So in my adventures to track down the elusive Phrozencrew ( last 2yrs), its come to my attention that they all grown up.. Not in a bad way of course, but just done with
the scene...moved on....among other peeps from my love of 98...some great crackers of the day...just done.
. So now in this day and age who is active anymore? I went to the almighty ICU website...gone..maybe im out of the loop but the page is gone...FFF..not sure, SnD..nope
efnet is nearly closed..mostly bots ...
Wrote this a while ago, to understand how trojans gets antivirus products when they request such information, turns out it works pretty good
[For Educational Purposes and Usage ONLY]
; English Forum: https://forum.tuts4you.com/
; Author: 0xNOP
; Date: 6.April.2016
; OS: Windows
; Output Demo:
;==================== GLOBAL VARIABLES ==================
Global.s Dim output(0)
Global.s AntiVirus = "AntiVirusProduct"
Global.s FireWall = "FirewallProduct"
Global.s AntiSpyware = "AntiSpywarePr
[ATTENTION ! - BEFORE YOU READ ANYTHING!]
The following article you're about to read, have been written with the mentality to help other fellow members that currently have a job as Malware Analyst and
are working hard everyday against Malwares in the wild, given that this forum is publicly available to anyone, this article is intended to be
used only as an educational resource and should NOT BE put to the test with any kind of Commerical Programs / Applications / Softwares
protected by T
Here we go guys! Yet another snippet!
I keep digging with WMI and it's interface WMIC, and I find it pretty useful with all the things you can get, this time I've made this little nice snippet code which grabs the OS Name / Version !
Hope you like it and find it useful
; English Forum: https://forum.tuts4you.com/
; Author: 0xNOP
; Date: 6.April.2016
; OS: Windows
; Output Demo: http://i.imgur.com/u37a35H.png
ProgID = RunProgram("wmic", "os get caption", "", #PB_Program_Open
With the excitement of Windows 10 and a host of bug fixes out of the way I can now concentrate some time on Tuts 4 You which also allows me to post some code on this blog. This blog entry is in regard to a recent query from LCF on viewing icons contained within DLL's, executables, icon files, etc. I coded a small tool for this a while ago that enabled me to quickly view icons contained primarily within shell32.dll and imageres.dll so that I could take advantage of those icons in other cod
I put this out here to be diffrent, give ya something else to read besides all the other cool crap out there!
*** Really wanted to delete this because it sounds weak,but i think its a insight to people who are not like you!! ...My personal msg for crackers or coders or scene people..you might be something or someone to somebody out there who is got Nothing..you might be an idol, a hero. Shit when cats were naming super heros I was the kid naming crackers and scene groups..0days cats. ((reg
Last week I read a blog entry by Raymond Chan regarding the way Task Manager computes the systems up-time and it reminded me of a bug I noticed in AID64's implementation. On Sunday I had a bit of free time before the Manchester United vs Arsenal game kicked off and decided to see what I could come up with.
There are a dozen different methods for calculating up-time, some methods are better and some of these do factor in leap years. Raymo
A query was raised last week about how to determine the calendar date format for different regions; year/month/day, day/month/year, etc. After a bit of fruitless pondering whether this could be achieved via API I decided to see if it could be done via the registry. Multiple editions of Windows support the International registry subkey and from there we can use either sShortDate or sLongDate to help us reach our goal. The operating system kindly finds and formats the calendar date in the c
Here is a simple example in PureBasic code for using a self-debugger, commonly referred to as Debug Blocker. Compile (or run one of the attached executables in the archive) and click on the "CLICK ME!" button to create a duplicate process being self-debugged. Any queries about the code please comment below...
; PureBasic DebugBlocker() function, creates a co
Apparently... Windows 8.1 came with a new flag for PrintWindow called, PW_RENDERFULLCONTENT. This allows PrintWindow to properly capture window content that is displaying DirectX through DWM.
Below are some screenshots taken of Unreal Tournament. The first is how PrintWindow normally captures a window with DirectX content being rendered inside it, notice the window border is missing and there is corrupted graphics on the right. The secon
It has been a while since this good debugger is available for download at immunity's homepage. Such debugger has a lot of improvements over his older brother - odbgr. One of such improvements is the ability of coding scripts on python integrated interface that runs over completely the obsolete odbgr scripting. It has got endless potential and I advice you to look elsewhere for more information on the use of immdbg's integrated APIs. Today I am posting a small script I coded to unpack upx code -
I needed some code in PureBasic to check if the logged in user and/or running process is a member of the Administrator group. There is IsUserAnAdmin function, it works and is easy to include in your code...
Debug "Running as an Adminstrator"
Debug "Running as a Limited User"
Unfortunately as Microsoft states on MSDN it's a wrapper on a shor
Last year a friend of mine was talking about PureBasic and how easy and good it was for coding and how much he liked working with it. I didn't really take much notice of it - it was just another Basic language, right?! Earlier this year he started showing off some of his remade old school crack intro's and demos from way back in the early 80's and 90's from the Amiga scene including some general effects so I decided to download a copy of PureBasic and tried out some of the features of the
Lately I thought it would be good to share some of the stuff I did with Armadillo to the general public, this time it will be about Armadillo’s Stolen Keys feature. When I have some time available, I will update this blog, but in general I don’t like typing long essays so don’t expect too much from that promise.
What are stolen keys?
Quite obvious, stolen keys are stolen (or otherwise illegally obtained) serials for an Armadillo project. The project developer can maintai
I've made more simple, I include source manually code with different code as well,
Example + Source Code.
This time I just use my 4-layer stacking horizontally so easy to understand,
[120x80] [120x80] [120x80] [120x80] = [480 x 80]
may can help.
Download Source Code + Example ----------> ZNP Easy.zip
I'm not really used to the whole 'blog' thing so bear with me while i simply spill some thoughts,
Anybody who has seen the Keymaker.c source code for Armadillo keygenerating can see how the keys are built and put together, i'm not going to be explaining how i came to any conclusions aside from referring back to that document.
The single most important thing to make genuine Level 10 Short V3 keys is the Encryption Template, from it the symmetric key is made as well as the private key being
This is the result of trying to play back xm music on 64-bit Windows.
I wrote a simple wrapper around libmodplug that reads its raw PCM output and writes it to the standard wave output.
All you have to do is create an instance of ModPlay which needs a buffer + size of the xm file to be played.
Then just call the play() function and voila
I have to say that it roughly adds 40kb of code to your binaries, you have to decide if that is worth it for you. Personally I don't care, especially becau
guess what, we again targeted activemark new version and this time we are releasing an updated tool for inlining the protection beside of course a tutorial which explains the technique.
You can grab them all from here:
thanks to SSlEviN for his great work. Beside this is the first tool he coded on his own! Veery nice beginning
Source: [ARTeam] ActiveMark "dismembered"
To Someone likes to solve crossword, somebody likes to play chess.
I like RE because I need to strain my brain like when I solve a crossword, think and analyze like when I play chess.
After every cracking, I get a moral satisfaction, I'm happy with my success, success in cracking my friends.
I'm glad when I receive a message from the developers, where they are grateful for cracking of their program and promise to eliminate the hole in the protection of the program in the next release.
am just a beginner , and believe me... Reverse Engineering is taking a huge part in my personal life
i wanna be that professional cracker ! programmer , i need to learn more and more
i won't stop what am doing because i love it ! from deep of my heart
this is not just a hobby for me , its a way of thinking .
time factor maybe...I got an interest on reversing sometime 6 yrs ago but work schedule is pushing me away. I still remember the old days where a good site (astatalk) emerge and helping each other.
Yes, reversing is a long process, if you put space on the process then you'll be lost just like me, been idle in re for so many years..