![]() |
![]() |
![]() |
![]() |
![]() |
||||||||||
|
||||||||||||||
![]() |
#1
|
|||
|
|||
![]() Hi,
I have a .Net assembly packed into win32 executable. I've tried many tutos to extract the .net code without success. Is there any method (footprints, tools ...) to identify the obfuscator used. Thanks |
#2
|
|||
|
|||
![]() maybe it's a better idea to post the target so that people can have a look at the file.
__________________
Life can only be understood backwards but It must be read forwards. |
#3
|
|||
|
|||
![]() |