Jump to content
View in the app

A better way to browse. Learn more.

DecodeHub - Reverse Engineering, Crackmes, Software & Coding

A full-screen app on your home screen with push notifications, badges and more.

To install this app on iOS and iPadOS
  1. Tap the Share icon in Safari
  2. Scroll the menu and tap Add to Home Screen.
  3. Tap Add in the top-right corner.
To install this app on Android
  1. Tap the 3-dot menu (โ‹ฎ) in the top-right corner of the browser.
  2. Tap Add to Home screen or Install app.
  3. Confirm by tapping Install.

4n0nym0us

Member
  • Joined

  • Last visited

Everything posted by 4n0nym0us

  1. I bring you a major innovation in static malware analysis, along with highly optimized performance and stability. Both the Professional version and PEscan have been updated with the latest enhancements. This version will give my neurons ๐Ÿง  a breakโ€ฆ and I know it will be your best ally for reversing and security incidents that, unfortunately, are ahead of us. The integrated Flow Anomalies module works seamlessly with the [Show Offsets] tool, allowing you to track the execution flow of different code fragments and locate their strings. Enjoy it! ๐Ÿค— Changelog v3.2 Compatibility with the achievement medal system and unlocking of functionalities from the previous version. Fixed an issue that caused duplicate section counts in non-executable files. Inclusion of form state controls during analysis. Complete review of the heuristic and email modules, now enabled by default. If the Options form was open during analysis, it will remain visible until completion. Manual string search limited to 100 characters. Redistribution and minor adjustments in the payload module detections. Review of the decimal-to-hexadecimal and hexadecimal-to-decimal offset conversion routine. Optimization of the Intelligent Strings module, improving performance on large files. Slight improvement in SQL query extraction. Update and optimization of the file description extraction module: Language and CodePage fields are now included in all descriptions. Inclusion of the Flow Anomalies module, responsible for static code flow checks: Identification of indirect calls in executables. Detection of suspicious jump sequences (JMP and conditional), indicating possible obfuscation or packing. Detection of instructions related to shellcodes and payloads. Detection of NOP and breakpoint (BP) sequences. Extraction of Overlay in hexadecimal and character format. Verification of junk code in Entry Points. Download: 4n4lDetector v3.2
  2. Yes, you can use this tool to detect malware; that is its primary purpose. However, it is designed for a technical audience with knowledge of reverse engineering. Best regards!
  3. Thank you very much! I really appreciate the warm welcome. If anyone encounters any issues with the application, please feel free to ask here Iโ€™ll be watching the thread and happy to help ๐Ÿ˜„
  4. Thank you so much for sharing my tool here. I'm glad you like it. Best regards! ๐Ÿ˜„

Important Information

Terms of Use

Configure browser push notifications

Chrome (Android)
  1. Tap the lock icon next to the address bar.
  2. Tap Permissions โ†’ Notifications.
  3. Adjust your preference.
Chrome (Desktop)
  1. Click the padlock icon in the address bar.
  2. Select Site settings.
  3. Find Notifications and adjust your preference.