Jump to content
Tuts 4 You

Leaderboard

  1. Teerayoot

    Teerayoot

    Junior+


    • Points

      8

    • Posts

      22


  2. jackyjask

    jackyjask

    Full Member+


    • Points

      7

    • Posts

      1,273


  3. 4n0nym0us

    4n0nym0us

    Junior


    • Points

      6

    • Posts

      5


  4. lovejoy226

    lovejoy226

    Full Member+


    • Points

      3

    • Posts

      1,320


Popular Content

Showing content with the highest reputation since 04/01/2024 in File Comments

  1. 4n4lDetector 3.0.0 Download: https://github.com/4n0nym0us/4n4lDetector/releases/tag/v3.0 [+] The function search code for "Import Table" and "Call Api By Name" has been optimized. [+] A general optimization has been performed with one of the largest buffers in memory, this positively affects the stability and speed of the general analysis. [+] The size of the file to be analyzed has been increased by default to 50MB. [+] An optimization has been made in the search engine for the "Show Offsets" option and in the handling of buffers. [+] Searches for generic malware terms, different types of exploitation, APTs and terminologies that may affect the State in "4n4l.Rules" have been included. [+] A cleaning of null bytes 0x00 is performed in the variable where the report is stored to avoid bugs in the output of the text box of the main form. [+] The tool interface takes on a darker base tone. [+] A donation button via (PAYPAL) has been included since I have finally decided to continue with the project publicly for everyone. [+] A bug was fixed in which false functions could be included in the "Export Table" list by carving. [+] The Interest's Words module includes new internal words for the tool, for ansi and unicode. [+] A bug in the web view was fixed that could aesthetically affect the view of the Interest's Words module statement. [+] Optimizations were made in the Known IP/Domains module for ansi and unicode. [+] New search syntaxes were included in the "Intelligent Strings" module to increase interesting results. -> Internal cleanup syntaxes were added to show more stylized results. -> An optimization has been made with a direct impact on the variables used in this module. [+] A more selective cleaning of the extracted URLs is performed: -> URLs with extensions in the context of PKI digital certificates are reconstructed. -> Htm extensions are reconstructed. -> ".com" domain endings are cleaned. -> Possible HTML code cleaning is performed. [+] A progression system based on medals has been included. -> Brown Padawan Medal, Bronze Medal, Silver Medal, Gold Medal and Platinum Medal. -> The process can be slow, don't despair... because it's worth it. -> These medals will be earned as you use the tool over the course of days, weeks, months and consequently their functionality will also increase progressively. -> The medals will only work on the work machine on which they have been earned, if you want to make it work on another machine of yours try it yourself (You're a hacker, right?). -> The features or surprises that come with leveling up are not included in this file, although you can review them in the "Settings" section of the tool.
    3 points
  2. release 1.42 +support x86 injection(LdrLoadDll) +fix bug(load patch file) Remote Process Injector1.42.rar
    2 points
  3. 0.0.8.7 Beta II ExeinfoPe_0087_Beta_II.zip
    2 points
  4. @4n0nym0us have you tried updating and attaching the latest file here? Ted.
    2 points
  5. 4n4lDetector 2.9.0 Download: https://github.com/4n0nym0us/4n4lDetector/releases/tag/v2.9 [+] New logo of the application by Sandra Badia Gimeno (www.sandrabadia.com). [+] Relocated Kernel-mode functions to the Suspicious Functions section. [+] Surprises are included so you don't get bored with daily use of the tool. [+] A multitude of tests were carried out focused on providing the greatest stability, speed and effectiveness of the extracted contents. [+] Optimization during idle state. File creation checks are no longer performed for the PECarve and UPX functionalities. [+] Detection of sections that allow writing from flags was included. [+] The extraction of functions from the "Export Table" using Carving has been slightly improved. [+] The name of the file under analysis has been included in the content of the report. [+] Added a longer description about the possibilities of the Zombie_AddRef function. [+] Fixed a bug where the "Show Offsets" tool dump did not allow reading a small portion of the end of the analyzed file. [+] Now when you click on the Virustotal result in the main form, it will take us to the analysis web page. [+] Virustotal analysis has been included in the analyzes carried out from console mode. [+] Review of Shikata_ga_nai detections and update of Payload detection heuristics. [+] Increased and improved the query extraction functionality of the ASCII and UNICODE records branch. [+] Increased and improved the ASCII and UNICODE SQL query extraction functionality. [+] Increased and improved URL extraction functionality, also searches FTP and SFTP in ASCII and UNICODE. [+] Increased and improved ASCII and UNICODE file name extraction functionality. -> .EXE, .DLL, .BAT, .VBS, .VBE, .JSE, .WSF, .WSH, .PS1, .PSM1, .PSC1, .SCR, .HTA, .DLL, .PIF, .MSI , .MSP, .SYS, .CPL, .JAR, .TXT, .INI, .PDF, .WDS, .DOC [+] The word finder has been completely delimited for any search location of the text boxes. -> In web view the browser is now automatically blocked. [+] Fixed a rare error in the IPs section that could lead the execution thread to a loop without finishing analyzing the files. -> This fix also fixed the ability to end analysis with a single active option in the tool's modules panel. [+] The 4n4l.rules module now internally converts text format rules "T:" to Unicode format. -> The rules of this file have been optimized, now search more with less. [+] The bytes to be reviewed at the Entry Point by the rules file are increased from 100 to 1500. -> Revised some of the rules to eliminate false positives after the update. [+] The reading of the rule files is done only once after starting the application or after the first analysis, then it is loaded into memory for future uses. -> The charging status can be checked from the "Settings" section. [+] Added the tilde (~), the dollar ($), the single quote (') and the double quote (") as characters that can be part of the reports. -> A conversion filter is applied to these quotes for the tool's Web view. [+] Worked on the efficiency of the "Intelligent Strings" module. -> The length of strings to be analyzed was increased in all the Strings functionalities of the tool (75% longer strings). -> Specific cleanup of anomalous characters is now performed and new ones are allowed. -> Search words were extended. [+] Added a graph in charge of displaying the content of the executables and any analyzed files. -> The executable header is displayed in blue. -> The identified sections are divided between magenta for the executable sections and black for the rest. -> The excess code of the executables will have a red color as in Crypters, Binders, Joiners... -> If the analyzed section contains an RSize of zero, its content will not be painted on the graph. -> If the file is not a Windows executable, it will be scanned for printable characters and the absence of printable characters. Blue and black when there is no content. -> When you double click on the graph, it will automatically be saved in the analysis folder. -> The executions measure the console mode of the application "-TXT", "-HTML" or "-GREMOVE" include the graph as analysis output.
    2 points
  6. Excellent work. baby malibu
    2 points
  7. This thing helped me to play Joker's exe (packaged swf) https://github.com/Aira-Sakuranomiya/CleanFlashInstaller/releases
    2 points
  8. Yes, you need to install trillix swf decompiler. https://cdn.eltima.com/download/flash_decompiler.exe Regards. sean.
    2 points
  9. Since flash is killed and lena151 tuts are in flash here is quick help to open the files https://drive.google.com/drive/folders/1lmqCzf2vNoddp70wrWBKS_GS7iPLD-RN?usp=sharing
    2 points
  10. 1.43 +fix pass command line in Manual Map option. +check old byte before patch (1337 file) +detect x86 or x64 file image if not same exe will crash. Remote Process Injector1.43.zip
    1 point
  11. 1 point
  12. I released new version to 1.4 +dlll manual map +random tittle name .Remote Process Injector1.4.zip
    1 point
  13. This prog allow code to execute at main exe entry point. I suspect others load dll that dll not get execute first. Also others maybe free x86 not x64 .
    1 point
  14. Dll contain your own written for anything such as hooking ,access memory that this prog load and pause at EP(entry point) allow code in dll exec first. 1337 file path(x64dbg patch file) get call at patch accordingly after code inside get call.
    1 point
  15. https://superjacksoftware.com/f/viewtopic.php?p=11#p11 1.2 +hide dll from target process version 1.32 +load x64dbg patch file
    1 point
  16. 0.0.8.8 (25.01.2025) 1209 + 181 signatures x64 Ext_detector - v7.4.7 ( 747 non exe signatures ) external signatures : userdb.txt : 4462 Whats new: added .NET GUI auto click on .NET 4 / 6 detector added .PYD x86 v2.x 3.x / x64 v3.x version detector fixed cpu version detector added added [ generic - CPU : 0x01C4 ARMv7 ] for : GO Programming Language Compiler added x86 only : [ plugin : Photoshop plugin ] fix 5005. x64 Microsoft Visual C++ v14.20 - 2008 [ RT_CODE ] - DLL added to .pdb - NOT EXE - .IDB Microsoft Developer intermediate added .zlib ripper fixed - Zlib - false Alarm - skipped ( now ripp more files ) - fixed for Android backup : fullbackup.ab added .zlib added ripper for zlib v2 - if Fast scan off option in Config (example : installer LLC SysDev Laboratories ) added detector NOT EXE - .zlib v2 files added dll detector - XerinVM.Runtime v1.0 2024 small fixed XerinFuscator v1.0 - 3.0 , XFUSCATOR 1.0.0.4 added x64 [ NSTD section packed data/vmp ] - stub : x64 Microsoft Visual C++ v14.28 fixed added h265 - NOT EXE - .mp4/m4v ( MPEG-4 ) Buffor for exe set to : 380 MB overlay - scan deeper for 7zip , zip , ect... fixed x64 VMProtect fixed MS C++ detector for VMProtect SDK used x86/x64 Header GUI - added DBG string text label added runtime detector for x86/x64 - [ dotNet Protector Runtime PvLog ] added [ VMProtect SDK used ] Borland Delphi 2009-2010 - borland.com added .NET GUI BSJB button https://github.com/ExeinfoASL/ASL/releases/download/v0.0.8.8/exeinfope.zip
    1 point
  17. I did I dont even get as far as to try to exctract it.
    1 point
  18. Try using the PW include in the archive name.
    1 point
  19. Downloading the files I cant open them, it always returns checksum error.
    1 point
  20. 1 point
  21. Any one success unpack example notepad.exe Sentinel Hardware Key 7.5.0.rar
    1 point
  22. 1 point
  23. dont really always comment but THANK YOU SOOOOOOOOOO MUCH
    1 point
  24. Exeinfo PE 0.0.8.6 Exeinfo PE 0.0.8.6.zip
    1 point
  25. Alice thanks the author - an excellent collection♥️ nice
    1 point
  26. this is not a video ARTeam.esfv can be opened in the ARTeamESFVChecker to verify all files have been released by ARTeam and are unaltered.
    1 point
  27. But there is not unpacker solution only packed exe sample file, how to unpack it please help me.
    1 point
  28. Great. Thank you for sharing this tutorial.
    1 point
  29. Thank you very for this big sharing
    1 point
  30. I have uploaded the new version to the web.
    1 point
  31. This is absolute gold. Much better than the official docs.. This is now on the Microsoft website here: Part 1 Part 2
    1 point
  32. 1 point
  33. yeah, smth is not good maybe it works only on Win XP? its 20 years old... this is all I see - does not start to play
    1 point
  34. EDIT: Hello @jackyjask, now when you click on download you can select both v8.3 and v8.4. Enjoy!
    1 point
  35. Download from here: https://down.52pojie.cn/Tools/Patchers/
    1 point
  36. @Teddy Rogers Many thanks for sharing it. Regards. sean.
    1 point
  37. Thanks any unpacker list available?
    1 point
  38. thank you very much for this post this exellent
    1 point
  39. thank you very much for this post this exellent
    1 point
  40. 1 point
  41. 1 point
×
×
  • Create New...