Compare commits

..

423 Commits

Author SHA1 Message Date
Matt Nadareski
4807520169 This doesn't need private set 2026-01-30 22:32:44 -05:00
Matt Nadareski
91da3068b6 Clean up now-empty region 2026-01-30 22:31:25 -05:00
Matt Nadareski
c9316651c5 Use auto properties for static check lists 2026-01-30 22:30:59 -05:00
Matt Nadareski
2b3917a1ee These can't be null anymore 2026-01-30 22:15:34 -05:00
Matt Nadareski
efef8d494e More cleanup 2026-01-27 09:30:58 -05:00
Matt Nadareski
6c1efccb00 Fix incorrect formatting issue 2026-01-25 17:30:54 -05:00
Matt Nadareski
0d2f81773d Add editorconfig, fix issues 2026-01-25 17:27:42 -05:00
Morlit55
7058c7a150 More info on Dinamic Multimedia Protection (#404)
* More info on Dinamic Multimedia Protection

Added comments regarding related DRM and patents for Dinamic Multimedia Protection.

* Removed MPO references

MPO ring protection has since been proven to be unrelated.
2026-01-23 11:54:59 -05:00
HeroponRikiBestest
417c1f8208 Fix scanning for Solidshield 3.0.0.0 DLLs. (#403)
* Fix scanning for Solidshield 3.0.0.0 DLLs.

* Add curly braces for multiline if
2026-01-10 16:10:58 -05:00
HeroponRikiBestest
82fc850b57 minor starforce fix (#402)
* minor starforce fix

* combine regex checks
2025-12-29 22:58:12 -05:00
HeroponRikiBestest
973b0118b6 Fix minor nested json issue (#398) 2025-12-02 12:15:39 -05:00
HeroponRikiBestest
c2368661cb Fix oversight where Scanner.cs won't scan for files if an archive extracts to one or more directories (#397)
* Scanner.cs won't scan for files if an archive extracts to a directory

* use fsentries
2025-11-29 14:48:47 -05:00
Matt Nadareski
05bddd6005 Bump version 2025-11-25 08:40:36 -05:00
Matt Nadareski
777232301d Update Serialization to 2.2.1 2025-11-25 07:56:38 -05:00
Matt Nadareski
41a705c343 Add support for .NET 10 2025-11-24 11:57:17 -05:00
HeroponRikiBestest
805beb3418 Improve starforce keyless detection (#396) 2025-11-17 22:00:44 -05:00
HeroponRikiBestest
cc7592e07a consistent alpharom stylization (#395)
I forgot that Alpha-ROM is stylized with a dash. Mainly PRing so it'll also be consistent with how it already is on redump.
2025-11-17 12:29:26 -05:00
HeroponRikiBestest
41ad8adf6e Small TAGES and AlphaROM improvements (#394)
* Small improvement to early TAGES detection to eliminate small handful of false positives. Also threw in a note about alpharom

* Improve alpharom handling

* Initial round of fixes
2025-11-16 15:55:32 -05:00
HeroponRikiBestest
201badd434 Update RC dictionary name now that one of the entries is in redump (#393) 2025-11-14 07:28:46 -05:00
Matt Nadareski
f58003b3fc Ensure JSON added to help print 2025-11-13 13:59:25 -05:00
Matt Nadareski
ff8976a67a Restore warning not as error 2025-11-10 13:09:49 -05:00
Matt Nadareski
dc968c2d15 Bump version 2025-11-10 13:07:37 -05:00
Matt Nadareski
3726abb209 Cleanup 2025-11-10 12:57:08 -05:00
HeroponRikiBestest
ac8dfb833c Fixes last minute issue with json parsing (#392)
* fix

* add comment back

* slight simplification

* Remove newline

* Remove newline

* Fix
2025-11-10 12:45:56 -05:00
Matt Nadareski
f0673046dc Minor cleanup from last commit 2025-11-10 09:53:53 -05:00
Matt Nadareski
d9fa073c0f Minor cleanup from last commit 2025-11-10 09:53:25 -05:00
HeroponRikiBestest
95a20fb30d Add nested json output for protectionscan (#391)
* Attempt nested for real this time

* forgot to include handling the base path

* Reverted unnecesssary changes

* Remove unneeded net6.0 gating

* Add comments

* Finish comments

* Might as well safeguard if no protections are returned.

* Use object instead of dynamic

* Remove weird empty string root node handling

* remove uneeded ref

* Modify comment accordingly

* Merge regular and nested json writing

* Simplify object value checking

* change flag handling

Co-authored-by: Matt Nadareski <mnadareski@outlook.com>

* Initial fixes

* Invert if-else to de-nest main logic

* minor formatting fixes

* Improved Json output

* Remove unnecessary comments

* That's just a string

* Slight improvement

* Simplify casting

* attept further simplification

* Further

* Reduce nesting using inversion and continue

* Further simplified logic

* Replace my code with sabre's

* De-nest using continue

* newline

* Remove all instances where it can end in a directory seperator

---------

Co-authored-by: Matt Nadareski <mnadareski@outlook.com>
2025-11-10 09:48:22 -05:00
Matt Nadareski
dd1e49662f Cleanup 2025-11-07 22:14:28 -05:00
HeroponRikiBestest
78947616b1 Add json output for protectionscan (#390)
* actual first pr

* Initial fixes

* Second round of fixes

* Final fix
2025-11-07 22:07:08 -05:00
Matt Nadareski
ba56b9aff6 Add file-only flag for scans 2025-11-07 10:51:02 -05:00
Matt Nadareski
3b287c6f7b Mid 2025-11-07 09:46:34 -05:00
Matt Nadareski
dcdf0bcf40 Automatic cleanup 2025-11-07 08:24:22 -05:00
Matt Nadareski
d2eebd0f00 Cleanup 2025-11-07 07:40:33 -05:00
HeroponRikiBestest
a281e8325e Initial ISO Protection Detection (#389)
* Initial

* Laserlock in

* This is a better way to read the string

* That array copy wasn't needed either

* Use static filetype method, rename filetype.iso

* Initial Codelok ISO scanning

* Comments with redump IDs

* Add redump examples to laserlock

* Change for testing

* Small comment

* TAGES

* halfway through safedisc

* Safedisc done

* Fix 1

* Major oversights in puredata fixed

* Finish SecuROM

* ProtectDiSC done

* Alpharom done

* Finish StarForce, initial PR review ready

* Wait, that would be really bad

* One more for the road.

* Small finding

* Small fix for finding

* Notes on finding

* Several minor fixes, decisions

* what do you MEAN it returns true if there are no elements in the array

* Future todo

* Update packages

* Rebase

* Fix runisochecks

* First round of fixes

* Second round of fixes

* Tests attempt 1

* Make checks work

* Individual test attempt 1

* Final tests

---------

Co-authored-by: Matt Nadareski <mnadareski@outlook.com>
2025-11-07 07:22:28 -05:00
Matt Nadareski
9f5b292035 Fix MPQ note 2025-11-06 21:05:55 -05:00
Matt Nadareski
466689dcbc Clean up holdover logic 2025-11-06 13:43:49 -05:00
Matt Nadareski
5b0bf2e7e4 Update packages 2025-11-06 08:22:09 -05:00
Matt Nadareski
cc8dfb8478 Update rolling tag 2025-10-26 20:29:55 -04:00
Matt Nadareski
82412fce9a Add more ProtectCD/DVD checks (fixes #387) 2025-10-21 14:06:09 -04:00
HeroponRikiBestest
1a67decd7b Minor Release Control update (#386)
* Minor Release Control update

Added russian Gothic 4, updated international gothic 4 now that a redump entry exists, noted 2 other versions known to exist.

* Minor comment formatting
2025-10-16 19:58:48 -04:00
Matt Nadareski
f1afb6d60b Bump version 2025-10-07 16:00:04 -04:00
Matt Nadareski
5e812daf01 Fix debug flag use 2025-10-07 14:56:53 -04:00
Matt Nadareski
ab508eebe8 Use main feature pattern 2025-10-07 13:44:27 -04:00
Matt Nadareski
31792fab48 Update packages 2025-10-07 13:33:55 -04:00
Matt Nadareski
010f792b1a Add minor identifier for NSIS 2025-10-07 09:45:50 -04:00
Matt Nadareski
a3118cee68 Use CommandLine library for executable 2025-10-06 09:43:15 -04:00
Matt Nadareski
daa72eb970 Bump version 2025-10-05 17:32:27 -04:00
Matt Nadareski
a42328ef60 Update Serialization to 2.0.1 2025-10-05 17:26:01 -04:00
Matt Nadareski
7f2dd26d9b Require exact versions for build 2025-09-30 11:12:41 -04:00
Matt Nadareski
871ac97a3a Bump version 2025-09-29 14:18:10 -04:00
Matt Nadareski
5e11048e18 Remove compiler flags that weren't working 2025-09-29 12:44:52 -04:00
Matt Nadareski
19e696bf15 Use an assumption to help trim for now 2025-09-29 08:33:33 -04:00
Matt Nadareski
ddf8c393df Use AddD reader instead of manual 2025-09-29 08:29:30 -04:00
Matt Nadareski
d234549099 Use constant for AddD 2025-09-29 08:26:37 -04:00
Matt Nadareski
5899dd99f3 Reduce AddD search window 2025-09-29 08:24:08 -04:00
Matt Nadareski
f50f9f741d Update Serialization to 2.0.0 2025-09-29 08:01:50 -04:00
Matt Nadareski
09f5b28de7 More Clickteam notes 2025-09-27 21:34:11 -04:00
Matt Nadareski
f71a007b35 Add notes about Clickteam 2025-09-27 21:02:08 -04:00
Matt Nadareski
d6a89c8905 Partially revert and clarify 2025-09-26 21:45:01 -04:00
Matt Nadareski
1b4f363b08 Couple of PECompact things 2025-09-26 21:41:15 -04:00
Matt Nadareski
8abdaa4218 Add a couple more NSIS notes 2025-09-26 21:35:33 -04:00
Matt Nadareski
454bfa9f4f Check overlay for NSIS 2025-09-26 21:31:59 -04:00
Matt Nadareski
8534cda9c5 Add comment for NSIS 2025-09-26 21:28:37 -04:00
Matt Nadareski
b285127cee Intel Installation Framework is extractable 2025-09-26 21:24:47 -04:00
Matt Nadareski
8a6179ea11 Add newly found Shrinker section name 2025-09-26 20:59:19 -04:00
Matt Nadareski
d07e46c5f7 Add a Gentee note 2025-09-26 20:54:59 -04:00
Matt Nadareski
ee5ed5e833 Add some notes about EXECryptor 2025-09-26 20:51:29 -04:00
Matt Nadareski
7fcdfce152 Add notes about ApecSoft 2025-09-26 20:39:22 -04:00
Matt Nadareski
f1d7ee89cb Remove TODO 2025-09-26 20:05:58 -04:00
Matt Nadareski
1765e4da16 Clean up remarks, add SFX trailing name 2025-09-26 08:35:25 -04:00
Matt Nadareski
2a7455252e Add more Advanced Installer notes 2025-09-25 21:53:19 -04:00
Matt Nadareski
057ce3c4cc Add more Advanced Installer notes 2025-09-25 21:44:08 -04:00
Matt Nadareski
7e7d166ed8 Add note for Advanced Installer 2025-09-25 21:02:54 -04:00
Matt Nadareski
0872e0ff49 Bump version 2025-09-24 13:07:03 -04:00
Matt Nadareski
c0a590db63 Use package-provided IProgress to avoid conflict 2025-09-24 13:06:27 -04:00
Matt Nadareski
50b4eb99e3 Bump version 2025-09-24 12:38:01 -04:00
Matt Nadareski
08a90d52a8 Update packages 2025-09-24 12:14:31 -04:00
Matt Nadareski
d41cd63ad7 Use "proper" namespace since it's public 2025-09-22 21:05:39 -04:00
Matt Nadareski
c12d3fbe15 Progress doesn't need to be hindered 2025-09-22 21:04:17 -04:00
Matt Nadareski
4db1c57830 Internalize Func for .NET Framework 2.0 2025-09-22 21:01:23 -04:00
Matt Nadareski
1e1da59ba0 Bump verison 2025-09-22 09:36:40 -04:00
Matt Nadareski
4a94c80ec1 Move constructor closer to use 2025-09-22 08:58:43 -04:00
Matt Nadareski
cb4c4cb3fb Make exception handling less broad 2025-09-22 08:56:58 -04:00
Matt Nadareski
8008705366 Move BurnOut reference to Special Thanks 2025-09-21 19:01:27 -04:00
Matt Nadareski
20888a22db Unify file endings again 2025-09-21 19:00:36 -04:00
Matt Nadareski
b06512e292 Slight documentation cleanup 2025-09-21 18:59:29 -04:00
Matt Nadareski
18ce24400a Unify file endings again 2025-09-21 18:55:55 -04:00
Matt Nadareski
31d85360e9 These shoutouts have been replaced by references in Models 2025-09-21 17:49:15 -04:00
Matt Nadareski
53c8ec1dcf Whitespace and usings cleanup 2025-09-21 15:30:18 -04:00
Matt Nadareski
c68f126210 How did all of this whitespace slip through? 2025-09-21 15:13:23 -04:00
Matt Nadareski
03016f3399 Try 16 2025-09-21 14:27:35 -04:00
Matt Nadareski
778064b3a5 Remove now-duplicated extensions 2025-09-21 13:32:45 -04:00
Matt Nadareski
4ed619ee30 Update Serialization to 1.9.5 2025-09-21 12:54:25 -04:00
Matt Nadareski
df52d08406 Update readme, remove unused cases 2025-09-21 10:33:32 -04:00
Matt Nadareski
66d48ed1cd Inlclude Serialization directly in ProtectionScan 2025-09-21 10:05:07 -04:00
Matt Nadareski
79680135b7 Update Serialization to 1.9.4 2025-09-21 09:46:47 -04:00
Matt Nadareski
84b9b46744 Set these properties because MPQ is funny like that 2025-09-21 09:39:55 -04:00
Matt Nadareski
33e83b9f52 Try this 2025-09-20 23:24:37 -04:00
Matt Nadareski
57759a3bef Update packages 2025-09-20 22:47:30 -04:00
Matt Nadareski
9caa91736c Add notes to relevant places about entry point 2025-09-20 20:29:57 -04:00
HeroponRikiBestest
3ffbeddcbe Add versioning to FrontLine ProActive (#385)
* Fix version

* sf
2025-09-20 20:00:55 -04:00
Matt Nadareski
6a5afd8d2c Another round of cleanup and normalization 2025-09-20 19:18:08 -04:00
Matt Nadareski
0afd189fe0 Align ContainsSection checks 2025-09-20 18:55:05 -04:00
Matt Nadareski
cc87d44e3f Make packer and protection code more consistent 2025-09-20 18:41:58 -04:00
Matt Nadareski
981a5bb7b5 Introduce OptionalEndsWith 2025-09-20 18:03:09 -04:00
Matt Nadareski
4afea551ba Make packers code more consistent 2025-09-20 17:59:20 -04:00
Matt Nadareski
5f9f21ae14 Replace things that are marked for replacement 2025-09-20 17:48:51 -04:00
Matt Nadareski
4c4c72fd98 Only check one section at a time in RenderWare 2025-09-20 17:42:01 -04:00
Matt Nadareski
821a853975 Use IO extensions where appropriate 2025-09-20 17:40:03 -04:00
Matt Nadareski
34a3050e27 None of this needs to account for nulls 2025-09-20 17:37:59 -04:00
Matt Nadareski
5c1a1364a1 Minor addition of usings 2025-09-20 17:35:31 -04:00
HeroponRikiBestest
d1f1c1f728 Process some extra securom DLLs, PA versioning (#384)
* Process a few extra securom things

* Forgot to remove copy paste

* move out of helper
2025-09-20 17:31:29 -04:00
Matt Nadareski
d969dd691b Remove some unnecessary null handling, use arrays 2025-09-20 17:24:25 -04:00
Matt Nadareski
13e4d86135 Remove one now-invalid NoWarn 2025-09-20 17:18:48 -04:00
Matt Nadareski
d37b400566 These are no longer needed 2025-09-20 17:17:27 -04:00
Matt Nadareski
da4188a49b One more early return 2025-09-20 16:56:41 -04:00
Matt Nadareski
a85998ebf6 Filter out invalid types first 2025-09-20 16:55:54 -04:00
Matt Nadareski
bd934c0af3 Formatting change to match current standards 2025-09-20 16:51:03 -04:00
Matt Nadareski
14dae3dd73 Rearrange code to be safer and more efficient 2025-09-20 16:50:41 -04:00
Matt Nadareski
80cd7dffdb Put these in a region 2025-09-20 16:45:06 -04:00
Matt Nadareski
a0bbd0be32 Tests should care about how many there are 2025-09-20 16:44:09 -04:00
Matt Nadareski
3bd9eadfe2 Add note that most extensions are going away 2025-09-20 16:28:11 -04:00
Matt Nadareski
c537f9dac9 Non-depth constructor unneeded now 2025-09-20 16:24:21 -04:00
Matt Nadareski
64b65b0f59 Initial checkpoint should use depth too 2025-09-20 16:23:59 -04:00
Matt Nadareski
36c858fac1 A couple more debug places to avoid confusion 2025-09-20 16:23:04 -04:00
Matt Nadareski
30361a9af7 This should never have to clear anything 2025-09-20 16:21:12 -04:00
Matt Nadareski
d6708a0cbe Scan even partial extractions, simplify branches 2025-09-20 16:20:17 -04:00
Matt Nadareski
9639f40e55 No reason for these to use inline null checks 2025-09-20 16:15:54 -04:00
Matt Nadareski
7fa41ba945 Revert extra check, forgot about un-wrappered types 2025-09-20 16:13:45 -04:00
Matt Nadareski
e1a659af5f Simplify double assignment 2025-09-20 16:12:21 -04:00
Matt Nadareski
bca5ec48d5 Exit early on invalid wrappers 2025-09-20 16:03:36 -04:00
Matt Nadareski
303fa314e6 Formatting faux pas 2025-09-20 16:01:58 -04:00
Matt Nadareski
cbcc11547c This should have a debug statement too 2025-09-20 16:01:44 -04:00
Matt Nadareski
10286e8380 Use extension for slightly easier reading 2025-09-20 16:00:54 -04:00
Matt Nadareski
a4ddc014ee Better debug logging 2025-09-20 16:00:03 -04:00
Matt Nadareski
61d186cae3 Slight tweak to logic direction and formatting 2025-09-20 15:58:52 -04:00
Matt Nadareski
799489d079 Reduce unnecessary code separation 2025-09-20 15:29:13 -04:00
Matt Nadareski
9eb74a411c SecuROM cleanup 2025-09-20 14:27:28 -04:00
HeroponRikiBestest
f263781250 Add Matroschka processing (#381)
* Make matroschka changes

* Catch some nullable values

* Use var more

* Trim path until models update

* Improve hashing string implementation.

* Change file reading

* change to keep up with serialization

* First round of fixes.

* Reverted to TryGetValue

* Small formatting fixes

* change to packageType

* Fixed glaring oversight on my part

* ungate full output

* *grumble grumble*
2025-09-20 14:22:00 -04:00
Matt Nadareski
6e7ef785ff Fix tests 2025-09-20 11:05:56 -04:00
Matt Nadareski
aef4495168 Update Serialization to 1.9.2 2025-09-20 11:00:09 -04:00
Matt Nadareski
2c0885383e Bound overlay checking in GetV4Version 2025-09-19 11:35:36 -04:00
Matt Nadareski
04355d851a Add SafeDisc 1.35.000 remnants hashes 2025-09-18 13:11:05 -04:00
Matt Nadareski
2cc72e2059 Add a couple ActiveMark notes 2025-09-08 20:10:29 -04:00
Matt Nadareski
6f61ee19b1 Add embedded gzip detection 2025-09-08 20:10:20 -04:00
Matt Nadareski
7784e0cfef Add Zylom Wrapper detection 2025-09-08 19:38:53 -04:00
Matt Nadareski
a55e490e73 Add Reflexive Arcade path checks 2025-09-08 18:46:26 -04:00
Matt Nadareski
d316edf8d0 Be smarter about SecuROM v4 2025-09-08 18:38:12 -04:00
Matt Nadareski
9af871c0ff Search for AddD header in SecuROM 2025-09-08 18:35:21 -04:00
Matt Nadareski
6cb86512c3 Organize StarForce, get rid of all Model calls 2025-09-08 17:58:48 -04:00
Matt Nadareski
d6a3a37d49 Add investigation notes about weird SF version 2025-09-08 17:51:43 -04:00
Matt Nadareski
281e7b419a Fix SF comment 2025-09-08 17:45:20 -04:00
Matt Nadareski
fd6de0d10c Add yuPlay Launcher detection 2025-09-08 17:11:06 -04:00
Matt Nadareski
760434309b Add StarForce Crypto detection (fixes #338) 2025-09-08 17:05:16 -04:00
HeroponRikiBestest
11034a7a7c Move PA Module detection into its own helper method. (#379)
* Move PA Module detection into its own helper method.

* Fix review changes.
2025-09-08 14:57:41 -04:00
HeroponRikiBestest
a76a8d0839 Add check for modified securom product activation. (#372)
* Added check for modified securom product activation. Marked as draft because it relies on a recent infotool fix in order to function properly.

* Fix variable name change post-rebase.

* Use wrapper exporttable, remove unneeded dependancies.
2025-09-08 12:07:43 -04:00
Matt Nadareski
de35586f30 Fix this because I didn't 2025-09-08 11:51:01 -04:00
Matt Nadareski
d29dec3904 Return all detected embedded types 2025-09-08 09:25:45 -04:00
Matt Nadareski
d8b0588d6e Add embedded UHA support 2025-09-08 09:14:22 -04:00
Matt Nadareski
5c7ea889be Add Reflexive Arcade Installer detection (fixes #102) 2025-09-08 08:44:18 -04:00
Matt Nadareski
846000cb3f Include BZip2 and XZ in embedded file checks 2025-09-08 08:30:18 -04:00
Matt Nadareski
d1398791f5 Add Ghost Installer detection (fixes #103) 2025-09-08 08:27:40 -04:00
Matt Nadareski
999c5c473e Fix a couple of formatting inconsistencies 2025-09-08 07:55:13 -04:00
Matt Nadareski
6e334c8770 Add Smart Install Maker detection (fixes #101) 2025-09-08 07:27:26 -04:00
Matt Nadareski
42dd33c8bd Add Create Install 2003 detection, add resource checks (fixes #96) 2025-09-07 21:17:37 -04:00
Matt Nadareski
4420021cbe Add Gentee note 2025-09-07 21:08:17 -04:00
Matt Nadareski
d8049792f1 Add Spoon Installer detection (fixes #98) 2025-09-07 21:07:00 -04:00
Matt Nadareski
86c4639d52 Minor cleanup 2025-09-07 13:04:30 -04:00
Matt Nadareski
abfcc52fd2 Tweak a couple more Uniloc 2025-09-07 12:44:04 -04:00
Matt Nadareski
06f84db092 Add a couple more Uniloc filenames 2025-09-07 12:39:06 -04:00
Matt Nadareski
ef03ca3a03 Undo launch change 2025-09-07 12:36:49 -04:00
Matt Nadareski
28783c83cf Add Hudson huPPPX detection 2025-09-07 12:36:37 -04:00
Matt Nadareski
e497540bdc Add Ubisoft Orbit detection (fixes #316) 2025-09-07 11:41:57 -04:00
Matt Nadareski
7b8c006f4d Add MPRESS detection (fixes #206) 2025-09-07 11:37:09 -04:00
Matt Nadareski
4b697c7d20 Fix inconsistency in interface implementations 2025-09-07 11:15:26 -04:00
Matt Nadareski
bef5749b5e Add PKLITE32 detection (fixes #100) 2025-09-07 11:09:43 -04:00
Matt Nadareski
0d371d0f3c Add GP-Install detection (fixes #99) 2025-09-07 11:04:28 -04:00
Matt Nadareski
fa67d370c0 Add GkWare SFX detection (fixes #97) 2025-09-07 11:00:55 -04:00
Matt Nadareski
a89124883c Add Uniloc SoftAnchor detection (fixes #85) 2025-09-07 10:34:33 -04:00
Matt Nadareski
2690536fda Remove now-unused .gitmodules 2025-09-06 20:15:43 -04:00
Matt Nadareski
8e8c43e304 I like this better 2025-09-06 17:13:59 -04:00
Matt Nadareski
edc32af47c Slight tweak to wording 2025-09-06 17:11:54 -04:00
Matt Nadareski
57685f0682 Protected readonly makes way more sense 2025-09-06 15:49:45 -04:00
Matt Nadareski
dd7f120ddc Add .NET Standard 2.x to builds 2025-09-06 15:38:36 -04:00
Matt Nadareski
16ca7e7920 None of this needs to be public 2025-09-06 15:20:59 -04:00
Matt Nadareski
397294ac63 Remove now-unused compatibility item 2025-09-06 15:18:27 -04:00
Matt Nadareski
1afbd2d484 Options object no longer makes sense 2025-09-06 15:17:33 -04:00
Matt Nadareski
7d39a6165e Take advantage of Impl and make depth incremental 2025-09-06 15:12:51 -04:00
Matt Nadareski
785f5cfde1 Don't expose ProtectionDictionary anymore 2025-09-06 12:55:09 -04:00
Matt Nadareski
f5b1868eec Move some things around 2025-09-06 12:40:06 -04:00
Matt Nadareski
8fedbb8f77 Remove extractable interfaces to avoid conflicts 2025-09-06 12:32:21 -04:00
Matt Nadareski
9af64f23a5 Make AACS a bit easier to follow 2025-09-06 12:20:39 -04:00
Matt Nadareski
3558ceb890 Missed one NE 2025-09-06 11:59:10 -04:00
Matt Nadareski
bd1166cbab Undo the wrapped NE issues 2025-09-06 11:58:04 -04:00
Matt Nadareski
6361398b1b Use extractable wrappers where appropriate 2025-09-06 11:56:46 -04:00
Matt Nadareski
e87a0ff8ec Wrapper-based extractables are now thinner 2025-09-06 11:48:32 -04:00
Matt Nadareski
00db772594 Simplify using new base class 2025-09-06 11:35:37 -04:00
Matt Nadareski
8043201be7 Introduce typed IExtractable 2025-09-06 11:05:47 -04:00
Matt Nadareski
3a5e7004a3 Don't reopen the stream unnecessarily 2025-09-06 10:58:46 -04:00
Matt Nadareski
168231cc94 Don't reinvent the wheel 2025-09-06 10:56:36 -04:00
Matt Nadareski
a11c7dc9d5 Fix tests for file types with default values 2025-09-06 10:51:00 -04:00
Matt Nadareski
038910b744 Remove now-incorrect things from the factory 2025-09-06 10:48:11 -04:00
Matt Nadareski
4d85ba2d31 Only some executables are extractable 2025-09-06 10:46:57 -04:00
Matt Nadareski
46feb3e568 Create wrapper-centric methods 2025-09-06 10:40:26 -04:00
Matt Nadareski
821b91a555 Start making Detectable a bit better 2025-09-06 10:01:09 -04:00
Matt Nadareski
43b3c72a02 Start rearranging things 2025-09-06 09:53:34 -04:00
Matt Nadareski
e9c1e9b7e7 Make these private static 2025-09-06 09:03:35 -04:00
Matt Nadareski
6ea98f5dc4 Consolidate detectable Executable checks 2025-09-06 09:03:05 -04:00
Matt Nadareski
5ef9c4cd8a Remove temporary code 2025-09-06 08:58:35 -04:00
Matt Nadareski
2597575500 Update Nuget packages 2025-09-06 08:49:21 -04:00
Matt Nadareski
523e670cc5 ONE MORE TIME 2025-09-03 11:24:21 -04:00
Matt Nadareski
ed6d3c1f3e NewExecutable is just a magnet for issues 2025-09-03 11:12:36 -04:00
Matt Nadareski
0efc6aef10 This can fail? 2025-09-03 10:51:29 -04:00
Matt Nadareski
b1600ad7d2 Make ReadArbitraryRange safer to handle 2025-09-03 10:41:53 -04:00
Matt Nadareski
6904674785 Temporarily migrate more code 2025-09-03 09:33:44 -04:00
Matt Nadareski
6da9e9c931 Use direct assignment 2025-09-03 09:04:21 -04:00
Matt Nadareski
b4a94cf247 Limit strings to 16KiB 2025-09-03 08:58:48 -04:00
Matt Nadareski
f81e46670a Remove UTF-8 strings from check 2025-09-03 08:42:22 -04:00
Matt Nadareski
cc7040c3cb That were dumb 2025-09-03 08:35:41 -04:00
Matt Nadareski
c70f0d72d2 Downstream potential fixes for testing 2025-09-03 08:35:19 -04:00
Matt Nadareski
d2ed0a822a Clean up configuration files 2025-09-03 08:35:04 -04:00
Matt Nadareski
e21a6e78d7 Smarter executable scanning, maybe 2025-09-02 22:18:42 -04:00
Matt Nadareski
138842318a Let's try to be fancy 2025-09-02 22:04:02 -04:00
Matt Nadareski
e883f0c7d4 Different visual indicator of extracted file scans 2025-09-02 21:52:06 -04:00
Matt Nadareski
03f96238a5 Clean up a couple things that might cause issues? 2025-09-02 21:38:51 -04:00
Matt Nadareski
60cd67e22e Fix executable test 2025-09-02 20:31:30 -04:00
Matt Nadareski
c0e82fa021 Handle extractable executables properly 2025-09-02 20:28:38 -04:00
Matt Nadareski
cc826fdc60 Fix all broken tests from previous update 2025-09-02 20:21:53 -04:00
Matt Nadareski
77ad6e791a The update 2025-09-02 20:18:01 -04:00
Matt Nadareski
55e368e23a Remove ExtractionTool and all references 2025-08-29 14:05:07 -04:00
Matt Nadareski
a82d1e729c Remove vestigial content files 2025-08-28 14:50:23 -04:00
Matt Nadareski
5958dac739 Remove commented code 2025-08-26 06:56:11 -04:00
Matt Nadareski
29bd888052 Order of operations 2025-08-26 06:53:08 -04:00
Matt Nadareski
1b2c62da9a Use file part count, not partial files 2025-08-26 06:41:07 -04:00
Matt Nadareski
c95890aae5 Handle archive parts 2025-08-25 22:20:19 -04:00
Matt Nadareski
58022ec328 Fix MPQ on x64, notes 2025-08-25 21:26:33 -04:00
Matt Nadareski
692da62dee Remove libmspack4n submodule 2025-08-25 20:39:18 -04:00
Matt Nadareski
91aea728ac Weird note, checks out 2025-08-25 13:54:47 -04:00
Matt Nadareski
c408f349fe Add notes about migrated code 2025-08-25 13:50:15 -04:00
Matt Nadareski
de85426f04 Remove restriction from RAR 2025-08-25 13:25:11 -04:00
Matt Nadareski
43649851ca Downstream changes from Serialization for now 2025-08-25 13:24:22 -04:00
Matt Nadareski
9b49f7c597 Add note about upcoming changes 2025-08-23 11:35:27 -04:00
Matt Nadareski
0f186634f2 See which extractors need BOS file types 2025-08-23 11:32:55 -04:00
Matt Nadareski
e24172245e Wise can be NE too 2025-08-23 10:56:50 -04:00
Matt Nadareski
5e40c7a37e Func-y 2025-07-31 14:28:12 -04:00
Matt Nadareski
0bf1be23c4 Remove MinAsyncBridge requirement 2025-07-31 14:21:34 -04:00
Matt Nadareski
06e51247e1 Remove Net35.Actions requirement 2025-07-31 14:15:40 -04:00
Matt Nadareski
251bf9ca6d Order is important 2025-07-31 12:48:48 -04:00
Matt Nadareski
fe5f114290 General cleanup 2025-07-31 12:45:07 -04:00
Matt Nadareski
8f2d20dcfa Fix reference to PE TradeName 2025-07-31 09:26:12 -04:00
Matt Nadareski
8e516f3b6b Sync include debug flag for CFB extraction 2025-07-31 09:19:40 -04:00
Matt Nadareski
ad449c2e33 Exception debugging should use Error stream 2025-07-31 09:14:21 -04:00
Matt Nadareski
ddbd396b6b Use correct mask for v3 CFB files 2025-07-30 16:56:21 -04:00
Matt Nadareski
b2b9083221 Fix DIFAT assumptions for directory entries 2025-07-30 16:28:43 -04:00
Matt Nadareski
d71cb413fd Fix parsing of large DIFAT tables in CFB 2025-07-30 15:46:22 -04:00
Matt Nadareski
8e745db34e Fix MS-CAB block continuation 2025-07-30 15:18:27 -04:00
Matt Nadareski
93a6ab5b19 Fix spanned blocks, previously skipped 2025-07-30 14:54:38 -04:00
Matt Nadareski
edd990bc89 Wrap MS-ZIP compression in case of failure 2025-07-30 14:21:20 -04:00
Matt Nadareski
fb1310a5a9 Move more things in removal region for CFB 2025-07-30 11:38:36 -04:00
Matt Nadareski
a818a8af0a Fix deserialization issue for CFB 2025-07-30 11:36:10 -04:00
Matt Nadareski
589214ea38 Fix most CFB extraction issues, remove OpenMcdf 2025-07-30 11:30:33 -04:00
Matt Nadareski
892fd945bb Reencode string properly 2025-07-30 08:20:00 -04:00
Matt Nadareski
7a72961ee5 Add removal notes for CFB helpers 2025-07-30 08:11:00 -04:00
Matt Nadareski
b745038829 Update some nuget packages (non-ST) 2025-07-29 21:59:51 -04:00
Matt Nadareski
58b5b5228a Normalize extraction methods 2025-07-29 21:31:35 -04:00
Matt Nadareski
0725f4ba0f Use Serialization implementation of BFPK extraction 2025-07-29 20:35:06 -04:00
Matt Nadareski
6e0063cd1f More graceful handling of MS-CAB sets 2025-07-29 11:48:28 -04:00
Matt Nadareski
78373dd620 Split out MS-ZIP handling for cleaner code 2025-07-29 11:38:30 -04:00
Matt Nadareski
fa74963a75 Only derive the compression type once per folder 2025-07-29 11:26:28 -04:00
Matt Nadareski
7331f8f576 Remove redundant check 2025-07-29 08:30:40 -04:00
Matt Nadareski
6f4e7138fb Split out MS-CAB ExtractFile logic 2025-07-29 08:28:37 -04:00
Matt Nadareski
28b2eaa029 Fix assumption about MS-CAB sets 2025-07-29 08:03:33 -04:00
Matt Nadareski
0585f0a3cb Temproarily port MS-CAB extract code back from Serialization 2025-07-28 21:41:35 -04:00
Matt Nadareski
12e8349ab1 Pad short MS-ZIP blocks 2025-07-28 16:28:13 -04:00
Matt Nadareski
3c05bece9e Better message 2025-07-28 16:14:29 -04:00
Matt Nadareski
dc1944b768 Add tracking for MS-ZIP issues 2025-07-28 16:11:08 -04:00
Matt Nadareski
fd489c5b46 Fix incorrect spacing 2025-07-28 15:24:06 -04:00
Matt Nadareski
7ce4c252e2 Add notes about ported methods 2025-07-28 15:22:47 -04:00
Matt Nadareski
d54c88a01d Don't use MemoryStream.ToArray 2025-07-28 15:16:57 -04:00
Matt Nadareski
6a4d5bddeb Ensure memory streams are scoped in MS-CAB 2025-07-28 15:13:38 -04:00
Matt Nadareski
aca01e2058 Fix(?) Windows-only path for MS-CAB 2025-07-28 14:31:48 -04:00
Matt Nadareski
e93bab29fa Fix output path issues for MS-CAB 2025-07-28 14:26:13 -04:00
Matt Nadareski
ca87c48cd7 Fix issue with determining compression type in MS-CAB 2025-07-28 14:26:03 -04:00
Matt Nadareski
0d215d0817 Enhance GetDataBlocks 2025-07-28 14:04:32 -04:00
Matt Nadareski
d86dbf47b5 Add MS-CAB GetDataBlocks helper 2025-07-28 13:55:07 -04:00
Matt Nadareski
7cb318ce6d Fix build warning 2025-07-28 13:33:47 -04:00
Matt Nadareski
18b89543ef Add MS-CAB OpenNext and OpenPrevious helpers 2025-07-28 13:25:33 -04:00
Matt Nadareski
be50d1343e Add MS-CAB DecompressBlocks helper 2025-07-28 13:18:10 -04:00
Matt Nadareski
32c9ea7838 Add MS-CAB GetFiles helper 2025-07-28 13:14:33 -04:00
Matt Nadareski
cf7a68602b Add MS-CAB GetFolderIndex helper 2025-07-28 13:09:08 -04:00
Matt Nadareski
f2fe2623c6 Add note for MS-CAB 2025-07-28 12:33:11 -04:00
HeroponRikiBestest
249a17be1f Add branching and specific SharpCompress calls for solid vs non-solid archives in order to extract solid archives properly. (#375)
* Add branching for solid vs non-solid archives in order to extract solid archives properly.

* Change comments on sevenzip, reuse archive-level solid flag for rar

* Fully simplify identifying if archive is solid.

* Finish implementing first round of feedback.

* Fix second round of formatting issues.

* Final formatting fixes.
2025-07-11 23:13:00 -04:00
HeroponRikiBestest
dff15ef799 Fixes .hdr+.cab installshield cabinet files not being extracted by BOS when relative paths are provided. (#374)
* Fixes .hdr+.cab installshield cabinet files not being extracted when relative paths are provided.

* Fix for unit tests empty file string.

* Better fix for unit test failures, due to https://learn.microsoft.com/en-us/dotnet/api/system.io.path.getfullpath?view=net-9.0 listing several more exceptions than the other functions, most of which I would not imagine should be directly handled.

* Removed try-catch fullpath obtaining, added getting fullpath in scanner via filestream name instead.

* Undid previous changes again, re-added path assertion at request, added assert.throws exception for empty paths in the unit tests
2025-07-04 14:34:31 -04:00
Matt Nadareski
c0c94fd78d Get full path for each input for programs 2025-06-30 07:28:33 -04:00
HeroponRikiBestest
af43748766 Improve detection for cd/dvd-cops version string (#368)
* Improve detection for cd/dvd-cops version string

* I forgot to include the regex compensation for comma version number cases

* Pasted comment wrong previously

* Implemented Sabre's review fixes, also added check for Codefree
2025-05-13 10:59:39 -04:00
Matt Nadareski
d28d8b5a2b Update Nuget packages 2025-05-12 08:28:02 -04:00
Matt Nadareski
0edc380059 Fix brackets from last commit 2025-05-06 15:53:20 -04:00
HeroponRikiBestest
2311dd9cc8 Add EA Game Authorization Management checking to paul.dll (#366)
* Add EA Game Authorization Management checking to paul.dll

Checks if PA is using EA Game Authorization Management

* Fix if else
2025-05-06 15:51:40 -04:00
HeroponRikiBestest
f87ce49f7e make paul.dll internal name check non-case-sensitive (#365)
* make paul.dll internal name check non-case-sensitive

Sometimes the internal name is in all caps, like http://redump.org/disc/115608/ and http://redump.org/disc/47171/

* Added proper import for ignore case

Forgot it wasn't covered by system.text
2025-05-06 15:22:11 -04:00
HeroponRikiBestest
928e93a7da Fix my own Frontline Proactive sample comment spacing because it was bothering me so much I couldn't go to bed (#363) 2025-04-20 20:36:35 -04:00
HeroponRikiBestest
75517a5f83 Add PACE Anti-Piracy InterLok detection (#362)
* Add detection class and test class for PACE Anti-Piracy Interlok

* Remove unnecessary empty lines after end of class.

* Added missing null check for pex section strings.

* Add newline above getversion

* GetFirstSectionStrings assigned to variable.

* Change getversion in InterLok to use regex.

* Final? getversion regex cleanup
2025-04-19 23:08:49 -04:00
HeroponRikiBestest
cfe9825af7 Add detection for FrontLine ProActive (#361)
* Add detection for FrontLine ProActive

* Wrap samples onto newlines

Wrap samples onto newlines
2025-04-19 22:35:22 -04:00
HeroponRikiBestest
1ff1281c8f Add rcpacker detection (#360)
Some late securom Release Control games call what'd usually be the matrosch section "rcpacker", as in Release Control packer. Not detected at the moment because of this, and given the name, should only refer to Securom Release Control. Games affected by this include all currently dumped in redump versions of FIFA 13 and Mass Effect 3 with Release Control.
2025-03-28 19:50:10 -04:00
TheRogueArchivist
c9194f18ef Begin SafeDisc 4 documentation (#354)
* Begin SafeDisc 4 documentation

Starting off with just 4.00.000 since this needed a bit more groundwork to establish with the AuthServ checks.

* Add SafeDisc 4.00.001

* Add SafeDisc 4.00.002+4.00.003

* Add SafeDisc 4.50.000 notes

* Document SafeDisc 4.60.000-4.80.000

Also add new comment about the unknown version of SecDrv.

* Document SafeDisc 4.81.000

Found a new clcd16 file, which hasn't happened in a long time

* Document SafeDisc 4.85.000 and 4.90.000

Improve some comments and detections for other versions as well.

* Document the remaining SafeDisc 4 versions

Still needs some mild cleanup

* Add SafeDisc 4.91.000 clcd32 hash

* Add SD4/Lite notes
2025-03-25 10:05:04 -04:00
Matt Nadareski
60a3a74862 Fix how conditions are used for references 2025-02-25 21:21:32 -05:00
Matt Nadareski
7a96e8cfe3 Don't crash if writing fails 2025-01-29 11:06:13 -05:00
HeroponRikiBestest
9fee74f2a6 Move Crunch to its own Packer, improve SmartE detection. (#353)
* Move Crunch to its own Packer, improve SmartE detection.

* Fix formatting by removing brackets

Co-authored-by: Matt Nadareski <mnadareski@outlook.com>

* Remove named section checks, minor formatting fixes

* Add newline before summary.

* Remove empty returns.

* Remove unnecessary newline

* Change Crunch to use IExtractableExecutable

* Remove unnecessary whitespace.

* Add tests for Crunch.

---------

Co-authored-by: Matt Nadareski <mnadareski@outlook.com>
2025-01-13 23:17:57 -05:00
HeroponRikiBestest
63a5a25a17 Add missed "Check disc for physical ring" in copy-X return (#352)
Caught by noigeaR, crucial to communicate since some tivola discs have dummy files but no ring (and thus no copy-X), either as remnants, or seemingly as future preparation for copy-X
2025-01-13 10:33:28 -05:00
Matt Nadareski
610078b47c Bump version 2024-12-31 13:25:24 -05:00
Matt Nadareski
ff450a9bcf Update Serialization to 1.8.6 2024-12-30 22:56:12 -05:00
TheRogueArchivist
6661c48428 Don't check files with ".srdata" section for Denuvo (#351)
Prone to too many false positives.
2024-12-30 22:16:55 -05:00
Matt Nadareski
f2a07fc088 Update copyright 2024-12-30 21:41:27 -05:00
Matt Nadareski
e34ea5faca Remove unnecessary action step 2024-12-30 21:40:52 -05:00
Matt Nadareski
11ed09caf2 Update Serialization to 1.8.5 2024-12-30 21:00:53 -05:00
HeroponRikiBestest
f5615d7713 Removed secondary ASPack 1.08.04 check due to false positives. (#350) 2024-12-30 20:32:35 -05:00
Matt Nadareski
2df4144f23 Add new SolidShield activation manager description (fixes #348) 2024-12-29 15:17:35 -05:00
HeroponRikiBestest
5f5dc7d0de Improve Hexalock detection slightly (#347)
* Improve Hexalock detection via checking different known sections for mfint.dll

* Add sabre's suggestion

Improve code with sabre's code suggestion

Co-authored-by: Matt Nadareski <mnadareski@outlook.com>

* Add extra check for instances in UPX executables.

* Add newlines between if blocks.

---------

Co-authored-by: Matt Nadareski <mnadareski@outlook.com>
2024-12-29 14:40:24 -05:00
TheRogueArchivist
d505707dee Add sources for SafeDisc 3 (#346)
Add sources for SafeDisc 3, and add the corresponding clcd32.dll hashes
2024-12-27 07:51:00 -05:00
Matt Nadareski
5e7342477a Ensure .NET versions are installed for testing 2024-12-19 10:54:47 -05:00
Matt Nadareski
35b1bb817e Add flag for SafeGetFiles 2024-12-19 00:02:53 -05:00
Matt Nadareski
73d7c5790e Bump version 2024-12-18 21:50:21 -05:00
Matt Nadareski
d81be84f58 Remove unnecessary complexity in publish scripts 2024-12-18 10:21:06 -05:00
Matt Nadareski
d6920bc1e2 Fix Wise detection slightly 2024-12-18 10:14:14 -05:00
Matt Nadareski
68d4eeef27 Update packages 2024-12-18 10:02:42 -05:00
Matt Nadareski
92c29610df Fix publishing executables 2024-12-18 09:56:57 -05:00
Matt Nadareski
24eddda72c Allow symbols to be packed 2024-12-18 09:54:01 -05:00
TheRogueArchivist
3257b59b27 Add SafeDisc 2.90.045 detections (#345) 2024-12-17 17:29:59 -05:00
Matt Nadareski
10c95f86b1 Add alternate signatures for PKZIP embedded 2024-12-17 00:57:57 -05:00
Matt Nadareski
269e01b7bf Move to native subfolder 2024-12-14 23:04:25 -05:00
Matt Nadareski
84f8a3e780 Update publish scripts for later 2024-12-14 22:49:26 -05:00
Matt Nadareski
fe74f1de82 Bump version 2024-12-14 22:41:24 -05:00
TheRogueArchivist
7b604a8bda Begin documentation of SafeDisc 2 sources (#342)
* Begin documentation of SafeDisc 2 sources

Also add new clcd32 checks for SafeDisc2.

* Update comments through 2.40.011

(Almost) halfway there

* Update documentation through version 2.60.052

* Finish documenting SafeDisc 2 sources

This also removes any detections for "2.90.010" as this doesn't appear to be a legitimate version, and seems to have originated from a typo.
2024-12-14 22:37:51 -05:00
Matt Nadareski
cde1a8931a Fix build script again, add MPQ to win-x64 2024-12-14 18:30:57 -05:00
Matt Nadareski
33c9da7cfe Attempt to fix packing of native DLLs 2024-12-14 17:45:17 -05:00
Matt Nadareski
944b0ce91b Redefine WIN constant to WINX86 2024-12-14 17:33:46 -05:00
Matt Nadareski
6f388102ee Fix MS-ZIP decompression in MS-CAB 2024-12-13 15:13:08 -05:00
Matt Nadareski
677f66f98d Fix MS-CAB writing 2024-12-13 14:58:25 -05:00
Matt Nadareski
8ff205843d Enable partial decompression of MS-ZIP on all platforms 2024-12-13 14:55:20 -05:00
Matt Nadareski
a781fffb39 Enable full BFPK extraction on all platforms 2024-12-13 14:19:12 -05:00
Matt Nadareski
f3267f7fcf Add CopyTo extenion for old .NET 2024-12-13 14:10:00 -05:00
Matt Nadareski
103ffc70bd Enable bz2 and gzip on all platforms 2024-12-13 14:07:08 -05:00
Matt Nadareski
f9b4e262f2 Update packages 2024-12-13 11:56:31 -05:00
Matt Nadareski
69f8d8cfdd Update Serialization to 1.8.2 2024-12-10 15:54:28 -05:00
Matt Nadareski
be69c52cfe Reduce unnecessary complexity 2024-12-10 13:11:31 -05:00
Matt Nadareski
6fdbdd9f09 Match versioned GFWL installers (fixes #343) 2024-12-08 21:59:13 -05:00
Matt Nadareski
e638b7b38a Remove PEiD ActiveMark checks 2024-12-08 21:54:22 -05:00
Matt Nadareski
750a43290c Use publish script and update README 2024-12-06 11:52:33 -05:00
Matt Nadareski
cdc9171615 Bump version 2024-12-03 13:07:59 -05:00
Matt Nadareski
21451c5294 Update WiseUnpacker to 1.5.4 2024-12-03 11:58:04 -05:00
Matt Nadareski
dea35ca158 Update WiseUnpacker to 1.5.3 2024-12-03 06:53:32 -05:00
Matt Nadareski
7d96e7b333 Enable more embedded archive types 2024-12-03 06:26:39 -05:00
Matt Nadareski
4f493626cb Use default extraction for Wise finally 2024-12-03 06:14:30 -05:00
Matt Nadareski
03a2dff668 Try reading files if streams fail 2024-12-03 06:00:03 -05:00
Matt Nadareski
0d213274b5 Update WiseUnpacker to 1.5.2 2024-12-03 05:06:52 -05:00
TheRogueArchivist
80d3b8d8bb Add sources for SafeDisc detections up through V1 (#341)
Also fix a false positive in ASPack due to an overly generic check, and fix a comment.
2024-12-03 04:25:50 -05:00
Matt Nadareski
e788ad9287 Ensure keys in a better way 2024-12-03 03:54:55 -05:00
Matt Nadareski
c70b5f6ec8 Increase extraction safety 2024-12-03 03:43:39 -05:00
Matt Nadareski
6b7ad781b7 Update UnshieldSharp to 1.9.2 2024-12-03 03:34:07 -05:00
Matt Nadareski
9d60a4d1ec Fix output directory issues 2024-12-03 03:24:24 -05:00
Matt Nadareski
ec091ada95 Ensure all protections are split properly 2024-12-03 03:09:52 -05:00
TheRogueArchivist
c2547295bf Check .data/DATA sections for ASPack as well (#340)
Also add some comments regarding ASProtect.
2024-12-03 02:40:28 -05:00
Matt Nadareski
58707feb72 Debug data debugged data 2024-12-03 02:09:19 -05:00
Matt Nadareski
7efe622990 Update Serialization to 1.8.1 2024-12-03 01:15:30 -05:00
Matt Nadareski
fee4e482cf Bump version 2024-12-03 00:32:49 -05:00
Matt Nadareski
33b498cd39 Remove AppVeyor 2024-12-02 16:34:11 -05:00
Matt Nadareski
8570237fb3 Disallow empty values in custom dictionaries 2024-12-02 16:31:19 -05:00
Matt Nadareski
8b10a7c3ea Fix outputting multi-detected files 2024-12-02 15:12:19 -05:00
Matt Nadareski
0a3f83b15e Hook up disconnected FLEXnet checks 2024-12-02 15:05:58 -05:00
Matt Nadareski
f7a25c7d2d Reduce content check boilerplate 2024-12-02 14:51:48 -05:00
Matt Nadareski
f092a4d2ea CanSeek can throw exceptions 2024-12-02 14:43:40 -05:00
Matt Nadareski
027864aaa6 Add automatic test running 2024-12-02 12:04:46 -05:00
Matt Nadareski
8bcf81fbbd Add detect dictionary test for executable 2024-12-02 12:00:55 -05:00
Matt Nadareski
8c0a8f6856 Fix TAR test name 2024-12-02 11:56:28 -05:00
Matt Nadareski
254d2877b5 Add scanner helper method tests 2024-12-02 11:50:34 -05:00
Matt Nadareski
f71919f8f7 Add one more boundary test 2024-12-02 11:45:43 -05:00
Matt Nadareski
50bece6ac4 Add more paranoia in file size helper 2024-12-02 11:44:57 -05:00
Matt Nadareski
3141e1f020 Add file size helper extension 2024-12-02 11:43:04 -05:00
Matt Nadareski
0a131c502e Remove empty file 2024-12-02 11:36:06 -05:00
Matt Nadareski
6db0d27bf8 Fix access level for helper method 2024-12-02 11:35:34 -05:00
Matt Nadareski
366e6ae171 Wrappers should never throw 2024-12-02 11:34:08 -05:00
Matt Nadareski
1ed0fe7dd3 Fill out more extraction boundary tests 2024-12-02 11:21:14 -05:00
Matt Nadareski
dbd2175446 Add file type tests 2024-12-02 11:07:01 -05:00
Matt Nadareski
1a997679a9 Add protection tests 2024-12-02 10:38:36 -05:00
Matt Nadareski
477356bd77 Add content and NE tests for packers 2024-12-02 01:59:23 -05:00
Matt Nadareski
bf5899d9fd Add packer tests 2024-12-02 01:50:40 -05:00
Matt Nadareski
1565efd097 Add game engine tests 2024-12-02 01:28:24 -05:00
Matt Nadareski
1dd9022407 Add tests for static check class generators 2024-12-02 01:22:33 -05:00
Matt Nadareski
ff2b27c6d0 Reduce PE boilerplate 2024-12-02 00:58:52 -05:00
Matt Nadareski
a6b494841f Add and use new nullable string extensions 2024-12-02 00:35:04 -05:00
Matt Nadareski
0aff061781 Migrate to new Serialization code 2024-12-02 00:02:51 -05:00
Matt Nadareski
c73d558ca4 Add Factory tests 2024-12-01 23:50:19 -05:00
Matt Nadareski
f80de3a941 Fix namespace 2024-12-01 23:38:25 -05:00
Matt Nadareski
ca51733aa2 Add enumerable extensions tests 2024-12-01 23:37:27 -05:00
Matt Nadareski
bfb4499005 Framework only matters for executables 2024-12-01 23:25:44 -05:00
Matt Nadareski
2984d3f5e5 Add skeleton test project 2024-12-01 23:09:38 -05:00
Matt Nadareski
4eff18bf3a Update packages 2024-12-01 23:07:52 -05:00
Matt Nadareski
eeeac97553 Remove unnecessary double assignment 2024-11-27 22:39:19 -05:00
Matt Nadareski
62475f725a Version gate remaining Linq statements 2024-11-22 13:00:11 -05:00
Matt Nadareski
575c1a7bd7 Minor change to Array.Copy syntax 2024-11-21 13:49:55 -05:00
Matt Nadareski
eb03470625 Bump version 2024-11-21 11:20:19 -05:00
Matt Nadareski
b1aa2fc73a Enable MPQ on .NET Framework 4.0 2024-11-21 10:40:10 -05:00
Matt Nadareski
cd21c76c97 Add versions to executables 2024-11-21 10:35:15 -05:00
Matt Nadareski
9e205ddf2a More incidental cleanup 2024-11-21 01:32:30 -05:00
Matt Nadareski
07a183955b Reduce framework gating in SecuROM 2024-11-20 23:41:09 -05:00
Matt Nadareski
b49c6e96fd Add guards around previous commit 2024-11-20 21:48:37 -05:00
Matt Nadareski
148cfed141 Add executable extraction to tool 2024-11-20 21:45:15 -05:00
Matt Nadareski
cebbe6a1e8 Check overlay for embedded data as well 2024-11-20 21:33:56 -05:00
Matt Nadareski
558e23a9cd Clean up after last few commits 2024-11-20 21:18:12 -05:00
Matt Nadareski
d7c37f6e0a Lists lead to less Linq 2024-11-20 20:58:39 -05:00
Matt Nadareski
c05090db8c Update packages 2024-11-20 20:23:05 -05:00
Matt Nadareski
fa19304a6d Remove some framework gating 2024-11-20 20:10:18 -05:00
Matt Nadareski
ec4962a3c9 Use List where possible, Macrovision edition 2024-11-20 17:13:47 -05:00
Matt Nadareski
7122aa44a1 Use List where possible 2024-11-20 17:10:03 -05:00
Matt Nadareski
cf62be365c Use List where possible 2024-11-20 17:05:40 -05:00
Matt Nadareski
9cc2f99334 Quick package sync 2024-11-20 16:51:06 -05:00
Matt Nadareski
d9d9f23af9 Read entire file for content checks 2024-11-20 15:53:09 -05:00
Matt Nadareski
c29354f054 Add embedded archive scanning 2024-11-20 15:19:39 -05:00
Matt Nadareski
7738630952 Bump version 2024-11-16 00:00:00 -05:00
Matt Nadareski
c945ca4fe3 Make BOS compatible with RedumpLib 2024-11-15 23:59:23 -05:00
Matt Nadareski
6acf5ccc09 Bump version 2024-11-15 23:11:00 -05:00
Matt Nadareski
a5f9006ef1 One last Linq place (not all of them) 2024-11-15 23:09:58 -05:00
Matt Nadareski
ae7111e201 Update package versions 2024-11-15 23:06:47 -05:00
Matt Nadareski
5a94cd3b66 Framework only matters for executable 2024-11-15 23:00:37 -05:00
361 changed files with 11530 additions and 9290 deletions

167
.editorconfig Normal file
View File

@@ -0,0 +1,167 @@
# top-most EditorConfig file
root = true
# C# files
[*.cs]
# Indentation and spacing
charset = utf-8
indent_size = 4
indent_style = space
tab_width = 4
trim_trailing_whitespace = true
# New line preferences
end_of_line = lf
insert_final_newline = true
max_line_length = unset
# using directive preferences
csharp_using_directive_placement = outside_namespace
dotnet_diagnostic.IDE0005.severity = error
# Code-block preferences
csharp_style_namespace_declarations = block_scoped
csharp_style_prefer_method_group_conversion = true
csharp_style_prefer_top_level_statements = false
# Expression-level preferences
csharp_prefer_simple_default_expression = true
csharp_style_inlined_variable_declaration = true
csharp_style_unused_value_assignment_preference = discard_variable
csharp_style_unused_value_expression_statement_preference = discard_variable
dotnet_diagnostic.IDE0001.severity = warning
dotnet_diagnostic.IDE0002.severity = warning
dotnet_diagnostic.IDE0004.severity = warning
dotnet_diagnostic.IDE0010.severity = error
dotnet_diagnostic.IDE0051.severity = warning
dotnet_diagnostic.IDE0052.severity = warning
dotnet_diagnostic.IDE0072.severity = warning
dotnet_diagnostic.IDE0080.severity = warning
dotnet_diagnostic.IDE0100.severity = error
dotnet_diagnostic.IDE0110.severity = error
dotnet_diagnostic.IDE0120.severity = warning
dotnet_diagnostic.IDE0121.severity = warning
dotnet_diagnostic.IDE0240.severity = error
dotnet_diagnostic.IDE0241.severity = error
dotnet_style_coalesce_expression = true
dotnet_style_namespace_match_folder = false
dotnet_style_null_propagation = true
dotnet_style_prefer_auto_properties = true
dotnet_style_prefer_collection_expression = when_types_loosely_match
dotnet_style_prefer_is_null_check_over_reference_equality_method = true
dotnet_style_prefer_compound_assignment = true
csharp_style_prefer_simple_property_accessors = true
dotnet_style_prefer_simplified_interpolation = true
dotnet_style_prefer_simplified_boolean_expressions = true
csharp_style_prefer_unbound_generic_type_in_nameof = true
# Field preferences
dotnet_diagnostic.IDE0044.severity = warning
dotnet_style_readonly_field = true
# Language keyword vs. framework types preferences
dotnet_diagnostic.IDE0049.severity = error
dotnet_style_predefined_type_for_locals_parameters_members = true
dotnet_style_predefined_type_for_member_access = true
# Modifier preferences
csharp_prefer_static_local_function = true
csharp_style_prefer_readonly_struct = true
dotnet_diagnostic.IDE0036.severity = warning
dotnet_diagnostic.IDE0040.severity = error
dotnet_diagnostic.IDE0380.severity = error
dotnet_style_require_accessibility_modifiers = always
# New-line preferences
dotnet_diagnostic.IDE2000.severity = warning
dotnet_diagnostic.IDE2002.severity = warning
dotnet_diagnostic.IDE2003.severity = warning
dotnet_diagnostic.IDE2004.severity = warning
dotnet_diagnostic.IDE2005.severity = warning
dotnet_diagnostic.IDE2006.severity = warning
csharp_style_allow_blank_line_after_colon_in_constructor_initializer_experimental = false
csharp_style_allow_blank_line_after_token_in_arrow_expression_clause_experimental = false
csharp_style_allow_blank_line_after_token_in_conditional_expression_experimental = false
csharp_style_allow_blank_lines_between_consecutive_braces_experimental = false
dotnet_style_allow_multiple_blank_lines_experimental = false
dotnet_style_allow_statement_immediately_after_block_experimental = false
# Null-checking preferences
csharp_style_conditional_delegate_call = true
# Parameter preferences
dotnet_code_quality_unused_parameters = all
dotnet_diagnostic.IDE0280.severity = error
# Parentheses preferences
dotnet_diagnostic.IDE0047.severity = warning
dotnet_diagnostic.IDE0048.severity = warning
dotnet_style_parentheses_in_arithmetic_binary_operators = always_for_clarity
dotnet_style_parentheses_in_other_binary_operators = always_for_clarity
dotnet_style_parentheses_in_other_operators = always_for_clarity
dotnet_style_parentheses_in_relational_binary_operators = always_for_clarity
# Pattern-matching preferences
dotnet_diagnostic.IDE0019.severity = warning
dotnet_diagnostic.IDE0020.severity = warning
dotnet_diagnostic.IDE0038.severity = warning
dotnet_diagnostic.IDE0066.severity = none
dotnet_diagnostic.IDE0083.severity = warning
dotnet_diagnostic.IDE0260.severity = warning
csharp_style_pattern_matching_over_as_with_null_check = true
csharp_style_pattern_matching_over_is_with_cast_check = true
csharp_style_prefer_not_pattern = true
csharp_style_prefer_pattern_matching = true
# this. and Me. preferences
dotnet_style_qualification_for_event = false
dotnet_style_qualification_for_field = false
dotnet_style_qualification_for_method = false
dotnet_style_qualification_for_property = false
# var preferences
csharp_style_var_for_built_in_types = false
csharp_style_var_when_type_is_apparent = true
# .NET formatting options
dotnet_separate_import_directive_groups = false
dotnet_sort_system_directives_first = true
# C# formatting options
csharp_indent_block_contents = true
csharp_indent_braces = false
csharp_indent_case_contents = true
csharp_indent_case_contents_when_block = false
csharp_indent_labels = one_less_than_current
csharp_indent_switch_labels = true
csharp_new_line_before_catch = true
csharp_new_line_before_else = true
csharp_new_line_before_finally = true
csharp_new_line_before_members_in_anonymous_types = true
csharp_new_line_before_members_in_object_initializers = true
csharp_new_line_before_open_brace = all
csharp_new_line_between_query_expression_clauses = true
csharp_preserve_single_line_blocks = true
csharp_preserve_single_line_statements = true
csharp_space_after_cast = false
csharp_space_after_colon_in_inheritance_clause = true
csharp_space_after_comma = true
csharp_space_after_dot = false
csharp_space_after_keywords_in_control_flow_statements = true
csharp_space_after_semicolon_in_for_statement = true
csharp_space_around_binary_operators = before_and_after
csharp_space_around_declaration_statements = false
csharp_space_before_colon_in_inheritance_clause = true
csharp_space_before_comma = false
csharp_space_before_dot = false
csharp_space_before_open_square_brackets = false
csharp_space_before_semicolon_in_for_statement = false
csharp_space_between_empty_square_brackets = false
csharp_space_between_method_call_empty_parameter_list_parentheses = false
csharp_space_between_method_call_name_and_opening_parenthesis = false
csharp_space_between_method_call_parameter_list_parentheses = false
csharp_space_between_method_declaration_empty_parameter_list_parentheses = false
csharp_space_between_method_declaration_parameter_list_parentheses = false
csharp_space_between_parentheses = false
csharp_space_between_square_brackets = false

48
.github/workflows/build_and_test.yml vendored Normal file
View File

@@ -0,0 +1,48 @@
name: Build and Test
on:
push:
branches: ["master"]
jobs:
build:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v5
with:
fetch-depth: 0
- name: Setup .NET
uses: actions/setup-dotnet@v5
with:
dotnet-version: |
8.0.x
9.0.x
10.0.x
- name: Run tests
run: dotnet test
- name: Run publish script
run: ./publish-nix.sh -d
- name: Update rolling tag
run: |
git config user.name "github-actions[bot]"
git config user.email "github-actions[bot]@users.noreply.github.com"
git tag -f rolling
git push origin :refs/tags/rolling || true
git push origin rolling --force
- name: Upload to rolling
uses: ncipollo/release-action@v1.20.0
with:
allowUpdates: True
artifacts: "*.nupkg,*.snupkg,*.zip"
body: "Last built commit: ${{ github.sha }}"
name: "Rolling Release"
prerelease: True
replacesArtifacts: True
tag: "rolling"
updateOnlyUnreleased: True

View File

@@ -1,43 +0,0 @@
name: Nuget Pack
on:
push:
branches: [ "master" ]
jobs:
build:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
with:
submodules: recursive
- name: Setup .NET
uses: actions/setup-dotnet@v4
with:
dotnet-version: 9.0.x
- name: Restore dependencies
run: dotnet restore
- name: Pack
run: dotnet pack
- name: Upload build
uses: actions/upload-artifact@v4
with:
name: 'Nuget Package'
path: 'BinaryObjectScanner/bin/Release/*.nupkg'
- name: Upload to rolling
uses: ncipollo/release-action@v1.14.0
with:
allowUpdates: True
artifacts: 'BinaryObjectScanner/bin/Release/*.nupkg'
body: 'Last built commit: ${{ github.sha }}'
name: 'Rolling Release'
prerelease: True
replacesArtifacts: True
tag: "rolling"
updateOnlyUnreleased: True

View File

@@ -1,55 +0,0 @@
name: Build Programs
on:
push:
branches: [ "master" ]
jobs:
build:
runs-on: ubuntu-latest
strategy:
matrix:
project: [ExtractionTool, ProtectionScan]
runtime: [win-x86, win-x64, win-arm64, linux-x64, linux-arm64, osx-x64]
framework: [net9.0] #[net20, net35, net40, net452, net472, net48, netcoreapp3.1, net5.0, net6.0, net7.0, net8.0, net9.0]
conf: [Debug] #[Release, Debug]
steps:
- uses: actions/checkout@v4
with:
submodules: recursive
- name: Setup .NET
uses: actions/setup-dotnet@v4
with:
dotnet-version: 9.0.x
- name: Restore dependencies
run: dotnet restore
- name: Build
run: dotnet publish ${{ matrix.project }}/${{ matrix.project }}.csproj -f ${{ matrix.framework }} -r ${{ matrix.runtime }} -c ${{ matrix.conf == 'Release' && 'Release -p:DebugType=None -p:DebugSymbols=false' || 'Debug'}} --self-contained true --version-suffix ${{ github.sha }} ${{ (startsWith(matrix.framework, 'net5') || startsWith(matrix.framework, 'net6') || startsWith(matrix.framework, 'net7') || startsWith(matrix.framework, 'net8') || startsWith(matrix.framework, 'net9')) && '-p:PublishSingleFile=true' || ''}}
- name: Archive build
run: |
cd ${{ matrix.project }}/bin/Debug/${{ matrix.framework }}/${{ matrix.runtime }}/publish/
zip -r ${{ github.workspace }}/${{ matrix.project }}_${{ matrix.framework }}_${{ matrix.runtime }}_${{ matrix.conf }}.zip ./
- name: Upload build
uses: actions/upload-artifact@v4
with:
name: ${{ matrix.project }}_${{ matrix.framework }}_${{ matrix.runtime }}_${{ matrix.conf }}
path: ${{ matrix.project }}_${{ matrix.framework }}_${{ matrix.runtime }}_${{ matrix.conf }}.zip
- name: Upload to rolling
uses: ncipollo/release-action@v1.14.0
with:
allowUpdates: True
artifacts: ${{ matrix.project }}_${{ matrix.framework }}_${{ matrix.runtime }}_${{ matrix.conf }}.zip
body: 'Last built commit: ${{ github.sha }}'
name: 'Rolling Release'
prerelease: True
replacesArtifacts: True
tag: "rolling"
updateOnlyUnreleased: True

View File

@@ -3,15 +3,21 @@ name: Build PR
on: [pull_request]
jobs:
build:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- name: Setup .NET
uses: actions/setup-dotnet@v4
with:
dotnet-version: 9.0.x
- name: Build
run: dotnet build
build:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v5
- name: Setup .NET
uses: actions/setup-dotnet@v5
with:
dotnet-version: |
8.0.x
9.0.x
10.0.x
- name: Build
run: dotnet build
- name: Run tests
run: dotnet test

9
.gitmodules vendored
View File

@@ -1,9 +0,0 @@
[submodule "BinaryObjectScanner/_EXTERNAL/stormlibsharp"]
path = BinaryObjectScanner/_EXTERNAL/stormlibsharp
url = https://github.com/robpaveza/stormlibsharp.git
[submodule "BinaryObjectScanner/_EXTERNAL/libmspack4n"]
path = BinaryObjectScanner/_EXTERNAL/libmspack4n
url = https://github.com/activescott/libmspack4n.git
[submodule "BinaryObjectScanner/_EXTERNAL/LessIO"]
path = BinaryObjectScanner/_EXTERNAL/LessIO
url = https://github.com/activescott/LessIO.git

18
.vscode/launch.json vendored
View File

@@ -10,25 +10,13 @@
"request": "launch",
"preLaunchTask": "build",
// If you have changed target frameworks, make sure to update the program path.
"program": "${workspaceFolder}/ProtectionScan/bin/Debug/net9.0/ProtectionScan.dll",
"program": "${workspaceFolder}/ProtectionScan/bin/Debug/net10.0/ProtectionScan.dll",
"args": [],
"cwd": "${workspaceFolder}/ProtectionScan",
// For more information about the 'console' field, see https://aka.ms/VSCode-CS-LaunchJson-Console
"console": "internalConsole",
"stopAtEntry": false
},
{
"name": ".NET Core Launch (ExtractionTool)",
"type": "coreclr",
"request": "launch",
"preLaunchTask": "build",
// If you have changed target frameworks, make sure to update the program path.
"program": "${workspaceFolder}/ExtractionTool/bin/Debug/net9.0/ExtractionTool.dll",
"args": [],
"cwd": "${workspaceFolder}/ExtractionTool",
// For more information about the 'console' field, see https://aka.ms/VSCode-CS-LaunchJson-Console
"console": "internalConsole",
"stopAtEntry": false
"stopAtEntry": false,
"justMyCode": false,
},
{
"name": ".NET Core Attach",

View File

@@ -1,3 +0,0 @@
{
"dotnet.defaultSolution": "BinaryObjectScanner.sln"
}

View File

@@ -0,0 +1,28 @@
<Project Sdk="Microsoft.NET.Sdk">
<PropertyGroup>
<TargetFrameworks>net8.0;net9.0;net10.0</TargetFrameworks>
<IsPackable>false</IsPackable>
<LangVersion>latest</LangVersion>
<Nullable>enable</Nullable>
</PropertyGroup>
<ItemGroup>
<ProjectReference Include="..\BinaryObjectScanner\BinaryObjectScanner.csproj" />
</ItemGroup>
<ItemGroup>
<PackageReference Include="coverlet.collector" Version="6.0.4">
<IncludeAssets>runtime; build; native; contentfiles; analyzers; buildtransitive</IncludeAssets>
<PrivateAssets>all</PrivateAssets>
</PackageReference>
<PackageReference Include="Microsoft.NET.Test.Sdk" Version="18.0.1" />
<PackageReference Include="SabreTools.Serialization" Version="[2.2.1]" />
<PackageReference Include="xunit" Version="2.9.3" />
<PackageReference Include="xunit.runner.visualstudio" Version="3.1.5">
<IncludeAssets>runtime; build; native; contentfiles; analyzers; buildtransitive</IncludeAssets>
<PrivateAssets>all</PrivateAssets>
</PackageReference>
</ItemGroup>
</Project>

View File

@@ -0,0 +1,45 @@
using System.Collections.Generic;
using BinaryObjectScanner.Data;
using Xunit;
namespace BinaryObjectScanner.Test.Data
{
public class ProtectionDictionaryTests
{
#region ProcessProtectionString
[Fact]
public void ProcessProtectionString_Null_Empty()
{
string? protection = null;
List<string> actual = ProtectionDictionary.ProcessProtectionString(protection);
Assert.Empty(actual);
}
[Fact]
public void ProcessProtectionString_Empty_Empty()
{
string? protection = string.Empty;
List<string> actual = ProtectionDictionary.ProcessProtectionString(protection);
Assert.Empty(actual);
}
[Fact]
public void ProcessProtectionString_NoIndicator_Single()
{
string? protection = "item1";
List<string> actual = ProtectionDictionary.ProcessProtectionString(protection);
Assert.Single(actual);
}
[Fact]
public void ProcessProtectionString_Indicator_Multiple()
{
string? protection = "item1;item2";
List<string> actual = ProtectionDictionary.ProcessProtectionString(protection);
Assert.Equal(2, actual.Count);
}
#endregion
}
}

View File

@@ -0,0 +1,50 @@
using BinaryObjectScanner.Data;
using Xunit;
namespace BinaryObjectScanner.Test.Data
{
public class StaticChecksTests
{
[Fact]
public void ContentCheckClasses_Populated()
{
var actual = StaticChecks.ContentCheckClasses;
Assert.Equal(6, actual.Length);
}
[Fact]
public void LinearExecutableCheckClasses_Empty()
{
var actual = StaticChecks.LinearExecutableCheckClasses;
Assert.Empty(actual); // No implementations exist yet
}
[Fact]
public void MSDOSExecutableCheckClasses_Empty()
{
var actual = StaticChecks.MSDOSExecutableCheckClasses;
Assert.Empty(actual); // No implementations exist yet
}
[Fact]
public void NewExecutableCheckClasses_Populated()
{
var actual = StaticChecks.NewExecutableCheckClasses;
Assert.Equal(7, actual.Length);
}
[Fact]
public void PathCheckClasses_Populated()
{
var actual = StaticChecks.PathCheckClasses;
Assert.Equal(68, actual.Length);
}
[Fact]
public void PortableExecutableCheckClasses_Populated()
{
var actual = StaticChecks.PortableExecutableCheckClasses;
Assert.Equal(105, actual.Length);
}
}
}

View File

@@ -0,0 +1,35 @@
using Xunit;
namespace BinaryObjectScanner.Test
{
public class ExtensionsTests
{
#region FileSize
[Fact]
public void FileSize_Null_Invalid()
{
string? filename = null;
long actual = filename.FileSize();
Assert.Equal(-1, actual);
}
[Fact]
public void FileSize_Empty_Invalid()
{
string? filename = string.Empty;
long actual = filename.FileSize();
Assert.Equal(-1, actual);
}
[Fact]
public void FileSize_Invalid_Invalid()
{
string? filename = "INVALID";
long actual = filename.FileSize();
Assert.Equal(-1, actual);
}
#endregion
}
}

View File

@@ -0,0 +1,33 @@
using System.IO;
using BinaryObjectScanner.FileType;
using Xunit;
namespace BinaryObjectScanner.Test.FileType
{
public class AACSMediaKeyBlockTests
{
private static readonly SabreTools.Serialization.Wrappers.AACSMediaKeyBlock wrapper
= new(new SabreTools.Data.Models.AACS.MediaKeyBlock(), new MemoryStream(new byte[1024]));
[Fact]
public void DetectFile_EmptyString_Null()
{
string file = string.Empty;
var detectable = new AACSMediaKeyBlock(wrapper);
string? actual = detectable.Detect(file, includeDebug: false);
Assert.Null(actual);
}
[Fact]
public void DetectStream_EmptyStream_DefaultValue()
{
Stream? stream = new MemoryStream();
string file = string.Empty;
var detectable = new AACSMediaKeyBlock(wrapper);
string? actual = detectable.Detect(stream, file, includeDebug: false);
Assert.Equal("AACS (Unknown Version)", actual);
}
}
}

View File

@@ -0,0 +1,33 @@
using System.IO;
using BinaryObjectScanner.FileType;
using Xunit;
namespace BinaryObjectScanner.Test.FileType
{
public class BDPlusSVMTests
{
private static readonly SabreTools.Serialization.Wrappers.BDPlusSVM wrapper
= new(new SabreTools.Data.Models.BDPlus.SVM(), new MemoryStream(new byte[1024]));
[Fact]
public void DetectFile_EmptyString_Null()
{
string file = string.Empty;
var detectable = new BDPlusSVM(wrapper);
string? actual = detectable.Detect(file, includeDebug: false);
Assert.Null(actual);
}
[Fact]
public void DetectStream_EmptyStream_DefaultValue()
{
Stream? stream = new MemoryStream();
string file = string.Empty;
var detectable = new BDPlusSVM(wrapper);
string? actual = detectable.Detect(stream, file, includeDebug: false);
Assert.Equal("BD+ 0000-00-00", actual);
}
}
}

View File

@@ -0,0 +1,34 @@
using System.IO;
using BinaryObjectScanner.FileType;
using Xunit;
namespace BinaryObjectScanner.Test.FileType
{
public class DiskImageTests
{
private static readonly SabreTools.Serialization.Wrappers.ISO9660 wrapper
= new(new SabreTools.Data.Models.ISO9660.Volume(), new MemoryStream(new byte[1024]));
[Fact]
public void DetectFile_EmptyString_Null()
{
string file = string.Empty;
var detectable = new ISO9660(wrapper);
string? actual = detectable.Detect(file, includeDebug: false);
Assert.Null(actual);
}
[Fact]
public void DetectStream_EmptyStream_Empty()
{
Stream? stream = new MemoryStream();
string file = string.Empty;
var detectable = new ISO9660(wrapper);
string? actual = detectable.Detect(stream, file, includeDebug: false);
Assert.NotNull(actual);
Assert.Empty(actual);
}
}
}

View File

@@ -0,0 +1,33 @@
using System.IO;
using BinaryObjectScanner.FileType;
using Xunit;
namespace BinaryObjectScanner.Test.FileType
{
public class LDSCRYPTTests
{
private static readonly SabreTools.Serialization.Wrappers.LDSCRYPT wrapper
= new(new SabreTools.Data.Models.LDSCRYPT.EncryptedFile(), new MemoryStream(new byte[1024]));
[Fact]
public void DetectFile_EmptyString_Null()
{
string file = string.Empty;
var detectable = new LDSCRYPT(wrapper);
string? actual = detectable.Detect(file, includeDebug: false);
Assert.Null(actual);
}
[Fact]
public void DetectStream_EmptyStream_Null()
{
Stream? stream = new MemoryStream();
string file = string.Empty;
var detectable = new LDSCRYPT(wrapper);
string? actual = detectable.Detect(stream, file, includeDebug: false);
Assert.Equal("LDSCRYPT", actual);
}
}
}

View File

@@ -0,0 +1,34 @@
using System.IO;
using BinaryObjectScanner.FileType;
using Xunit;
namespace BinaryObjectScanner.Test.FileType
{
public class LinearExecutableTests
{
private static readonly SabreTools.Serialization.Wrappers.LinearExecutable wrapper
= new(new SabreTools.Data.Models.LinearExecutable.Executable(), new MemoryStream(new byte[1024]));
[Fact]
public void DetectFile_EmptyString_Null()
{
string file = string.Empty;
var detectable = new LinearExecutable(wrapper);
string? actual = detectable.Detect(file, includeDebug: false);
Assert.Null(actual);
}
[Fact]
public void DetectStream_EmptyStream_Empty()
{
Stream? stream = new MemoryStream();
string file = string.Empty;
var detectable = new LinearExecutable(wrapper);
string? actual = detectable.Detect(stream, file, includeDebug: false);
Assert.NotNull(actual);
Assert.Empty(actual);
}
}
}

View File

@@ -0,0 +1,34 @@
using System.IO;
using BinaryObjectScanner.FileType;
using Xunit;
namespace BinaryObjectScanner.Test.FileType
{
public class MSDOSTests
{
private static readonly SabreTools.Serialization.Wrappers.MSDOS wrapper
= new(new SabreTools.Data.Models.MSDOS.Executable(), new MemoryStream(new byte[1024]));
[Fact]
public void DetectFile_EmptyString_Null()
{
string file = string.Empty;
var detectable = new MSDOS(wrapper);
string? actual = detectable.Detect(file, includeDebug: false);
Assert.Null(actual);
}
[Fact]
public void DetectStream_EmptyStream_Empty()
{
Stream? stream = new MemoryStream();
string file = string.Empty;
var detectable = new MSDOS(wrapper);
string? actual = detectable.Detect(stream, file, includeDebug: false);
Assert.NotNull(actual);
Assert.Empty(actual);
}
}
}

View File

@@ -0,0 +1,34 @@
using System.IO;
using BinaryObjectScanner.FileType;
using Xunit;
namespace BinaryObjectScanner.Test.FileType
{
public class NewExecutableTests
{
private static readonly SabreTools.Serialization.Wrappers.NewExecutable wrapper
= new(new SabreTools.Data.Models.NewExecutable.Executable(), new MemoryStream(new byte[1024]));
[Fact]
public void DetectFile_EmptyString_Null()
{
string file = string.Empty;
var detectable = new NewExecutable(wrapper);
string? actual = detectable.Detect(file, includeDebug: false);
Assert.Null(actual);
}
[Fact]
public void DetectStream_EmptyStream_Empty()
{
Stream? stream = new MemoryStream();
string file = string.Empty;
var detectable = new NewExecutable(wrapper);
string? actual = detectable.Detect(stream, file, includeDebug: false);
Assert.NotNull(actual);
Assert.Empty(actual);
}
}
}

View File

@@ -0,0 +1,33 @@
using System.IO;
using BinaryObjectScanner.FileType;
using Xunit;
namespace BinaryObjectScanner.Test.FileType
{
public class PLJTests
{
private static readonly SabreTools.Serialization.Wrappers.PlayJAudioFile wrapper
= new(new SabreTools.Data.Models.PlayJ.AudioFile(), new MemoryStream(new byte[1024]));
[Fact]
public void DetectFile_EmptyString_Null()
{
string file = string.Empty;
var detectable = new PLJ(wrapper);
string? actual = detectable.Detect(file, includeDebug: false);
Assert.Null(actual);
}
[Fact]
public void DetectStream_EmptyStream_DefaultValue()
{
Stream? stream = new MemoryStream();
string file = string.Empty;
var detectable = new PLJ(wrapper);
string? actual = detectable.Detect(stream, file, includeDebug: false);
Assert.Equal("PlayJ Audio File", actual);
}
}
}

View File

@@ -0,0 +1,34 @@
using System.IO;
using BinaryObjectScanner.FileType;
using Xunit;
namespace BinaryObjectScanner.Test.FileType
{
public class PortableExecutableTests
{
private static readonly SabreTools.Serialization.Wrappers.PortableExecutable wrapper
= new(new SabreTools.Data.Models.PortableExecutable.Executable(), new MemoryStream(new byte[1024]));
[Fact]
public void DetectFile_EmptyString_Null()
{
string file = string.Empty;
var detectable = new PortableExecutable(wrapper);
string? actual = detectable.Detect(file, includeDebug: false);
Assert.Null(actual);
}
[Fact]
public void DetectStream_EmptyStream_Empty()
{
Stream? stream = new MemoryStream();
string file = string.Empty;
var detectable = new PortableExecutable(wrapper);
string? actual = detectable.Detect(stream, file, includeDebug: false);
Assert.NotNull(actual);
Assert.Empty(actual);
}
}
}

View File

@@ -0,0 +1,33 @@
using System.IO;
using BinaryObjectScanner.FileType;
using Xunit;
namespace BinaryObjectScanner.Test.FileType
{
public class RealArcadeInstallerTests
{
private static readonly SabreTools.Serialization.Wrappers.RealArcadeInstaller wrapper
= new(new SabreTools.Data.Models.RealArcade.RgsFile(), new MemoryStream(new byte[1024]));
[Fact]
public void DetectFile_EmptyString_Null()
{
string file = string.Empty;
var detectable = new RealArcadeInstaller(wrapper);
string? actual = detectable.Detect(file, includeDebug: false);
Assert.Null(actual);
}
[Fact]
public void DetectStream_EmptyStream_Null()
{
Stream? stream = new MemoryStream();
string file = string.Empty;
var detectable = new RealArcadeInstaller(wrapper);
string? actual = detectable.Detect(stream, file, includeDebug: false);
Assert.Equal("RealArcade Installer", actual);
}
}
}

View File

@@ -0,0 +1,33 @@
using System.IO;
using BinaryObjectScanner.FileType;
using Xunit;
namespace BinaryObjectScanner.Test.FileType
{
public class RealArcadeMezzanineTests
{
private static readonly SabreTools.Serialization.Wrappers.RealArcadeMezzanine wrapper
= new(new SabreTools.Data.Models.RealArcade.Mezzanine(), new MemoryStream(new byte[1024]));
[Fact]
public void DetectFile_EmptyString_Null()
{
string file = string.Empty;
var detectable = new RealArcadeMezzanine(wrapper);
string? actual = detectable.Detect(file, includeDebug: false);
Assert.Null(actual);
}
[Fact]
public void DetectStream_EmptyStream_Null()
{
Stream? stream = new MemoryStream();
string file = string.Empty;
var detectable = new RealArcadeMezzanine(wrapper);
string? actual = detectable.Detect(stream, file, includeDebug: false);
Assert.Equal("RealArcade Mezzanine", actual);
}
}
}

View File

@@ -0,0 +1,33 @@
using System.IO;
using BinaryObjectScanner.FileType;
using Xunit;
namespace BinaryObjectScanner.Test.FileType
{
public class SFFSTests
{
private static readonly SabreTools.Serialization.Wrappers.SFFS wrapper
= new(new SabreTools.Data.Models.StarForce.FileSystem(), new MemoryStream(new byte[1024]));
[Fact]
public void DetectFile_EmptyString_Null()
{
string file = string.Empty;
var detectable = new SFFS(wrapper);
string? actual = detectable.Detect(file, includeDebug: false);
Assert.Null(actual);
}
[Fact]
public void DetectStream_EmptyStream_Null()
{
Stream? stream = new MemoryStream();
string file = string.Empty;
var detectable = new SFFS(wrapper);
string? actual = detectable.Detect(stream, file, includeDebug: false);
Assert.Equal("StarForce Filesystem Container", actual);
}
}
}

View File

@@ -0,0 +1,30 @@
using System.IO;
using BinaryObjectScanner.FileType;
using Xunit;
namespace BinaryObjectScanner.Test.FileType
{
public class TextfileTests
{
[Fact]
public void DetectFile_EmptyString_Null()
{
string file = string.Empty;
var detectable = new Textfile();
string? actual = detectable.Detect(file, includeDebug: false);
Assert.Null(actual);
}
[Fact]
public void DetectStream_EmptyStream_Null()
{
Stream? stream = new MemoryStream();
string file = string.Empty;
var detectable = new Textfile();
string? actual = detectable.Detect(stream, file, includeDebug: false);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,22 @@
using System.IO;
using BinaryObjectScanner.GameEngine;
using Xunit;
namespace BinaryObjectScanner.Test.GameEngine
{
public class RenderWareTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new RenderWare();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,22 @@
using System.IO;
using BinaryObjectScanner.Packer;
using Xunit;
namespace BinaryObjectScanner.Test.Packer
{
public class ASPackTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new ASPack();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,22 @@
using System.IO;
using BinaryObjectScanner.Packer;
using Xunit;
namespace BinaryObjectScanner.Test.Packer
{
public class AdvancedInstallerTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new AdvancedInstaller();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,22 @@
using System.IO;
using BinaryObjectScanner.Packer;
using Xunit;
namespace BinaryObjectScanner.Test.Packer
{
public class AutoPlayMediaStudioTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new AutoPlayMediaStudio();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,22 @@
using System.IO;
using BinaryObjectScanner.Packer;
using Xunit;
namespace BinaryObjectScanner.Test.Packer
{
public class CExeTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new CExe();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,22 @@
using System.IO;
using BinaryObjectScanner.Packer;
using Xunit;
namespace BinaryObjectScanner.Test.Packer
{
public class CrunchTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new Crunch();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,22 @@
using System.IO;
using BinaryObjectScanner.Packer;
using Xunit;
namespace BinaryObjectScanner.Test.Packer
{
public class DotFuscatorTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new DotFuscator();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,22 @@
using System.IO;
using BinaryObjectScanner.Packer;
using Xunit;
namespace BinaryObjectScanner.Test.Packer
{
public class DotNetReactorTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new DotNetReactor();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,33 @@
using System.IO;
using BinaryObjectScanner.Packer;
using Xunit;
namespace BinaryObjectScanner.Test.Packer
{
public class EXEStealthTests
{
[Fact]
public void CheckContentsTest()
{
string file = "filename";
byte[] fileContent = [0x01, 0x02, 0x03, 0x04];
var checker = new EXEStealth();
string? actual = checker.CheckContents(file, fileContent, includeDebug: true);
Assert.Null(actual);
}
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new EXEStealth();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,22 @@
using System.IO;
using BinaryObjectScanner.Packer;
using Xunit;
namespace BinaryObjectScanner.Test.Packer
{
public class EmbeddedFileTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new EmbeddedFile();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,22 @@
using System.IO;
using BinaryObjectScanner.Packer;
using Xunit;
namespace BinaryObjectScanner.Test.Packer
{
public class GenteeInstallerTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new GenteeInstaller();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,22 @@
using System.IO;
using BinaryObjectScanner.Packer;
using Xunit;
namespace BinaryObjectScanner.Test.Packer
{
public class HyperTechCrackProofTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new HyperTechCrackProof();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,35 @@
using System.IO;
using BinaryObjectScanner.Packer;
using Xunit;
namespace BinaryObjectScanner.Test.Packer
{
public class InnoSetupTests
{
[Fact]
public void CheckNewExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.NewExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.NewExecutable exe = new(model, source);
var checker = new InnoSetup();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new InnoSetup();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,22 @@
using System.IO;
using BinaryObjectScanner.Packer;
using Xunit;
namespace BinaryObjectScanner.Test.Packer
{
public class InstallAnywhereTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new InstallAnywhere();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,22 @@
using System.IO;
using BinaryObjectScanner.Packer;
using Xunit;
namespace BinaryObjectScanner.Test.Packer
{
public class InstallerVISETests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new InstallerVISE();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,22 @@
using System.IO;
using BinaryObjectScanner.Packer;
using Xunit;
namespace BinaryObjectScanner.Test.Packer
{
public class IntelInstallationFrameworkTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new IntelInstallationFramework();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,22 @@
using System.IO;
using BinaryObjectScanner.Packer;
using Xunit;
namespace BinaryObjectScanner.Test.Packer
{
public class MicrosoftCABSFXTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new MicrosoftCABSFX();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,22 @@
using System.IO;
using BinaryObjectScanner.Packer;
using Xunit;
namespace BinaryObjectScanner.Test.Packer
{
public class NSISTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new NSIS();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,22 @@
using System.IO;
using BinaryObjectScanner.Packer;
using Xunit;
namespace BinaryObjectScanner.Test.Packer
{
public class NeoLiteTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new NeoLite();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,22 @@
using System.IO;
using BinaryObjectScanner.Packer;
using Xunit;
namespace BinaryObjectScanner.Test.Packer
{
public class PECompactTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new PECompact();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,22 @@
using System.IO;
using BinaryObjectScanner.Packer;
using Xunit;
namespace BinaryObjectScanner.Test.Packer
{
public class PetiteTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new PEtite();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,22 @@
using System.IO;
using BinaryObjectScanner.Packer;
using Xunit;
namespace BinaryObjectScanner.Test.Packer
{
public class SetupFactoryTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new SetupFactory();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,22 @@
using System.IO;
using BinaryObjectScanner.Packer;
using Xunit;
namespace BinaryObjectScanner.Test.Packer
{
public class SevenZipSFXTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new SevenZipSFX();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,22 @@
using System.IO;
using BinaryObjectScanner.Packer;
using Xunit;
namespace BinaryObjectScanner.Test.Packer
{
public class ShrinkerTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new Shrinker();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,22 @@
using System.IO;
using BinaryObjectScanner.Packer;
using Xunit;
namespace BinaryObjectScanner.Test.Packer
{
public class UPXTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new UPX();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,22 @@
using System.IO;
using BinaryObjectScanner.Packer;
using Xunit;
namespace BinaryObjectScanner.Test.Packer
{
public class WinRARSFXTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new WinRARSFX();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,35 @@
using System.IO;
using BinaryObjectScanner.Packer;
using Xunit;
namespace BinaryObjectScanner.Test.Packer
{
public class WinZipSFXTests
{
[Fact]
public void CheckNewExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.NewExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.NewExecutable exe = new(model, source);
var checker = new WinZipSFX();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new WinZipSFX();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,35 @@
using System.IO;
using BinaryObjectScanner.Packer;
using Xunit;
namespace BinaryObjectScanner.Test.Packer
{
public class WiseInstallerTests
{
[Fact]
public void CheckNewExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.NewExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.NewExecutable exe = new(model, source);
var checker = new WiseInstaller();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new WiseInstaller();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,33 @@
using System.IO;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class ActiveMARKTests
{
[Fact]
public void CheckContentsTest()
{
string file = "filename";
byte[] fileContent = [0x01, 0x02, 0x03, 0x04];
var checker = new ActiveMARK();
string? actual = checker.CheckContents(file, fileContent, includeDebug: true);
Assert.Null(actual);
}
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new ActiveMARK();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,44 @@
using System.Collections.Generic;
using System.IO;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class AegiSoftTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new AegiSoft();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
[Fact]
public void CheckDirectoryPathTest()
{
string path = "path";
List<string> files = [];
var checker = new AegiSoft();
List<string> actual = checker.CheckDirectoryPath(path, files);
Assert.Empty(actual);
}
[Fact]
public void CheckFilePathTest()
{
string path = "path";
var checker = new AegiSoft();
string? actual = checker.CheckFilePath(path);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,30 @@
using System.Collections.Generic;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class AlphaDVDTests
{
[Fact]
public void CheckDirectoryPathTest()
{
string path = "path";
List<string> files = [];
var checker = new AlphaDVD();
List<string> actual = checker.CheckDirectoryPath(path, files);
Assert.Empty(actual);
}
[Fact]
public void CheckFilePathTest()
{
string path = "path";
var checker = new AlphaDVD();
string? actual = checker.CheckFilePath(path);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,35 @@
using System.IO;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class AlphaROMTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new AlphaROM();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
[Fact]
public void CheckDiskImageTest()
{
string file = "filename";
SabreTools.Data.Models.ISO9660.Volume model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.ISO9660 iso = new(model, source);
var checker = new AlphaROM();
string? actual = checker.CheckDiskImage(file, iso, includeDebug: false);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,22 @@
using System.IO;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class ArmadilloTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new Armadillo();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,30 @@
using System.Collections.Generic;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class BitpoolTests
{
[Fact]
public void CheckDirectoryPathTest()
{
string path = "path";
List<string> files = [];
var checker = new Bitpool();
List<string> actual = checker.CheckDirectoryPath(path, files);
Assert.Empty(actual);
}
[Fact]
public void CheckFilePathTest()
{
string path = "path";
var checker = new Bitpool();
string? actual = checker.CheckFilePath(path);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,44 @@
using System.Collections.Generic;
using System.IO;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class ByteShieldTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new ByteShield();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
[Fact]
public void CheckDirectoryPathTest()
{
string path = "path";
List<string> files = [];
var checker = new ByteShield();
List<string> actual = checker.CheckDirectoryPath(path, files);
Assert.Empty(actual);
}
[Fact]
public void CheckFilePathTest()
{
string path = "path";
var checker = new ByteShield();
string? actual = checker.CheckFilePath(path);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,22 @@
using System.IO;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class CDCheckTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new CDCheck();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,57 @@
using System.Collections.Generic;
using System.IO;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class CDDVDCopsTests
{
[Fact]
public void CheckNewExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.NewExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.NewExecutable exe = new(model, source);
var checker = new CDDVDCops();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new CDDVDCops();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
[Fact]
public void CheckDirectoryPathTest()
{
string path = "path";
List<string> files = [];
var checker = new CDDVDCops();
List<string> actual = checker.CheckDirectoryPath(path, files);
Assert.Empty(actual);
}
[Fact]
public void CheckFilePathTest()
{
string path = "path";
var checker = new CDDVDCops();
string? actual = checker.CheckFilePath(path);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,44 @@
using System.Collections.Generic;
using System.IO;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class CDGuardTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new CDGuard();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
[Fact]
public void CheckDirectoryPathTest()
{
string path = "path";
List<string> files = [];
var checker = new CDGuard();
List<string> actual = checker.CheckDirectoryPath(path, files);
Assert.Empty(actual);
}
[Fact]
public void CheckFilePathTest()
{
string path = "path";
var checker = new CDGuard();
string? actual = checker.CheckFilePath(path);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,22 @@
using System.IO;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class CDKeyTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new CDKey();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,44 @@
using System.Collections.Generic;
using System.IO;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class CDLockTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new CDLock();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
[Fact]
public void CheckDirectoryPathTest()
{
string path = "path";
List<string> files = [];
var checker = new CDLock();
List<string> actual = checker.CheckDirectoryPath(path, files);
Assert.Empty(actual);
}
[Fact]
public void CheckFilePathTest()
{
string path = "path";
var checker = new CDLock();
string? actual = checker.CheckFilePath(path);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,30 @@
using System.Collections.Generic;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class CDProtectorTests
{
[Fact]
public void CheckDirectoryPathTest()
{
string path = "path";
List<string> files = [];
var checker = new CDProtector();
List<string> actual = checker.CheckDirectoryPath(path, files);
Assert.Empty(actual);
}
[Fact]
public void CheckFilePathTest()
{
string path = "path";
var checker = new CDProtector();
string? actual = checker.CheckFilePath(path);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,22 @@
using System.IO;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class CDSHiELDSETests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new CDSHiELDSE();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,30 @@
using System.Collections.Generic;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class CDXTests
{
[Fact]
public void CheckDirectoryPathTest()
{
string path = "path";
List<string> files = [];
var checker = new CDX();
List<string> actual = checker.CheckDirectoryPath(path, files);
Assert.Empty(actual);
}
[Fact]
public void CheckFilePathTest()
{
string path = "path";
var checker = new CDX();
string? actual = checker.CheckFilePath(path);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,19 @@
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class CactusDataShieldTests
{
[Fact]
public void CheckContentsTest()
{
string file = "filename";
byte[] fileContent = [0x01, 0x02, 0x03, 0x04];
var checker = new CactusDataShield();
string? actual = checker.CheckContents(file, fileContent, includeDebug: true);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,44 @@
using System.Collections.Generic;
using System.IO;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class CenegaProtectDVDTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new CenegaProtectDVD();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
[Fact]
public void CheckDirectoryPathTest()
{
string path = "path";
List<string> files = [];
var checker = new CenegaProtectDVD();
List<string> actual = checker.CheckDirectoryPath(path, files);
Assert.Empty(actual);
}
[Fact]
public void CheckFilePathTest()
{
string path = "path";
var checker = new CenegaProtectDVD();
string? actual = checker.CheckFilePath(path);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,44 @@
using System.Collections.Generic;
using System.IO;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class ChannelwareTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new Channelware();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
[Fact]
public void CheckDirectoryPathTest()
{
string path = "path";
List<string> files = [];
var checker = new Channelware();
List<string> actual = checker.CheckDirectoryPath(path, files);
Assert.Empty(actual);
}
[Fact]
public void CheckFilePathTest()
{
string path = "path";
var checker = new Channelware();
string? actual = checker.CheckFilePath(path);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,44 @@
using System.Collections.Generic;
using System.IO;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class ChosenBytesCodeLockTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new ChosenBytesCodeLock();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
[Fact]
public void CheckDirectoryPathTest()
{
string path = "path";
List<string> files = [];
var checker = new ChosenBytesCodeLock();
List<string> actual = checker.CheckDirectoryPath(path, files);
Assert.Empty(actual);
}
[Fact]
public void CheckFilePathTest()
{
string path = "path";
var checker = new ChosenBytesCodeLock();
string? actual = checker.CheckFilePath(path);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,44 @@
using System.Collections.Generic;
using System.IO;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class CopyKillerTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new CopyKiller();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
[Fact]
public void CheckDirectoryPathTest()
{
string path = "path";
List<string> files = [];
var checker = new CopyKiller();
List<string> actual = checker.CheckDirectoryPath(path, files);
Assert.Empty(actual);
}
[Fact]
public void CheckFilePathTest()
{
string path = "path";
var checker = new CopyKiller();
string? actual = checker.CheckFilePath(path);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,35 @@
using System.IO;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class CopyLokTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new CopyLok();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
[Fact]
public void CheckDiskImageTest()
{
string file = "filename";
SabreTools.Data.Models.ISO9660.Volume model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.ISO9660 iso = new(model, source);
var checker = new CopyLok();
string? actual = checker.CheckDiskImage(file, iso, includeDebug: false);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,44 @@
using System.Collections.Generic;
using System.IO;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class CopyXTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new CopyX();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
[Fact]
public void CheckDirectoryPathTest()
{
string path = "path";
List<string> files = [];
var checker = new CopyX();
List<string> actual = checker.CheckDirectoryPath(path, files);
Assert.Empty(actual);
}
[Fact]
public void CheckFilePathTest()
{
string path = "path";
var checker = new CopyX();
string? actual = checker.CheckFilePath(path);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,44 @@
using System.Collections.Generic;
using System.IO;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class CrypKeyTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new CrypKey();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
[Fact]
public void CheckDirectoryPathTest()
{
string path = "path";
List<string> files = [];
var checker = new CrypKey();
List<string> actual = checker.CheckDirectoryPath(path, files);
Assert.Empty(actual);
}
[Fact]
public void CheckFilePathTest()
{
string path = "path";
var checker = new CrypKey();
string? actual = checker.CheckFilePath(path);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,22 @@
using System.IO;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class CuckoTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new Cucko();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,30 @@
using System.Collections.Generic;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class DVDCryptTests
{
[Fact]
public void CheckDirectoryPathTest()
{
string path = "path";
List<string> files = [];
var checker = new DVDCrypt();
List<string> actual = checker.CheckDirectoryPath(path, files);
Assert.Empty(actual);
}
[Fact]
public void CheckFilePathTest()
{
string path = "path";
var checker = new DVDCrypt();
string? actual = checker.CheckFilePath(path);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,30 @@
using System.Collections.Generic;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class DVDMoviePROTECTTests
{
[Fact]
public void CheckDirectoryPathTest()
{
string path = "path";
List<string> files = [];
var checker = new DVDMoviePROTECT();
List<string> actual = checker.CheckDirectoryPath(path, files);
Assert.Empty(actual);
}
[Fact]
public void CheckFilePathTest()
{
string path = "path";
var checker = new DVDMoviePROTECT();
string? actual = checker.CheckFilePath(path);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,44 @@
using System.Collections.Generic;
using System.IO;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class DenuvoTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new Denuvo();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
[Fact]
public void CheckDirectoryPathTest()
{
string path = "path";
List<string> files = [];
var checker = new Denuvo();
List<string> actual = checker.CheckDirectoryPath(path, files);
Assert.Empty(actual);
}
[Fact]
public void CheckFilePathTest()
{
string path = "path";
var checker = new Denuvo();
string? actual = checker.CheckFilePath(path);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,44 @@
using System.Collections.Generic;
using System.IO;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class DigiGuardTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new DigiGuard();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
[Fact]
public void CheckDirectoryPathTest()
{
string path = "path";
List<string> files = [];
var checker = new DigiGuard();
List<string> actual = checker.CheckDirectoryPath(path, files);
Assert.Empty(actual);
}
[Fact]
public void CheckFilePathTest()
{
string path = "path";
var checker = new DigiGuard();
string? actual = checker.CheckFilePath(path);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,30 @@
using System.Collections.Generic;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class DinamicMultimediaTests
{
[Fact]
public void CheckDirectoryPathTest()
{
string path = "path";
List<string> files = [];
var checker = new DinamicMultimedia();
List<string> actual = checker.CheckDirectoryPath(path, files);
Assert.Empty(actual);
}
[Fact]
public void CheckFilePathTest()
{
string path = "path";
var checker = new DinamicMultimedia();
string? actual = checker.CheckFilePath(path);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,44 @@
using System.Collections.Generic;
using System.IO;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class DiscGuardTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new DiscGuard();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
[Fact]
public void CheckDirectoryPathTest()
{
string path = "path";
List<string> files = [];
var checker = new DiscGuard();
List<string> actual = checker.CheckDirectoryPath(path, files);
Assert.Empty(actual);
}
[Fact]
public void CheckFilePathTest()
{
string path = "path";
var checker = new DiscGuard();
string? actual = checker.CheckFilePath(path);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,44 @@
using System.Collections.Generic;
using System.IO;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class EAAntiCheatTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new EAAntiCheat();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
[Fact]
public void CheckDirectoryPathTest()
{
string path = "path";
List<string> files = [];
var checker = new EAAntiCheat();
List<string> actual = checker.CheckDirectoryPath(path, files);
Assert.Empty(actual);
}
[Fact]
public void CheckFilePathTest()
{
string path = "path";
var checker = new EAAntiCheat();
string? actual = checker.CheckFilePath(path);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,44 @@
using System.Collections.Generic;
using System.IO;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class EasyAntiCheatTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new EasyAntiCheat();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
[Fact]
public void CheckDirectoryPathTest()
{
string path = "path";
List<string> files = [];
var checker = new EasyAntiCheat();
List<string> actual = checker.CheckDirectoryPath(path, files);
Assert.Empty(actual);
}
[Fact]
public void CheckFilePathTest()
{
string path = "path";
var checker = new EasyAntiCheat();
string? actual = checker.CheckFilePath(path);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,22 @@
using System.IO;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class ElectronicArtsTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new ElectronicArts();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,44 @@
using System.Collections.Generic;
using System.IO;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class Engine32Tests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new Engine32();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
[Fact]
public void CheckDirectoryPathTest()
{
string path = "path";
List<string> files = [];
var checker = new Engine32();
List<string> actual = checker.CheckDirectoryPath(path, files);
Assert.Empty(actual);
}
[Fact]
public void CheckFilePathTest()
{
string path = "path";
var checker = new Engine32();
string? actual = checker.CheckFilePath(path);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,30 @@
using System.Collections.Generic;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class FreelockTests
{
[Fact]
public void CheckDirectoryPathTest()
{
string path = "path";
List<string> files = [];
var checker = new Freelock();
List<string> actual = checker.CheckDirectoryPath(path, files);
Assert.Empty(actual);
}
[Fact]
public void CheckFilePathTest()
{
string path = "path";
var checker = new Freelock();
string? actual = checker.CheckFilePath(path);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,44 @@
using System.Collections.Generic;
using System.IO;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class GFWLTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new GFWL();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
[Fact]
public void CheckDirectoryPathTest()
{
string path = "path";
List<string> files = [];
var checker = new GFWL();
List<string> actual = checker.CheckDirectoryPath(path, files);
Assert.Empty(actual);
}
[Fact]
public void CheckFilePathTest()
{
string path = "path";
var checker = new GFWL();
string? actual = checker.CheckFilePath(path);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,44 @@
using System.Collections.Generic;
using System.IO;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class GefestTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new Gefest();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
[Fact]
public void CheckDirectoryPathTest()
{
string path = "path";
List<string> files = [];
var checker = new Gefest();
List<string> actual = checker.CheckDirectoryPath(path, files);
Assert.Empty(actual);
}
[Fact]
public void CheckFilePathTest()
{
string path = "path";
var checker = new Gefest();
string? actual = checker.CheckFilePath(path);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,44 @@
using System.Collections.Generic;
using System.IO;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class HexalockAutoLockTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new HexalockAutoLock();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
[Fact]
public void CheckDirectoryPathTest()
{
string path = "path";
List<string> files = [];
var checker = new HexalockAutoLock();
List<string> actual = checker.CheckDirectoryPath(path, files);
Assert.Empty(actual);
}
[Fact]
public void CheckFilePathTest()
{
string path = "path";
var checker = new HexalockAutoLock();
string? actual = checker.CheckFilePath(path);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,44 @@
using System.Collections.Generic;
using System.IO;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class ImpulseReactorTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new ImpulseReactor();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
[Fact]
public void CheckDirectoryPathTest()
{
string path = "path";
List<string> files = [];
var checker = new ImpulseReactor();
List<string> actual = checker.CheckDirectoryPath(path, files);
Assert.Empty(actual);
}
[Fact]
public void CheckFilePathTest()
{
string path = "path";
var checker = new ImpulseReactor();
string? actual = checker.CheckFilePath(path);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,30 @@
using System.Collections.Generic;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class IndyVCDTests
{
[Fact]
public void CheckDirectoryPathTest()
{
string path = "path";
List<string> files = [];
var checker = new IndyVCD();
List<string> actual = checker.CheckDirectoryPath(path, files);
Assert.Empty(actual);
}
[Fact]
public void CheckFilePathTest()
{
string path = "path";
var checker = new IndyVCD();
string? actual = checker.CheckFilePath(path);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,22 @@
using System.IO;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class InteniumTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new Intenium();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,22 @@
using System.IO;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class InterLokTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new InterLok();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,22 @@
using System.IO;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class JoWoodTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new JoWood();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,44 @@
using System.Collections.Generic;
using System.IO;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class KalypsoLauncherTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new KalypsoLauncher();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
[Fact]
public void CheckDirectoryPathTest()
{
string path = "path";
List<string> files = [];
var checker = new KalypsoLauncher();
List<string> actual = checker.CheckDirectoryPath(path, files);
Assert.Empty(actual);
}
[Fact]
public void CheckFilePathTest()
{
string path = "path";
var checker = new KalypsoLauncher();
string? actual = checker.CheckFilePath(path);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,19 @@
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class KeyLockTests
{
[Fact]
public void CheckContentsTest()
{
string file = "filename";
byte[] fileContent = [0x01, 0x02, 0x03, 0x04];
var checker = new KeyLock();
string? actual = checker.CheckContents(file, fileContent, includeDebug: true);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,44 @@
using System.Collections.Generic;
using System.IO;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class LabelGateTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new LabelGate();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
[Fact]
public void CheckDirectoryPathTest()
{
string path = "path";
List<string> files = [];
var checker = new LabelGate();
List<string> actual = checker.CheckDirectoryPath(path, files);
Assert.Empty(actual);
}
[Fact]
public void CheckFilePathTest()
{
string path = "path";
var checker = new LabelGate();
string? actual = checker.CheckFilePath(path);
Assert.Null(actual);
}
}
}

View File

@@ -0,0 +1,57 @@
using System.Collections.Generic;
using System.IO;
using BinaryObjectScanner.Protection;
using Xunit;
namespace BinaryObjectScanner.Test.Protection
{
public class LaserLokTests
{
[Fact]
public void CheckPortableExecutableTest()
{
string file = "filename";
SabreTools.Data.Models.PortableExecutable.Executable model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.PortableExecutable exe = new(model, source);
var checker = new LaserLok();
string? actual = checker.CheckExecutable(file, exe, includeDebug: false);
Assert.Null(actual);
}
[Fact]
public void CheckDirectoryPathTest()
{
string path = "path";
List<string> files = [];
var checker = new LaserLok();
List<string> actual = checker.CheckDirectoryPath(path, files);
Assert.Empty(actual);
}
[Fact]
public void CheckFilePathTest()
{
string path = "path";
var checker = new LaserLok();
string? actual = checker.CheckFilePath(path);
Assert.Null(actual);
}
[Fact]
public void CheckDiskImageTest()
{
string file = "filename";
SabreTools.Data.Models.ISO9660.Volume model = new();
Stream source = new MemoryStream(new byte[1024]);
SabreTools.Serialization.Wrappers.ISO9660 iso = new(model, source);
var checker = new LaserLok();
string? actual = checker.CheckDiskImage(file, iso, includeDebug: false);
Assert.Null(actual);
}
}
}

Some files were not shown because too many files have changed in this diff Show More