If you are thinking of writing your own crackmes, then you need to statically link your dll to your exe. This video shows you how to do it:
Category: Reversing
Reverse Engineering Software
0:00 / 4:17 How to dump a NSPacker file using x64dbg0:00 / 4:17 How to dump a NSPacker file using x64dbg
How to dump a file packed with NSPacker.
How to create your own packed file and practice dumping itHow to create your own packed file and practice dumping it
Create your own packed file using MEW and then practice dumping it using x64dbg.
How to dump original PE file and rebuild IAT tableHow to dump original PE file and rebuild IAT table
How to dump original PE file and rebuild IAT table How to extract original PE file from a file packed with exeExpressor protector and subsequently how to fix the IAT
How to dump PE file with x64dbgHow to dump PE file with x64dbg
How to extract original PE file from a packed file.
How to modify dialog captions using Resource HackerHow to modify dialog captions using Resource Hacker
If you want to modify dialog box captions you should not use exeScope. It is outdated as it was written in 2004. Intead use the more current program called Resource
How to build de4dotHow to build de4dot
Prior to building de4dot you need to build dnlib, then put the dnlib.dll file inside the de4dot project folder. de4dot is used to deobfuscate .NET apps so that we can
How to install dnSpyHow to install dnSpy
To reverse .NET software, you need to use dnSpy. This video shows you how to download and launch it.
Basic Principles of Patching NagsBasic Principles of Patching Nags
Step through (F8) until your nag appears. Check if there is a suitable Jump before it and if it can bypass the Nag. Also, check if you are in User