Skip to content

revengsmK/venom

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

VeNoM

A Blumentals Program Protector v4.x anti protection toolkit.
Reverse engineering proof-of-concept code.

Screenshot & demo

venom

venomdemo.mp4

Usage

There are three options you can use to bypass protected programs.

  1. get password - retrieves password for chosen protected program.

  2. run program - simply runs protected program without asking for password.

  3. unprotect programs - this option manipulates Program Protector main executable (protect.exe), allowing you to unprotect programs from the list without entering password.

How to build

Install either GCC or MSVC compiler and set PATH environment variable correctly to point to your chosen compiler, then run build.bat script. The script prefers GCC, but if it is not available it will try to build using MSVC.

This toolkit is intended to be compiled as a 32-bit binary, so make sure you have set your compiler to output 32-bit image.

Tested / Affected versions

Following Program Protector versions are tested / affected:

4.8, 4.11, 4.12, 4.13

Note on antivirus

Your antivirus software may flag this toolkit as a malware or potentially unwanted program (PUP).
Please ignore this, and add it to your antivirus exclusion list.

Support

bitcoin

If you would like to see more projects like this one, please consider supporting me :)

Donate bitcoin to the following address:

btcqrcode

bc1qjwedefp3xruv7qak72l89hzx5mx0c0ftq8qem7

About

Blumentals Program Protector v4.x anti protection toolkit

Resources

License

Stars

Watchers

Forks

Packages

No packages published