Tag: binary


Fud 100% services packages ready for sales

We offer a monthly Crypter service to make your files undetectable encrypted! this is how it works: You zip the files you want to encrypt and send them to our email then we will encrypt and make your files/file fud 100% (undetectable by any antivirus) and send them back to your email! We offer 3 packages: Standard Prenium Ultimate All those packages offer some unique futures to encrypt your file!  


Black Window 10 v2

  Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system…

BincatCode AnalysisIDA PluginIDA ProNEW TOOLS

Bincat – Binary Code Static Analyser, With IDA Integration

BinCAT is a static Binary Code Analysis Toolkit, designed to help reverse engineers, directly from IDA.It features:value analysis (registers and memory)taint analysistype reconstruction and propagationbackward and forward analysisuse-after-free and double-free detectionIn actionYou can check (an older version of) BinCAT in action here:Basic analysisUsing data taintingCheck the tutorial out to see the corresponding tasks.Quick FAQSupported host platforms:IDA plugin: all, version 6.9 or later (BinCAT uses PyQt, not PySide)analyzer (local or remote): Linux, Windows, macOS (maybe)Supported CPU for analysis (for now):x86-32ARMv7ARMv8PowerPCInstallationOnly IDA v6.9 or later (7…

AcousticEavesdropKbd-AudioMacMicrophone Audio CaptureNEW TOOLS

Kbd-Audio – Tools For Capturing And Analysing Keyboard Input Paired With Microphone Capture

This is a collection of command-line and GUI tools for capturing and analyzing audio data. The most interesting tool is called keytap - it can guess pressed keyboard keys only by analyzing the audio captured from the computer's microphone.Build instructionsDependencies:SDL2 - used to capture audio and to open GUI windows libsdlFFTW3 - some of the helper tools perform Fourier transformations fftwLinux and Mac OSgit clone kbd-audiogit submodule update --initmkdir build && cd buildcmake ..makeWindows(todo, PRs welcome)Toolsrecord-fullRecord audio to a raw binary file on…

ARMAssemblerDisassemblerELFEmulatorIntermediate RepresentationMiasmMIPSNEW TOOLSReverse EngineeringShellcodesSymbolic Execution

Miasm – Reverse Engineering Framework In Python

Miasm is a free and open source (GPLv2) reverse engineering framework. Miasm aims to analyze / modify / generate binary programs. Here is a non exhaustive list of features:Opening / modifying / generating PE / ELF 32 / 64 LE / BE using ElfesteemAssembling / Disassembling X86 / ARM / MIPS / SH4 / MSP430Representing assembly semantic using intermediate languageEmulating using JIT (dynamic code analysis, unpacking, ...)Expression simplification for automatic de-obfuscation...See the official blog for more examples and demos.Basic examplesAssembling / DisassemblingImport Miasm x86…

BIOSCommand LineGNUMCExtractorMicrocode Extraction ToolNEW TOOLSParameterReportingScan

MCExtractor – Intel, AMD, VIA & Freescale Microcode Extraction Tool

Intel, AMD, VIA & Freescale Microcode Extraction ToolMC Extractor News FeedMC Extractor Discussion TopicIntel, AMD & VIA CPU Microcode RepositoriesA. About MC ExtractorMC Extractor is a tool which parses Intel, AMD, VIA and Freescale processor microcode binaries. It can be used by end-users who are looking for all relevant microcode information such as CPUID, Platform, Version, Date, Release, Size, Checksum etc. It is capable of converting Intel microcode containers (dat, inc, h, txt) to binary images for BIOS integration, detecting new/unknown microcodes, checking microcode…

FindYaraIDA PluginIDA Python PluginNEW TOOLSScanYara

FindYara – IDA Python Plugin To Scan Binary With Yara Rules

Use this IDA python plugin to scan your binary with yara rules. All the yara rule matches will be listed with their offset so you can quickly hop to them!All credit for this plugin and the code goes to David Berard (@p0ly)This plugin is copied from David's excellent findcrypt-yara plugin. This plugin just extends his to use any yara rule.InstallationInstall yara-pythonUsing pip: pip install yara-pythonOther methods: to your IDA "plugins" directoryWatch the tutorial video!Yara Rules With IDA Pro">UsageLaunch the pluginThe plugin can…

ELFExploit DevelopmentGadgetsGDBNEW TOOLSPEDAROPRop Gadgets

PEDA – Python Exploit Development Assistance For GDB

PEDA - Python Exploit Development Assistance for GDBKey Features:Enhance the display of gdb: colorize and display disassembly codes, registers, memory information during debugging.Add commands to support debugging and exploit development (for a full list of commands use peda help):aslr -- Show/set ASLR setting of GDBchecksec -- Check for various security options of binarydumpargs -- Display arguments passed to a function when stopped at a call instructiondumprop -- Dump all ROP gadgets in specific memory rangeelfheader -- Get headers information from debugged ELF fileelfsymbol --…

Anti-DebuggingAPI TraceBSDC++DrltraceMalware AnalysisMalware DetectionNEW TOOLSPackersProcessesReverse EngineeringYara

Drltrace – A Library Calls Tracer For Windows And Linux Applications

Drltrace is a dynamic API calls tracer for Windows and Linux applications designed primarily for malware analysis. Drltrace is built on top of DynamoRIO dynamic binary instrumentation framework. The release build can be downloaded here.UsageThe usage of drltrace is very simple. A user needs to specify a log directory and a name of a target process in the following way:drltrace -logdir . -- calc.exeThat’s all, the tool will inject required DLLs in the target process, starts instrumentation and in parallel will log information about…

Command LineCommand Line ToolHex dumpNEW TOOLSR0AkSecurity ToolsWindows10

R0Ak (The Ring 0 Army Knife) – A Command Line Utility To Read/Write/Execute Ring Zero On For Windows 10 Systems

r0ak is a Windows command-line utility that enables you to easily read, write, and execute kernel-mode code (with some limitations) from the command prompt, without requiring anything else other than Administrator privileges.Quick Peekr0ak v1.0.0 -- Ring 0 Army Knife (c) 2018 Alex Ionescu [@aionescu]: r0ak.exe [--execute <Address | module.ext!function> <Argument>] [--write <Address | module.ext!function> <Value>] [--read <Address | module.ext!function> <Size>]IntroductionMotivationThe Windows kernel is a rich environment in which hundreds of drivers execute on a typical system, and where thousands of variables containing global state…

JavaScriptMacNEW TOOLSParameterVimVim.WasmWasm

Vim.Wasm – Vim Editor Ported To WebAssembly

This project is an experimental fork of Vim editor by @rhysd to compile it into WebAssembly using emscripten and binaryen.Try it with your browserNOTICESPlease access from a desktop browser (Chrome/Firefox/Safari/Edge). Safari seems the best on macOS.Please avoid slow networks. Your browser will fetch total of around 1MB files.vim.wasm takes key inputs from DOM keydown event. Please disable your browser extensions which affect key inputs (incognito mode would be the best).This project is very early phase of experiment. Currently only tiny features are supported. More…