资源简介
VMware14 unlocker,亲试可用,以下为步骤:
1. 安装VMware Workstation 14
2. 管理员权限运行win-install.cmd,如需要升级tools,请运行win-update-tools.cmd
代码片段和文件信息
“““
The MIT License (MIT)
Copyright (c) 2014-2015 Dave Parsons & Sam Bingner
Permission is hereby granted free of charge to any person obtaining a copy
of this software and associated documentation files (the ‘Software‘) to deal
in the Software without restriction including without limitation the rights
to use copy modify merge publish distribute sublicense and/or sell
copies of the Software and to permit persons to whom the Software is
furnished to do so subject to the following conditions:
The above copyright notice and this permission notice shall be included in
all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED ‘AS IS‘ WITHOUT WARRANTY OF ANY KIND EXPRESS OR
IMPLIED INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM DAMAGES OR OTHER
LIABILITY WHETHER IN AN ACTION OF CONTRACT TORT OR OTHERWISE ARISING FROM
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
THE SOFTWARE.
vSMC Header Structure
Offset Length struct Type Description
----------------------------------------
0x00/00 0x08/08 Q ptr Offset to key table
0x08/08 0x04/4 I int Number of private keys
0x0C/12 0x04/4 I int Number of public keys
vSMC Key Data Structure
Offset Length struct Type Description
----------------------------------------
0x00/00 0x04/04 4s int Key name (byte reversed e.g. #KEY is YEK#)
0x04/04 0x01/01 B byte Length of returned data
0x05/05 0x04/04 4s int Data type (byte reversed e.g. ui32 is 23iu)
0x09/09 0x01/01 B byte Flag R/W
0x0A/10 0x06/06 6x byte Padding
0x10/16 0x08/08 Q ptr Internal VMware routine
0x18/24 0x30/48 48B byte Data
“““
import os
import sys
import struct
import subprocess
if sys.version_info < (2 7):
sys.stderr.write(‘You need Python 2.7 or later\n‘)
sys.exit(1)
# Setup imports depending on whether IronPython or CPython
if sys.platform == ‘win32‘ \
or sys.platform == ‘cli‘:
from _winreg import *
def rot13(s):
chars = ‘AaBbCcDdEeFfGgHhIiJjKkLlMmNnOoPpQqRrSsTtUuVvWwXxYyZz‘
trans = chars[26:] + chars[:26]
rot_char = lambda c: trans[chars.find(c)] if chars.find(c) > -1 else c
return ‘‘.join(rot_char(c) for c in s)
def bytetohex(bytestr):
return ‘‘.join([‘%02X ‘ % ord(x) for x in bytestr]).strip()
def printkey(i offset smc_key smc_data):
print str(i + 1).zfill(3) \
+ ‘ ‘ + hex(offset) \
+ ‘ ‘ + smc_key[0][::-1] \
+ ‘ ‘ + str(smc_key[1]).zfill(2) \
+ ‘ ‘ + smc_key[2][::-1].replace(‘\x00‘ ‘ ‘) \
+ ‘ ‘ + ‘{0:#0{1}x}‘.format(smc_key[3] 4) \
+ ‘ ‘ + hex(smc_key[4]) \
+ ‘ ‘ + bytetohex(smc_data)
E_CLASS64 = 2
E_SHT_RELA = 4
def patchELF(f oldOffset newOffset):
f.seek(0)
属性 大小 日期 时间 名称
----------- --------- ---------- ----- ----
目录 0 2017-10-04 15:47 VMware14unlocker\
文件 3031568 2017-09-30 08:05 VMware14unlocker\14patch.exe
文件 14042 2017-09-30 07:42 VMware14unlocker\14patch.py
文件 3139369 2015-11-23 04:55 VMware14unlocker\dumpsmc.exe
文件 5434 2015-10-14 08:23 VMware14unlocker\dumpsmc.py
文件 497 2017-09-30 08:14 VMware14unlocker\esxi-install.sh
文件 333 2015-10-14 08:23 VMware14unlocker\esxi-uninstall.sh
文件 3987679 2015-11-23 04:55 VMware14unlocker\gettools.exe
文件 4094 2015-10-15 07:20 VMware14unlocker\gettools.py
文件 995 2017-09-30 08:11 VMware14unlocker\lnx-install.sh
文件 899 2015-10-17 00:40 VMware14unlocker\lnx-uninstall.sh
文件 454 2015-11-23 08:45 VMware14unlocker\lnx-update-tools.sh
文件 1111 2015-10-14 08:23 VMware14unlocker\local-template.sh
文件 808 2017-09-30 08:11 VMware14unlocker\osx-install.sh
文件 751 2015-10-14 08:23 VMware14unlocker\osx-uninstall.sh
文件 6086 2015-11-24 00:36 VMware14unlocker\readme.txt
文件 3141521 2015-11-23 04:56 VMware14unlocker\unlocker.exe
文件 13995 2015-10-15 07:08 VMware14unlocker\unlocker.py
文件 1428 2017-09-30 08:11 VMware14unlocker\win-install.cmd
文件 1309 2015-10-17 00:40 VMware14unlocker\win-uninstall.cmd
文件 637 2015-11-23 08:45 VMware14unlocker\win-update-tools.cmd
文件 124 2015-05-19 14:42 VMware14unlocker\去脚本之家看看.url
文件 112 2015-05-19 14:42 VMware14unlocker\服务器软件.url
文件 117 2015-10-28 11:16 VMware14unlocker\领取天猫淘宝内部优惠券.url
- 上一篇:全国大学生电子设计大赛培训教程(全)
- 下一篇:经典教材:雷达原理ppt
评论
共有 条评论