0% found this document useful (0 votes)
63 views2 pages

ENU

The document contains interface text and labels for a GUI application that allows users to author DLL hijacking and memory patching tools. It includes prompts, messages, and help text for features like adding and deleting patch data, generating patched files, and injecting tools. The application appears to allow configuring multiple patch targets and payloads.

Uploaded by

Sinisa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views2 pages

ENU

The document contains interface text and labels for a GUI application that allows users to author DLL hijacking and memory patching tools. It includes prompts, messages, and help text for features like adding and deleting patch data, generating patched files, and injecting tools. The application appears to allow configuring multiple patch targets and payloads.

Uploaded by

Sinisa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 2

!

LanguageID=1033
!LanguageName=English
!TranslationAuthor=lengyueguxin
!TranslationAuthorEmail=
!TranslationDefaultFont=Tahoma,8,,0,clWindowText,DEFAULT_CHARSET
Ask_Close=Do you want to exit the program?
Ask_Del=Do you want to delete the current data?
Ask_DelAll=Do you want to Delete all data?
Ask_Overlap=Do you want to overwrite the current data?
Ask_Title=Prompt
Ask_Change=This is an old version of the configuration,Converted to the new
version?
Caption_Str=dll hijack memory patch authoring tools
CustomDll_Tip=Now! You choose a custom DLL, Export function Is ChinaPYG_COM<BR>Use
tools LordPE add PE file input table
DllPatch_Tip=You have selected the patch file for subsidiary<BR>1.Please fill in
the correct host name<BR>2.Please check the dynamic base address[Common sense]!
<BR>3.Make sure the timing of the DLL is loaded crack and choose a good API HOOK!
<BR>4.this option open After Can not To Host EXE Conduct patch
BaseAddr_Tip=Ollydbg in ALT+E You can see the module loaded base<BR>Here we must
fill in real time relative to the base address of the patch, otherwise the offset
error is calculated<BR>For example:<BR>Patch Address:00400200<BR>Current Address:
00400000<BR>The real patch offset = 00400200 - 00400000 = 200<BR>
FileExists_Str=File already exists, Do you want to overwrite?
lblExeName_Caption1=Host Name:
lblExeName_Caption2=Target Name:
Length_Err=Different raw data and patch data length!
Load_Str=PYG_Loader
Make_Fail=%sGeneration failed! Check to see if the file is occupied or interfere
with anti-virus software!
Make_Success=%sCompleted generating! You can now shell protection!<BR>Tip: If not
loaded, please think of ways to solve
Need_BaseAddr=Please fill in the real-time base!
Need_Data=Please fill in the patch data!
Need_ProcName=Please fill in the name of HOOK API!
Need_Target=Please fill in the Target Name!
OriData_Err=Please follow the original data byte aligned!
PatchCount_Err=Patch address can not be more than 100,Please modify the!
PatchData_Err=Please follow patch data byte aligned!
Save_Success=Data saved successfully!
Version_Str=Version:
TfrmMain.btnAbout.Caption=About
TfrmMain.btnAdd.Caption=Add
TfrmMain.btnDel.Caption=Delete
TfrmMain.btnDelAll.Caption=Del.All
TfrmMain.btnExit.Caption=Exit
TfrmMain.btnHelp.Caption=Help
TfrmMain.btnLoad.Caption=Load
TfrmMain.btnMake.Caption=Build
TfrmMain.btnModify.Caption=Modify
TfrmMain.btnSave.Caption=Save
TfrmMain.Caption=dll hijack memory patch authoring tools
TfrmMain.chkInjectTool.Caption=Generation injection tools
TfrmMain.chkIsAslr.Caption=Target have ASLR
TfrmMain.chkIsHookAPI.Caption=Hook API :
TfrmMain.chkIsOpenWebPage.Caption=Patch successful Visit the site
TfrmMain.chkIsPatchDll.Caption=Patch dll/ocx ancillary documents
TfrmMain.chkIsShowMessage.Caption=Patch successful msg :
TfrmMain.chkUPX.Caption=UPX compressed output
TfrmMain.lbl10.Caption=Current Base :
TfrmMain.lbl11.Caption=Sec
TfrmMain.lbl12.Caption=Target (.dll) :
TfrmMain.lbl3.Caption=Comments
TfrmMain.lbl4.Caption=Patch addr:
TfrmMain.lbl5.Caption=Raw data ( Hex )
TfrmMain.lbl6.Caption=Patch data ( Hex )
TfrmMain.lbl8.Caption=Build Type :
TfrmMain.lblExeName.Caption=Target Name:
TfrmMain.lblExeName2.Caption=Target Name:
TfrmMain.lblExeName3.Caption=Target Name:
TfrmMain.lblExeName4.Caption=Target Name:
TfrmMain.lblExeName5.Caption=Target Name:
TfrmMain.lblLanguage.Caption=Language :
TfrmMain.lvPatchData.Columns.Item0.Caption=NO
TfrmMain.lvPatchData.Columns.Item1.Caption=Patch Address
TfrmMain.lvPatchData.Columns.Item2.Caption=Raw data
TfrmMain.lvPatchData.Columns.Item3.Caption=Patch data
TfrmMain.mmoShowMessage.Lines.Text=++++++++++++++++<BR>P.Y.G Decryption team works
<BR>WwW.CHiNaPYG.CoM<BR>For research purposes only, do not infringing! <BR>++
++++++++++++++<BR><BR>
TfrmMain.rzgrpbx2.Caption=Info:[Patch addr max:100, Total bytes patch max:2048
bytes,Support OllyDBG binary copy]
TfrmMain.RzOpenDialog1.Title=load Patch data
TfrmMain.RzSaveDialog1.Title=save Patch data
TfrmMain.TabSheetFile1.Caption=Target1
TfrmMain.TabSheetFile2.Caption=Target2
TfrmMain.TabSheetFile3.Caption=Target3
TfrmMain.TabSheetFile4.Caption=Target4
TfrmMain.TabSheetFile5.Caption=Target5
TfrmMain.TabSheetFileHelp.Caption=Description

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy