For Windows (tested with version 9.3.251224) :
import os
import re
pat_func = b"\x40\x56\x57\x48\x81\xec\x88\x04\x00\x00"
sub_func = b"\xb8\x01\x00\x00\x00\xc3\x90\x90\x90\x90"
pat_jump = re.compile(b"...", re.DOTALL)
def patch():
f = "ida.dll"
if not os.path.exists(f):
print("err: ida.dll ...
Search found 3 matches
- Wed Mar 04, 2026 2:39 pm
- Forum: XRD Releases
- Topic: IDA Professional 9.x Lumina Patcher (Windows & Linux)
- Replies: 1
- Views: 125
- Wed Mar 04, 2026 11:09 am
- Forum: XRD Releases
- Topic: IDA Professional 9.x Lumina Patcher (Windows & Linux)
- Replies: 1
- Views: 125
IDA Professional 9.x Lumina Patcher (Windows & Linux)
see reply for windows version
since hexrays went full nuclear on custom lumina servers in 9.x i made a fix. they basically hardcoded tls and added "baked-in" cert pinning so even with a valid cert it rejects anything that isnt their own server.
this script scans for the jumps and nops them out ...
since hexrays went full nuclear on custom lumina servers in 9.x i made a fix. they basically hardcoded tls and added "baked-in" cert pinning so even with a valid cert it rejects anything that isnt their own server.
this script scans for the jumps and nops them out ...
- Mon Feb 09, 2026 5:31 am
- Forum: Site News
- Topic: Loading...
- Replies: 0
- Views: 192
Loading...
:idea: The XRD forums are up and running now, with a few minor tweaks that need to be made.
I made this for security/reverse engineering focused people who want a classical discussion board experience and are tired of modern messengers and communities like Discord or Reddit. :roll:
I don't expect ...
I made this for security/reverse engineering focused people who want a classical discussion board experience and are tired of modern messengers and communities like Discord or Reddit. :roll:
I don't expect ...