Jump to content

Leaderboard


Popular Content

Showing content with the highest reputation since 12/15/18 in all areas

  1. 10 points
    Sorry for the inconvenience but we had some problems with our previous host and had to close down for a while Special Thanks to my old friend "who wishes to stay anonymous" for providing the new host. Registration is open again.
  2. 5 points
    Original topic : https://forum.tuts4you.com/topic/41523-edit-xaml-in-net-apps/ Credits to whoknows pass : b-at-s.info format:RAR5 ReplaceBAML_explained.rar
  3. 3 points
    Description : SmartAssembly Ptr SizeOf Fixer 1.0 is the tool which remove Prt junk from assembly protected by SmartAssembly, this tool is made by me - skypeaful aka LKT Pro and kao (Orginal code) For example code Excutable protected which SmartAssembly which clean by de4dot Example: private unsafe string method_0() { string Test = "Deob me"; void* ptr = stackalloc void[8]; *(int*)ptr = Test.Length; string text = ""; *(int*)((byte*)ptr + 4) = ; while (*(int*)((byte*)ptr + 4) < *(int*)ptr) { if (*(int*)((byte*)ptr + 4) > && *(int*)((byte*)ptr + 4) % 4 == ) { text += "-"; } text += Test[*(int*)((byte*)ptr + 4)]; *(int*)((byte*)ptr + 4) = *(int*)((byte*)ptr + 4) + 1; } return text; } Screenshot : Author/Credits : kao (Orginal code), skypeaful aka LKT Pro (I made some change for automatic for each method and highlight,...) Download : Usage: Drap and drop .exe which you want to fix to tool This tool is just remove some parts like kao said in orginal topic: https://forum.tuts4you.com/topic/38253-help-request-deobfuscate-net-code/?do=findComment&comment=182265 So if you want more please share idea which me for coding, thank for any contributation.
  4. 3 points
    Description: Project Old Rod is an automated command-line utility that attempts to disassemble any .NET application protected by the KoiVM virtualiser plugin for ConfuserEx. Additionally, it tries to recompile the VM code back to .NET CIL in an attempt to recover the original code. Project Old Rod is released under the GPLv3 license. Screenshot : Author/Credits : Me (Washi). Homepage/Website : https://github.com/Washi1337/OldRod Keep in mind it is a work in progress. Tutorial: In the README.md. Please read it. Reading manuals might save your life one day Compiled by @kao oldrod-Release.zip
  5. 2 points
    New Beta 6 release: - Fixed a silly bug on "EBFE on EP" AlocLogBeta6.zip
  6. 2 points
    PCGuardKeygen - PC Guard key tool PC Guard V6/v5 DEMO keygen is able to: 1. Generate button: Generate "Activation Code" for PC Guard, serials are generated from "Program ID" and "Site Code" (HID) 2. Decode button Decode "Program ID" from "Activation Code" and "Site Code" (HID) 3. Verify button Verify "Activation Code" and "Site Code" is required, Not too strong check since just check 1 CRC32 byte. 4. Brute Site button Decode "Program ID" from "Activation Code" while "Site Code" is brute forced; SiteCollection.binary is generated containing "Site Code"+" "+"Program ID"+0D0A (last is newline termination) This will not test if "Program ID" is valid, a new tools has to be created for that task. "Program ID" has 24 hexadecimal numbers length (3 dwords) "Site Code" has 8 hexadecimal numbers length (1 dword) "Activation Code" is like: 7000074C-9598DD6C-78CBB23F-EF0156B4 https://www.calculateme.com/time/minutes/to-days/ Expected time for 4. Brute Site button would be approximately 4 hours. PCGuardKeygen_src_VC6.zip PCGuardKeygenExe.zip
  7. 2 points
    This may not work for last version so I've uploaded new tools called: Enigma HWID Patcher Loader Generator by GautamGreat/URET work for some latter versions https://forum.tuts4you.com/topic/40389-enigma-hwid-patcher-loader-generator . Pre Checker patch checkbox. or the Enigma 1.x - 3.x VM Unpacker 1.0.txt Olly script by LCF-AT may log some address for bypassing! EnigmaPatcher_v1.3.rar
  8. 2 points
    @skypeaful: I only have the source code (attached). You could try Pediy, it looks like they have also the binaries. But I don't have an account there and I don't read Chinese to make one.. strongnameremove_src.zip
  9. 2 points
    https://gchq.github.io/CyberChef/
  10. 2 points
    SafeNet Sentinel HASP ImportScript & ShortTut: A short tutorial on SafeNet Sentinel HASP (how to reach entry point) and an Olly script for reconstruction import table. SafeNet Sentinel HASP ImportScript & ShortTut.zip
  11. 1 point
    https://cairoshell.com https://github.com/cairoshell/cairoshell
  12. 1 point
    Password reset function and emoticons are fixed now
  13. 1 point
    The migration wasn't easy, still fixing some bugs
  14. 1 point
    is a GUI application for in-depth analysis of USB HID class devices. The 2 main usecases of this application are reverse-engineering existing devices and developing new USB HID devices. USB HID class consists of many possible devices, e.g. mice, keyboards, joysticks and gamepads. But that's not all! There are more exotic HID devices, e.g. weather stations, medical equipment (thermometers, blood pressure monitors) or even simulation devices (think of flight sticks!). https://github.com/ondrejbudai/hidviz/
  15. 1 point
    https://www.bleepingcomputer.com/news/security/kali-linux-adds-undercover-mode-to-impersonate-windows-10/
  16. 1 point
    There are several good decompilers for Java on the web, try http://www.javadecompilers.com
  17. 1 point
    Thanks I added a local mirror smartassembly-ptr-sizeof-fixer-1.0-by-kao--lkt-pro_.zip
  18. 1 point
    It is not my work, Enigma HWID Patcher Loader Generator is the work of GautamGreat/URET. While Enigma Register Bypasser.rar is the work of BlackVirus.
  19. 1 point
    Enigma Register Bypasser Link: https://crackinggsm.blogspot.com/2016/07/enigma-registration-bypasser.html Enigma Register Bypasser.rar
  20. 1 point
    https://forum.tuts4you.com/topic/37779-netbodycloner/?do=findComment&comment=188862 or attached. NetBodyCloner&NetBodyInjector.zip
  21. 1 point
    Invoke any member of a class http://smoketest.wesleysteiner.com/
  22. 1 point
    Strong Name Remove v2.3 exe attached to first post!
  23. 1 point
    The article was also deleted for this:
  24. 1 point
    When CHM and HLP were the real shit
  25. 1 point
    https://dzo.es/Assembly/ https://dzo.es/Assembly/The Assembly Programming Master Book.chm
  26. 1 point
  27. 1 point
    https://github.com/antlr/grammars-v4 https://tomassetti.me/parsing-any-language-in-java-in-5-minutes-using-antlr-for-example-python/ Design and implementation for SQL parser based on ANTLR https://ieeexplore.ieee.org/document/5485593
  28. 1 point
  29. 1 point
    http://dl.downloadly.ir/Files/Software2/IDA_Pro_7.2.181105_x86_x64_Hex-Rays_Decompilers_x64_Downloadly.ir.rar
  30. 1 point
    C__Quick_Syntax_Reference.zip
  31. 1 point
  32. 1 point
  33. 1 point
    SimpleMSILDecryptorForAgile: this tool decrypts methods of last version of Agile; inspirited by duyan13 https://board.b-at-s.info/index.php?showtopic=9313 Two Frameworks are supported: Framework 2.0 and Framework 4.0; Framework 4+ (latter Frameworks like 4.6.1 etc.) should be supported by Framework 4.0: Place Simple_MSIL_Decryptor.exe.config, SJITHook.dll and Simple_MSIL_Decryptor.exe in the target program directory; start Simple_MSIL_Decryptor.exe from NetBox 4.0 and try to decrypt target assembly; if reports missing assemblies you should place them in the target directory for being able to decrypt MSIL of those methods; in the end undecrypted count should be 0. Next step: unvirtualize Agile with de4dot: This may not work for some targets! After we decrypt MSIL we deobfuscate methods with de4dot v3.1.41592, we just set decrypts methods to false so de4dot won't decrypt methods by adding to de4dot.exe the parameter: --an-methods false in command line do: de4dot.exe filename.exe --an-methods false SMD_Agile.zip
  34. 1 point
×
×
  • Create New...