Created
August 28, 2018 17:50
-
-
Save mdavis332/a060796e9632dbed68daf498449e61a9 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
https://stackoverflow.com/questions/1026483/is-there-a-way-to-crack-the-password-on-an-excel-vba-project | |
code credited to Siwtom (nick name), a Vietnamese developer | |
1. Open the file(s) that contain your locked VGA projects | |
2. Create a new xlsm file and store this code in Module 1 | |
Option Explicit | |
Private Const PAGE_EXECUTE_READWRITE = &H40 | |
Private Declare Sub MoveMemory Lib "kernel32" Alias "RtlMoveMemory" _ | |
(Destination As Long, Source As Long, ByVal Length As Long) | |
Private Declare Function VirtualProtect Lib "kernel32" (lpAddress As Long, _ | |
ByVal dwSize As Long, ByVal flNewProtect As Long, lpflOldProtect As Long) As Long | |
Private Declare Function GetModuleHandleA Lib "kernel32" (ByVal lpModuleName As String) As Long | |
Private Declare Function GetProcAddress Lib "kernel32" (ByVal hModule As Long, _ | |
ByVal lpProcName As String) As Long | |
Private Declare Function DialogBoxParam Lib "user32" Alias "DialogBoxParamA" (ByVal hInstance As Long, _ | |
ByVal pTemplateName As Long, ByVal hWndParent As Long, _ | |
ByVal lpDialogFunc As Long, ByVal dwInitParam As Long) As Integer | |
Dim HookBytes(0 To 5) As Byte | |
Dim OriginBytes(0 To 5) As Byte | |
Dim pFunc As Long | |
Dim Flag As Boolean | |
Private Function GetPtr(ByVal Value As Long) As Long | |
GetPtr = Value | |
End Function | |
Public Sub RecoverBytes() | |
If Flag Then MoveMemory ByVal pFunc, ByVal VarPtr(OriginBytes(0)), 6 | |
End Sub | |
Public Function Hook() As Boolean | |
Dim TmpBytes(0 To 5) As Byte | |
Dim p As Long | |
Dim OriginProtect As Long | |
Hook = False | |
pFunc = GetProcAddress(GetModuleHandleA("user32.dll"), "DialogBoxParamA") | |
If VirtualProtect(ByVal pFunc, 6, PAGE_EXECUTE_READWRITE, OriginProtect) <> 0 Then | |
MoveMemory ByVal VarPtr(TmpBytes(0)), ByVal pFunc, 6 | |
If TmpBytes(0) <> &H68 Then | |
MoveMemory ByVal VarPtr(OriginBytes(0)), ByVal pFunc, 6 | |
p = GetPtr(AddressOf MyDialogBoxParam) | |
HookBytes(0) = &H68 | |
MoveMemory ByVal VarPtr(HookBytes(1)), ByVal VarPtr(p), 4 | |
HookBytes(5) = &HC3 | |
MoveMemory ByVal pFunc, ByVal VarPtr(HookBytes(0)), 6 | |
Flag = True | |
Hook = True | |
End If | |
End If | |
End Function | |
Private Function MyDialogBoxParam(ByVal hInstance As Long, _ | |
ByVal pTemplateName As Long, ByVal hWndParent As Long, _ | |
ByVal lpDialogFunc As Long, ByVal dwInitParam As Long) As Integer | |
If pTemplateName = 4070 Then | |
MyDialogBoxParam = 1 | |
Else | |
RecoverBytes | |
MyDialogBoxParam = DialogBoxParam(hInstance, pTemplateName, _ | |
hWndParent, lpDialogFunc, dwInitParam) | |
Hook | |
End If | |
End Function | |
3. Paste this code in Module2 and run it | |
Sub unprotected() | |
If Hook Then | |
MsgBox "VBA Project is unprotected!", vbInformation, "*****" | |
End If | |
End Sub |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment