06-04-2020, 09:33 AM
This small script allows the dump of string present in the resources of an obfuscated application, especially 4dots software's ones
You will need to get the "string caller of the application" (the function which is used to get the string from), when you fond it, replace "%string_caller%" by it
Do not use a value to high compared to the starting number, you will easily end up with a file being a few hundred MBs or even GBs,
a gap of a few thousand will normally be enough
Screenshots:Hidden Content
C#:
Hidden Content
[/hide]
[/hide]
[/hide]