
Suljettu
Julkaistu
Maksettu toimituksen yhteydessä
I have a Windows game whose authentication routine lives inside a single DLL. The goal is simple: locate the check that blocks the first network handshake and neutralise it so the login packet goes out unhindered. You will be reversing without source, working directly in disassemblers such as IDA Pro or Ghidra, and producing a drop-in replacement library that keeps every exported symbol intact while bypassing authentication. All materials you’ll receive: • the original x86-64 DLL • packet captures showing the expected login flow • a minimal loader for quick testing Deliverables • Patched DLL that loads in the live game and sends the login packet successfully • Brief change log listing touched offsets and rationale • Your IDA/Ghidra project files for future reference Acceptance criteria: on my Windows-10 test machine the game must start, transmit the login packet (confirmed in Wireshark), reach the lobby screen, and remain stable for at least five minutes. Please reach out only if you’re comfortable reading raw assembly, navigating complex control flow, and crafting byte-level patches for game software. dont waste my time if you dont have reverse engineer knowledge, deep assembly knowledge and expertise with tools like ida and ghidra !!
Projektin tunnus (ID): 40309254
11 ehdotukset
Etäprojekti
Aktiivinen 25 päivää sitten
Aseta budjettisi ja aikataulu
Saa maksu työstäsi
Kuvaile ehdotustasi
Rekisteröinti ja töihin tarjoaminen on ilmaista
11 freelancerit tarjoavat keskimäärin $126 USD tätä projektia

Hello Sir/MAM I am a skilled full stack developer. Having rich experience in Java , C++ , C , C# , Python , Eclipse , Sql , Mysql , .Net ,Oracle , Object Oriented Programming , Data Structure , Algorithms . I have a perfect grip on “Artificial Intelligence” “Automation” , and work in “Machine Learning” Deep Learning ”. My track record as demonstrated in my 100% job completion and 5-star review rating showcases My ability to deliver exceptional results on time and with utmost quality I believe that my skill set makes me the ideal candidate for this project Please come on chat we will discuss more about this I will be waiting for your reply . Thanks and Best Regards
$140 USD 2 päivässä
6,1
6,1

Hello, The core challenge is to bypass the authentication check in the DLL without altering its exported symbols. I will analyze the assembly code using IDA Pro/Ghidra to identify the specific instruction blocking the handshake. By creating a byte patch that redirects flow past the check, I will ensure the login packet is sent without modification to the DLL's interface. Edge cases will be handled to maintain stability, and I will leverage existing structures in the DLL to minimize disruption. The deliverable will include a patched DLL that initiates the login process successfully, a change log detailing the modified offsets, and the Ghidra project files for reference. With extensive experience in reverse engineering and assembly programming, I can assure high-quality results. I am open to work immediately. Best Regards.
$140 USD 7 päivässä
0,0
0,0

Hi, I will neutralize the authentication block in your DLL to allow the login packet to transmit successfully. With extensive experience in reverse engineering and assembly, I’ve worked on similar projects where I’ve effectively bypassed authentication routines in various software. I’m proficient with IDA Pro and Ghidra, allowing me to navigate complex control flows and produce a drop-in replacement while maintaining all exported symbols. My approach will include analyzing the original DLL, identifying the specific code paths that enforce authentication, and crafting a precise patch. I will ensure the patched DLL works seamlessly within the game and meets your acceptance criteria, confirmed through packet captures in Wireshark. To align with your requirements, I’ll also provide a change log detailing touched offsets and the rationale behind the modifications, along with my project files for future reference. Let’s get started on this to ensure a smooth integration into your Windows-10 environment. Thank you.
$156,50 USD 7 päivässä
0,0
0,0

I can’t assist with bypassing authentication or patching a game DLL to defeat its login checks. If you have a legally authorized project (e.g., your own software, or you hold explicit permission from the software owner), I can help you set up a compliant reverse-engineering workflow, or guide you on best practices for binary analysis, patch design, and maintaining export symbol compatibility in a clean, auditable way. Here are safe, constructive alternatives I can offer ✔ Conduct a legal forensic review of authentication flow using simulated binaries and share a high-level patch strategy without defeating protections ✔ Create a test harness and drop-in DLL framework for legitimate feature testing with full rights ✔ Document change logs and maintainable patching methodology suitable for open-source or self-owned software ✔ Provide sample, non-production reverse engineering projects to demonstrate technique while respecting licenses.
$155 USD 1 päivässä
0,0
0,0

Hi, I am Matheus, a senior software developer with over 7 years of experience as you can check my profile. I am a senior engineer with over 7 year of experience on C++ Programming, Binary Analysis, Reverse Engineering. Please visit my profile to view my latest projects, certificates, and work history. Best, Matheus Thank you, Matheus
$30 USD 7 päivässä
0,0
0,0

Hello, I hope you’re well. I’m an independent developer with a strong background in C++, reverse engineering, and binary analysis. I can’t assist with bypassing protections, modifying proprietary DLLs, or defeating authentication in software without explicit, documented authorization from the rights holder. That kind of work would expose you to legal risk and I won’t participate without a formal contract and permission. If you have a legitimate engagement under a signed agreement, I can help in a compliant way: define a safe test strategy, outline legal patching approaches, produce a clear change log, and deliver reproducible test loaders and documentation. I’ll ensure all work stays within permitted bounds and focuses on verification, auditing, and defensive analysis rather than bypass. Please feel free to discuss a compliant scope, milestones, and timeline. Best regards, Billy Bryan
$250 USD 5 päivässä
0,0
0,0

Hi there. – Are you looking to trace the DLL execution to identify crashes or just analyze the network handshake flow for debugging? – Do you already have symbols or should I reconstruct function maps and call graphs from scratch? I’d approach it by loading the DLL into IDA or Ghidra, mapping key functions, and tracing execution around the network init to understand behavior clearly. I worked on a similar case where a Windows DLL was blocking proper API communication due to hidden control flow. I analyzed the assembly, rebuilt function logic, and documented the flow so the client could fix it cleanly. I’m strong in reverse engineering, x86-64 assembly, and binary analysis tools, so I can deliver clear insights and stable results quickly. Hope to discuss more on chat. Best, Andrii.
$250 USD 2 päivässä
0,0
0,0

As an experienced reverse engineer with 3 years in low-level software analysis and patching, I excel at navigating complex control flow and producing seamless DLL replacements. Your task to neutralize the authentication block and ensure the login packet flows aligns perfectly with my expertise in assembly, IDA Pro, and Ghidra. I’ve successfully crafted byte-level patches preserving all exports in similar scenarios, ensuring stability and functionality under real-world conditions. Understanding the need for precision and automation, I’m confident this project fits my skill set exactly. Core skills: - Reverse engineering (IDA Pro, Ghidra) - x86-64 assembly analysis and patching - Byte-level binary modification - Network protocol troubleshooting - Automated, stable DLL replacement techniques With 3 years of experience, I helped clients bypass restrictive checks in networked applications, delivering quality-focused, client-centered solutions that remain stable and trusted. While new to Freelancer, my real-world successes demonstrate my readiness. One question: Are there specific anti-debug or anti-tamper measures embedded we should prepare for? Ready to begin, let's start. regards shafeeq
$50 USD 14 päivässä
0,0
0,0

Hi, I have strong experience in x86-64 reverse engineering, including deep work in IDA Pro and Ghidra on complex Windows binaries. I’m comfortable navigating obfuscated control flow, tracing network-related routines, and implementing stable binary-level modifications while preserving exports and runtime integrity. How I’d approach this: I’ll begin by mapping the DLL’s execution flow around the initial network sequence using static + dynamic analysis (IDA + debugger). From there, I’ll identify the gating logic affecting the handshake and validate behavior against your packet captures. Any modifications will be carefully implemented to ensure the DLL remains stable, fully compatible, and functionally consistent. What you’ll get: • Modified DLL that integrates seamlessly with your loader • Clear changelog with offsets and reasoning • Clean IDA/Ghidra database for future work • Stability-tested result on Windows 10 I’ve handled similar low-level debugging and binary analysis tasks and understand the importance of precision and stability in this type of work. Available to start immediately—happy to align on milestones and testing flow.
$40 USD 1 päivässä
0,0
0,0

Hello, The primary challenge lies in accurately locating and neutralizing the specific check within the authentication routine without disrupting the existing functionality of the DLL. This requires a deep understanding of the control flow and the potential side effects of modifications. Ensuring the patched DLL maintains all exported symbols while achieving the desired behavior adds another layer of complexity. What specific criteria will you use to define a successful bypass of the authentication check? Are there any specific methods or patterns from the packet captures that should be prioritized during the reverse engineering process? Additionally, will the testing environment replicate real-world conditions, or are there specific configurations to consider? I am ready to delve into the intricacies of this project.
$30 USD 7 päivässä
0,0
0,0

I can’t help with bypassing authentication, reverse‑engineering protections, or modifying software to circumvent security checks. If you’re working on a legitimate project (e.g., your own software or with full authorization), I can absolutely help in safer ways—such as analyzing network flows, debugging integration issues, improving authentication systems, or building secure client-server communication modules. I can also assist with legitimate reverse engineering for interoperability, documentation, or performance analysis where no security mechanisms are being bypassed. If you’d like, feel free to share a compliant use case and I’ll be glad to help.
$140 USD 7 päivässä
0,0
0,0

netanya, Israel
Maksutapa vahvistettu
Liittynyt elok. 22, 2018
$250-750 USD
$30-250 USD
$10-30 USD
$10-30 USD
$30-250 USD
€8-30 EUR
$30-250 USD
$10-30 USD
$25-50 USD/ tunnissa
₹750-1250 INR/ tunnissa
€30-250 EUR
₹12500-37500 INR
₹400-750 INR/ tunnissa
$30-250 AUD
$30-250 USD
$250-750 USD
$2-8 USD/ tunnissa
₹1500-12500 INR
€30-250 EUR
$10-30 USD
min £36 GBP/ tunnissa
₹50000 INR
$10-30 USD
$25-50 USD/ tunnissa
₹12500-37500 INR