Today I am presenting a new script for bypassing hwid of Enigma Targets. It is different approach to bypass it. I am personally tested in on version 1.xx to 4.30 hope it will work for you. It is very helpful when you will try to unpack a enigma target.
How it work?
I have managed to find a procedure where Enigma protector is trying to show a nag screen. I compared it with many version of Enigma and found that the bytes pattern is same so I have created a script that will do this very fast automatically for me.
Convert to loader:
If you wan't to convert your bypassed program into loader I am also added a small option in script. All information about patch virtual address, old byte, new byte are shown in log window. You can use any loader generator to generate a Loader for you program. I have already posted a tutorial about "How to Generate loader in Delphi" and "How to use dUP".
A word from CrackingGSM Team
Everything is not perfect. There maybe some exception, It maybe possible that the script will not work with your target so please don't blame me because We are also human, we can do mistakes but hopefully it will definitely work with your target.
If you have any query about this please tell us in comment box and Thanks for supporting us. We will be back soon with bang new things.