Quote:
Originally Posted by Shadow992
It is nothing you mentioned if we are talking about Links decompiler aka Exe2Aut.
He uses some type of code injection/hooking to get the decrypted autoit script in ram. It is really hard to make a good protection against these "attacks" because no matter what protector/packer you use it will be easy to crack. It is an AutoIt specific feature to write the complete source into ram and parse it token by token. This means it is not possible to use some generic tools and hope that your autoit file never will be decompiled.
Even if you use specific tools (like mine) Exe2Aut is able to decompile it in most cases. So best way to protect your scripts is using an obfuscator (but not the standard one the standard one gets cracked/deobfuscated too).
I suggest "AutoIt-Obfuscator written in C++" (may be because its my work.  ):

|
Okay.
This is new to me ..
I'm glad I know this forum.
So that means there will always be a security hole if it works that way.
But I can live with it if I will create enough good security ..
My searches, I found that using other packers can prevent decompilation.
in some places people recommended to combine multiple packers.
can you give me recommendation about multiple packers that can combine together?
Quote:
|
So best way to protect your scripts is using an obfuscator (but not the standard one the standard one gets cracked/deobfuscated too).
|
on this way I've worked and been developed.
i obfuscated the script and i developed special protection ..
the protection is that the script checks if he has modified before and if so,
If the script will not compiled then the script will destroy itself slowly (per session script will delete itself some line of code).
In addition, the script will close the SciTE in this case.
If the script is compiled, the script will not work properly and will give errors.
What do you say about that? is this is good protection?
but i used the standard obfuscator. Maybe I'll use yours ..