Jump to content
View in the app

A better way to browse. Learn more.

Tuts 4 You

A full-screen app on your home screen with push notifications, badges and more.

To install this app on iOS and iPadOS
  1. Tap the Share icon in Safari
  2. Scroll the menu and tap Add to Home Screen.
  3. Tap Add in the top-right corner.
To install this app on Android
  1. Tap the 3-dot menu (⋮) in the top-right corner of the browser.
  2. Tap Add to Home screen or Install app.
  3. Confirm by tapping Install.

All Activity

This stream auto-updates

  1. Today
  2. ranni0225
    ranni0225 joined the community
  3. rablidad started following Live Malware Samples...
  4. rablidad
    rablidad joined the community
  5. DIALLO
    DIALLO joined the community
  6. Heimdall
    Heimdall joined the community
  7. Yesterday
  8. Venoxy
    Venoxy changed their profile photo
  9. trojanx
    trojanx replied to Sh4DoVV's topic in CrackMe
    Awesome job! A tutorial would really help us understand it better
  10. lomdwrrrt2013
    lomdwrrrt2013 joined the community
  11. User21
    User21 joined the community
  12. hydradragonantivirus
    hydradragonantivirus replied to Sh4DoVV's topic in CrackMe
    You can look for HydraDragonAntivirus/AutoNuitkaDecompiler: Get malware payload without dynamic analysis with this auto decompiler or my main project. I did with that. If you want dynamic analysis then Is Nuitka No Longer Secure? A Reverse Engineering Tool for Nuitka/Cython-Packed Applications — pymodhook | by qfcy | Medium (There more advanced special python code for pymodhook but it's closed source for vxnet and not made by me so I can't make it public) If you want both dynamic and static: Siradankullanici/nuitka-helper: Symbol Recovery Tool for Nuitka Binaries I did extract with stage1.py or nuitka-extractor extremecoders-re/nuitka-extractor: Tool to extract nuitka compiled executables (or just do dynamic analysis for extract and sometimes it can't extract or Nuitka compiles executable as dll so you need dll loader It seems like it becoming obsolete · Issue #15 · extremecoders-re/nuitka-extractor) my main project not stable but if he is become stable then he can detect is he nuitka and do auto extract with auto decompile and you get source code. Nuitka is actually hiding data in resources section in specia bytecode format. Actual source code starts from (u)python.exe or /python.exe (generally in broken executables) then you need look for <modulecode part for import recovery and Nuitka compiles with everything for obfuscation. So too many comment lines from file exists. You can detect junks by that line contains no u word. Which means this line is junk because u means go to next line in Nuitka bytecode. Nuitka is not obfuscated if he doesn't compile with everything otherwise it's obfuscated. You can improve my script by looking Nuitka bytecode source code. You can post to ay AI to recover code but Gemini is currently best for very long codes. Compared to other obfuscators you need pyarmor with Nuitka to make him more secure (or guardshield with pip install guardshield), otherwise it's easy task if there no too many imports. Rarely user disables compile everything even if the docs then your task much easier but in default Nuitka compiles everything. Nuitka clearly worser than Rust for some reason. 1) Antiviruses flags as malware because malware analysts can't understand Nuitka (even if they are too experinced they really don't know how to solve Nuitka) so you get false positives. 2) It's not good obfuscator and it's not creating millions of line hello world code via normal cython. I don't recommend python to use for avoid reverse engineering but you can still use it. If you want I can give all details which I know with tutorial or I can release my main project for auto Nuitka decomplication. My last words are don't use pyoxidizer, pyinstaller, cx_freeze if you want obfuscate your code because Nuitka is still best open source option for python. Nuitka can't remove python.h so the code must be pseudo python (Cython like style)
  13. clem0338
    clem0338 joined the community
  14. madmax77
    madmax77 joined the community
  15. Last week
  16. m!x0r
    m!x0r commented on m!x0r's file in Tools & Utilities
    We are trying to fix All bugs possible, you can read version history, our goal to build a version stable, with all WIN OS versions, then we will move to new features, we will add latest version of UPX next release. Greetings.
  17. jackyjask
    jackyjask commented on m!x0r's file in Tools & Utilities
    wooooooooow what happened in between of 1.20 vs 1.50 versions? @m!x0r is it possible to use latest up-to-date UPX? currently in ver 1.50 older one packaged in: Uploading Attachment...
  18. Aloiid started following lena151
  19. m!x0r
    m!x0r commented on m!x0r's file in Tools & Utilities
    New Version 1.50 Published Release Date: 10/09/2025
  20. Washi
    Washi replied to jackyjask's topic in Site Bug Reports and Feedback
    @Teddy Rogers #include <stdio.h> int main() { puts("Seems to work fine now, thanks!"); return 0; }
  21. Teddy Rogers
    Teddy Rogers replied to jackyjask's topic in Site Bug Reports and Feedback
    @Washi thank you for reporting. Can you try now, as it should be fixed. I had to upload some fresh files on to the server and it seems to have made the editor template revert back to a previous update... Ted.
  22. Washi
    Washi replied to jackyjask's topic in Site Bug Reports and Feedback
    @Teddy Rogers It seems the menu item disappeared again (or at least on Firefox)? At least I cannot see it under the + button anymore, even after a ctrl+f5.
  23. TrouThieTuts4You started following mrexodia
  24. m!x0r
    m!x0r commented on m!x0r's file in Tools & Utilities
    New Version 1.20 Published Release Date: 09/09/2025
  25. Nooboy
    Nooboy replied to Sh4DoVV's topic in CrackMe
    Can you reveal some knowledge and tutorials?
  26. lovejoy226 started following Chino
  27. Chino
    Chino replied to Sh4DoVV's topic in CrackMe
    Can you tell me how you did it ? Because from what I know Nuitka transpiles python bytecode to C and the compiled program contains very little python bytecode embedded into it and there's nothing else related other than native assembly code, that's where disassemblers come to play but everything disassembled will become pseudo C code instead of python
  28. ongamanextt started following CodeExplorer
  29. Zurito
    Zurito commented on m!x0r's file in Tools & Utilities
    Works perfectly on Windows XP, THX
  30. jackyjask
    jackyjask commented on Teddy Rogers's file in Packers & Protectors
    I wanted to make my own protted binary so found out very old ASProt and tried to prot the biany - failure....
  31. jackyjask
    jackyjask commented on Teddy Rogers's file in Packers & Protectors
    Want to leave my small feedback... wanted to recall my childhood times and nice mood... the 4 docs are absolutely fantastic vivid English with lots of jokes and fun! my lovely Olly (well I had fun on Olly v2, but orig flow was done on Olly 1.10) I've quick q - is it only me not able to run the tut3 bin? UnPackMe_ASProtect1.2.exe it silently crashes on my OS (win7 xt64) I guess in that old old 2005 W7 was not yet authored so ASProt had some heavy times with it? The exe makes crash dump, could be opened in VS -
  32. m!x0r
    m!x0r commented on m!x0r's file in Tools & Utilities
    New Version 1.10 Published Release Date: 07/09/2025
  33. Teddy Rogers
    Teddy Rogers replied to jackyjask's topic in Site Bug Reports and Feedback
    @jackyjask I was meant to post this a few days ago, if you have not already noticed, IPS moved the "Code Block", to menu... Ted.
  34. Nooboy
    Nooboy replied to cipsi's topic in UnPackMe (.NET)
    1.dump 2.fix dump 3.ConfuserEx-Unpacker-v2.0 &Constants Decrypter 4.de4dot ConfuserEx-Unpacker-v2.0 prompts an error [$] Loading Module... [$] Loading References... [$] Detected: Confuser.Core 1.6.0+447341964f [$] Anti Tamper Detected [$] Anti Tamper Removed Successfully [$] Cleaned Control Flow on 272 Methods [$] Fixed proxy calls: 6749 [$] Removed proxy methods: 944 [$] Cleaned Control Flow on 2 Methods [$] Cleaned Control Flow on 2 Methods [$] Patched 5 Anti Invokes [$] Cleaned Control Flow on 2 Methods Error: Could not load file or assembly 'DEMO123456, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null'. This assembly was compiled for a different processor. at System.Reflection.RuntimeAssembly.nLoadImage(Byte[] rawAssembly, Byte[] rawSymbolStore, Evidence evidence, StackCrawlMark& stackMark, Boolean fIntrospection, Boolean fSkipIntegrityCheck, SecurityContextSource securityContextSource) at System.Reflection.Assembly.Load(Byte[] rawAssembly) at Unpacker.Core.Deobfuscators.Resource.ResourceDeobfuscator.Deobfuscate(UnpackerContext context) in D:\Documents\Visual Studio 2017\Projects\GitHub\ConfuserEx-Unpacker\Unpacker.Core\Deobfuscators\Resource\ResourceDeobfuscator.cs:line 40 at Unpacker.Core.UnpackerEngine.Run(UnpackerParameters parameters) in D:\Documents\Visual Studio 2017\Projects\GitHub\ConfuserEx-Unpacker\Unpacker.Core\UnpackerEngine.cs:line 38 Error: Object reference not set to an instance of an object. at Unpacker.Core.Utils.FindInstructionsNumber(MethodDef method, OpCode opCode, Object operand) in D:\Documents\Visual Studio 2017\Projects\GitHub\ConfuserEx-Unpacker\Unpacker.Core\Helpers\Utils.cs:line 33 at Unpacker.Core.Deobfuscators.AntiDebugDeobfuscator.Deobfuscate(UnpackerContext context) in D:\Documents\Visual Studio 2017\Projects\GitHub\ConfuserEx-Unpacker\Unpacker.Core\Deobfuscators\AntiDebugDeobfuscator.cs:line 18 at Unpacker.Core.UnpackerEngine.Run(UnpackerParameters parameters) in D:\Documents\Visual Studio 2017\Projects\GitHub\ConfuserEx-Unpacker\Unpacker.Core\UnpackerEngine.cs:line 38 [$] Removed 1 Attributes [$] Cleaning unused methods... [$] Writing Module... [$] Saving Module...
  35. r0ger
    r0ger replied to mudlord's topic in Programming and Coding
    hi all. i know this thread is like 13 years old but i am trying to call the DLL functions from nsf_player.dll but it's not working. does anyone can help me? i've used chatgpt to transform the C++ code into a MASM32 one but apparently it's not working. thanks! NSF_MASM32.rar
  36. Stuttered
    Stuttered commented on m!x0r's file in Tools & Utilities
    Run Dumpbin.exe /headers loader.exe to see dependency. Example output only: OPTIONAL HEADER VALUES 10B magic # (PE32) ... 4.00 operating system version 0.00 image version 6.00 subsystem version 0 Win32 version
  37. m!x0r
    m!x0r commented on m!x0r's file in Tools & Utilities
    New Version 0.9 Published Release Date: 06/09/2025 [+] New Checkbox in Options Form - Creat a Loader For Windows XP. Loader Details: [+] Loader Now Full Support Windows XP x32 and x64.
  38. m!x0r
    m!x0r commented on m!x0r's file in Tools & Utilities
    We will try to fix this issue next release.
  39. jackyjask
    jackyjask commented on m!x0r's file in Tools & Utilities
    OK, but there should be _winxp platform in the project settings AFAIR.... yes - >Visual Studio 2015 includes a toolset called v140_xp specifically for targeting Windows XP. and in the code #define WINVER 0x0501 #define _WIN32_WINNT 0x0501
  40. m!x0r
    m!x0r commented on m!x0r's file in Tools & Utilities
    The Loader was writen in VS 2015
  41. jackyjask
    jackyjask commented on m!x0r's file in Tools & Utilities
    what stops from running on winxp? using some modernt WinAPI I guess?
  42. m!x0r
    m!x0r commented on m!x0r's file in Tools & Utilities
    The GUI run on xp, Generate a loader I think work without problem, but generated loader does not support XP ! Only win 7 x32 x64, 8 x32 x64, 10 x32 x64, 11 x32 x64

Configure browser push notifications

Chrome (Android)
  1. Tap the lock icon next to the address bar.
  2. Tap Permissions → Notifications.
  3. Adjust your preference.
Chrome (Desktop)
  1. Click the padlock icon in the address bar.
  2. Select Site settings.
  3. Find Notifications and adjust your preference.