flat assembler
Message board for the users of flat assembler.
Index
> Windows > Add double slashes into path |
Author |
|
bitRAKE 03 Apr 2021, 11:26
This works except when it doesn't.
_________________ ¯\(°_o)/¯ “languages are not safe - uses can be” Bjarne Stroustrup |
|||||||||||
03 Apr 2021, 11:26 |
|
FlierMate 03 Apr 2021, 14:44
bitRAKE wrote: This works except when it doesn't. I think your code is great, but why does Windows Defender report EXE built by FASM as malware again.
|
||||||||||
03 Apr 2021, 14:44 |
|
revolution 03 Apr 2021, 15:02
Disable Windows Defender. It isn't protecting you anyway, and only serves to make you feel better.
|
|||
03 Apr 2021, 15:02 |
|
semiono 03 Apr 2021, 15:32
I've radical method to remove Defender from win8.1.iso, no app no problem
|
|||
03 Apr 2021, 15:32 |
|
bitRAKE 03 Apr 2021, 18:37
Maybe it's because I openly criticize retarded programming practices and the stupid people that implement them? Nah, it's because their software is really that bad.
Maybe, it's because I have the ability to code programs that match arbitrary hash IDs. Nah, it's because their software is really that bad. Maybe it's because they target unknown software as a monopolistic business practice? Yeah, that's probably true. _________________ ¯\(°_o)/¯ “languages are not safe - uses can be” Bjarne Stroustrup |
|||
03 Apr 2021, 18:37 |
|
semiono 11 Dec 2022, 02:55
«I'll be back»
Maybe return again. It's need more. The code bitRAKE just low level asm without msdn calls. I give up! In addition this includes are modified. My fasm stop with errors. Maybe has a easier? Code: .FRAME error |
|||
11 Dec 2022, 02:55 |
|
bitRAKE 11 Dec 2022, 11:21
The general sentiment is to start from the end of the string, pushing string fragments - whenever a '\' is found push double-slash string. Finally, concatenate all the strings. The code is for fasmg. In my current environment it would look slightly different.
I like assembly. Just looking at a bunch of CALL, CALL, CALL, ... doesn't not appeal to me, and should be left to high-level languages, imho. _________________ ¯\(°_o)/¯ “languages are not safe - uses can be” Bjarne Stroustrup |
|||
11 Dec 2022, 11:21 |
|
Mustafa01 11 Dec 2022, 16:52
semiono wrote: «I'll be back» (not tested, just wrote it) Code: lea esi, [src] lea edi, [dst] _repeat: cld lodsb stosb cmp al, '\' jne _skip1 stosb ; double the slash _skip1: test al, al jz _end jmp _repeat _end: int 3h |
|||
11 Dec 2022, 16:52 |
|
semiono 11 Dec 2022, 16:58
Thanks to all!
Code: include '%fasm%/win64ax.inc' section '.code' executable start: sub rsp,8 invoke GetCurrentDirectory,MAX_PATH,a invoke lstrlen,a xchg ecx,eax mov esi,a mov edi,b @@: lodsb cmp al,'\' jne @next mov word[edi],'\\' inc edi @next: stosb loop @r invoke MessageBoxTimeout,HWND_DESKTOP,b,'',MB_TOPMOST,LANG_NEUTRAL,2000 exit: invoke ExitProcess,NULL section '.data' readable writeable a rb MAX_PATH b rb MAX_PATH tested |
|||
11 Dec 2022, 16:58 |
|
semiono 11 Dec 2022, 17:00
Quote:
cool! |
|||
11 Dec 2022, 17:00 |
|
< Last Thread | Next Thread > |
Forum Rules:
|
Copyright © 1999-2025, Tomasz Grysztar. Also on GitHub, YouTube.
Website powered by rwasa.