font-family: 'Arial'"><span style="font-size: 12px">

	<a href="https://www.ihaxglobal.com/attachments/1355/" target="_blank">Voir la pièce jointe 1355</a>
	
 </span></span><br />
<br />
<b><span style="font-family: 'Arial'"><span style="font-size: 12px">L&#039;ingénerie inversée</span></span></b><span style="font-family: 'Arial'"><span style="font-size: 12px"> consiste à étudier un objet (exemple :...</span></span>&#8203;</div><br />
<a href="https://ihaxglobal.com/threads/le-reverse-engineering.2284/" target="_blank" class="externalLink" rel="nofollow">Le Reverse Engineering</a>]]></content:encoded>
    </item>
  </channel>
</rss>
