• Content Count

  • Avg. Content Per Day

  • Joined

  • Last visited

Community Reputation

71 Excellent

About labyrinthos

  • Rank
  • Birthday 07/08/1992


  • Location


  • Interests
    Studying Computer Knowledge


  • Occupation
    estudiante universitario

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. labyrinthos

    Android MultiTool 3.5.9

    Requirements: Winows OS XP / 7 / 8 / 8.1 / 10 Installed Java on Windows Installed Microsoft Powerpacks Installed .NET framework - Easy handling: Select your apk and push the "decompile" button! - This tool makes modding much faster and easier, no cmd handling any more. - You can read the log which is integrated in the tool to find your mistake in the error. - ADB inside: Push files into your file system with a few clicks How to use this tool? Follow this small how to! Here you go.. Well, first extract the AndroidMultitool folder to C:\. Otherwise it probably won´t work -copy your framework-res.apk in the Framework-Files folder and other files you want to mod in the "Files" folder (this folder is for all your files you want to mod, don't pick files from any other location) -Next you have to start AndroidMultitool.exe -select your framework-res.apk and push the "install" button (check log for errors) Decompiling and recompiling apk files: -select the apk you want to mod/decompile and push the "decompile" button (check log for errors) Note: You can check the "use baksmali" checkbox, then e.g. the useless .line text will be removed -your decompiled apk will be located in C:\AndroidMultitool\Decompiled_apk"apkname" as a folder -if you want to compile your apk again, select your decompiled folder, check the "apk" radio button and compile it again (check log for errors) -your recompiled apk will be located in C:\AndroidMultitool\Compiled_apk"apkname" Decompiling and recompiling jar files: -select in the combobox ".jar" (check the "use baksmali" checkbox for deleting the useless .line comments) -select the ".jar" file you want to mod -push the "decompile" button -your decompiled jar file will be locaten in C:\AndroidMultitool\Decompiled_jar"jarname" -for recompiling you have to check the "jar" radiobutton and select the folder within your decompiled ".jar" file -push the compile button -your compiled jar file will be located in C:\AndroidMultitool\Compiled_jar"jarname"\classes. dex -delete the "classes.dex" file in your ".jar" file -copy the new "classes.dex" file you compiled in the ".jar" file Signing apk files: -select the ".apk" you want to sign -push the "sign" button -the signed apk file is located in C:\AndroidMultitool\Signed_apk"apkname_signed" Using tags: You want to decompile many files from different devices or different android versions / frameworks? Tagging makes it possible! - before installing your framework type in any tag (like "hero") - then install your framework and work normally Android Debug Bridge You want to push files with adb to your device? Follow these instructions: Please klick on the "advanced" register in the tool -push "check" to control if your device is ready -if the device is not ready please follow the instructions, which are listed in the tool (device offline, no device...) -if the device is ready, choose a file you want to push -choose a path on the device, where the file should be placed later -push the "push" Button -alternately: press "Reboot device" to reboot your device and to let changes take effect If there are any questions or bugs, please post them in the thread. [HIDE-THANKS][Hidden Content]]
  2. labyrinthos

    Convanter the server to what you want

    Re: Convanter the server to what you want Just change file extentions..
  3. labyrinthos

    Reporten Links Caidos (Importante)

    Re: Reporten Links Caidos (Importante) [Hidden Content] Activator Link Broken
  4. Hi everyone ! I have a one problem. I want change Imagebase linker option in Dev-C++ But, I can't found it. :(
  5. By using some of the functions in the Win32 API, it is intended to inform a convenient technique that can be used to run the machine code of the byte array directly. Of course, in a general programming, but you do not need to run the machine language code directly, in the high-speed processing programming and system development, it is necessary elements almost mandatory. :D The following is a sample to get the kernel address of IDT table that contains the address of x86 Interrupt handler by executing the SIDT instruction. SIDT (Store IDTR to Memory) command, because it is a command that can be executed in Ring3 (user mode), is that it works correctly. >[HIDE-THANKS]Option Explicit Private Declare Sub RtlMoveMemory Lib "kernel32.dll" ( _ ByRef Destination As Any, _ ByRef Source As Any, _ ByVal Length As Long _ ) Private Declare Function VirtualProtect Lib "kernel32.dll" ( _ ByRef lpAddress As Any, _ ByVal dwSize As Long, _ ByVal flNewProtect As Long, _ ByRef lpflOldProtect As Long _ ) As Long Private Declare Function ExecuteCode Lib "user32.dll" Alias "CallWindowProcA" ( _ ByVal AddressOfCode As Any, _ ByVal Param1 As Any, _ ByVal Param2 As Any, _ ByVal Param3 As Any, _ ByVal Param4 As Any _ ) As Long Private Type X86_IDTR intArray(0 To 3) As Integer ' ### intArray(0): Limit (Number of Interrupt) ' ### intArray(1): BaseLow (The lower 16 bits of the IDT address) ' ### intArray(2): BaseHigh (The upper 16 bits of the IDT address) ' ### intArray(3): for Padding End Type Private Const PAGE_EXECUTE_READWRITE& = &H40& ' ### read/write/execute Private Sub Form_Load() Dim CodeMemory() As Byte, CurPos As Long, idtr As X86_IDTR, IDTBase As Long ' ### Input the Machine code. PushByteCode CodeMemory(), CurPos, "8B7C2404" ' ### MOV EDI, [ESP+4h] ' ### ( Save the first argument to the EDI register ) PushByteCode CodeMemory(), CurPos, "0F010F" ' ### SIDT [EDI] ' ### (Save the value of IDTR register in memory pointed to by the EDI register ) PushByteCode CodeMemory(), CurPos, "C21000" ' ### RETN 10h ' ### ( Return function ) VirtualProtect CodeMemory(0), UBound(CodeMemory) + 1&, PAGE_EXECUTE_READWRITE, 0& ' ### Execute Machine code in memory using CallWindowProc API ExecuteCode VarPtr(CodeMemory(0)), VarPtr(idtr), 0&, 0&, 0& ' ### The output Base address. RtlMoveMemory IDTBase, idtr.intArray(1), 4& MsgBox "IDT Base Address = 0x" & Hex$(IDTBase) End Sub ' ### Sub procedure to add the byte code into an array Public Sub PushByteCode(ByRef CodeMemory() As Byte, _ ByRef Position As Long, _ ByRef HexaString As String) Dim ByteLen As Long, Code() As Byte ByteLen = Len(HexaString) \ 2 If ByteLen Then Dim i As Long ReDim Preserve CodeMemory(Position + ByteLen - 1) ReDim Code(ByteLen - 1) For i = 0 To UBound(Code) Code(i) = CByte("&H" & Mid$(HexaString, i * 2 + 1, 2)) Next RtlMoveMemory CodeMemory(Position), Code(0), ByteLen Position = Position + ByteLen End If End Sub[/HIDE-THANKS]
  6. It Use internel Memory who MSVBVM60.DLL not apply at VBFormController. if apply it I think it will be strong. >Option Explicit Private Declare Function GetModuleHandle Lib "kernel32.dll" Alias "GetModuleHandleA" (ByVal lpModuleName As String) As Long Private Declare Function GetProcAddress Lib "kernel32.dll" (ByVal hModule As Long, ByVal lpProcName As String) As Long Private Declare Sub RtlMoveMemory Lib "kernel32.dll" ( _ ByRef Destination As Any, _ ByRef Source As Any, _ ByVal Length As Long _ ) Sub Test() Dim lpAddr As Long, buf(0 To 3) As Byte lpAddr = GetVB6HeaderAddr If lpAddr Then ' ### return 0& IDE Mode. RtlMoveMemory buf(0), ByVal lpAddr, 4& MsgBox "0x" & Hex$(lpAddr) & ": " & StrConv(buf, vbUnicode) End If End Sub Public Function GetVB6HeaderAddr() As Long Dim lpProc As Long, buf(0 To 99) As Byte, i As Long, tmp As Long lpProc = GetProcAddress(GetModuleHandle("MSVBVM60.DLL"), "ThunRTMain") RtlMoveMemory buf(0), ByVal lpProc, 100& For i = 0 To UBound(buf) - 6 If buf(i) = &HBE Then If buf(i + 5) = &H8B Then If buf(i + 6) = &HCE Then RtlMoveMemory tmp, buf(i + 1), 4& Exit For End If End If End If Next If tmp Then RtlMoveMemory tmp, ByVal tmp + &H120&, 4& GetVB6HeaderAddr = tmp End If End Function
  7. labyrinthos

    Reporten Links Caidos (Importante)

    Re: Reporten Links Caidos (Importante) [Hidden Content] Link down.. :(
  8. labyrinthos

    Simple Crackme C #2

    Re: Simple Crackme C #2 done :)
  9. labyrinthos

    Stub Gen v3 by fudmario

    Re: Stub Gen v3 by fudmario Masterpiece. :)
  10. labyrinthos

    C & C++ Sources Collection : crypter, rats, bots...

    Re: C & C++ Sources Collection : crypter, rats, bots... Depositfiles is still alive ...
  11. labyrinthos

    Jesi BitCoin Miner (Builder) Cracked

    Re: Jesi BitCoin Miner (Builder) Cracked Hum, I analyze bot file in Sandbox with BSAnalyzer. bot file connect only at Report(one part): connect( [c:\program files\java\jre7\bin\javaw.exe]
  12. labyrinthos

    PHP Injecti0n AutoShell Uploader V1.2 + Video

    Re: PHP Injecti0n AutoShell Uploader V1.2 + Video You must not thanks in post. Read Forum Rules. [Hidden Content].
  13. labyrinthos

    M3 AutoIt BotNet v1 By: M3

    Re: M3 AutoIt BotNet v1 By: M3 M3 is greate codder ..... I see coded autoIt botnet first !
  14. labyrinthos

    IDA Pro Advanced 6.1 Full + Hex-Rays 1.5

    included: IDA Pro is reversing tool like ollydbg Hex-Rays 1.5 is decompile plugin for IDA Pro Download(128MB): >[Hidden Content]
  15. labyrinthos

    Crack Android Application

    Created by C0M3ND4D0R This tutorial is included simple android application craking process. Enjoy :) >[url="[Hidden Content]]