Search the Community

Showing results for tags 'code'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin
  • Null3D's Nulled Group

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 345 results

  1. A tool for generating fake code signing certificates or signing real ones. A tool which creates a spoof code signing certificates and sign binaries and DLL files to help evade EDR products and avoid MSS and sock scruitney. LimeLighter can also use valid code signing certificates to sign files. Limelighter can use a fully qualified domain name such as acme.com. [hide][Hidden Content]]
  2. Nikoxx99

    Twitch source code leaks

    Someone have the torrent for the Twitch Source code leaked in recent days?
  3. APK Lab The ultimate Android RE experience right inside your VS Code. APKLab seamlessly integrates the best open-source tools: Apktool, Jadx, uber-apk-signer, and more to the excellent VS Code so you can focus on app analysis and get it done without leaving the IDE. Features Decode all the resources from an APK Disassemble the APK to Dalvik bytecode aka Smali Decompile the APK to Java source Analyze & Hack effectively with feature-rich VS Code Build an APK from Smali and resources Sign the APK seamlessly during the build Install the APK directly from VS Code Support for Apktool-style projects (apktool.yml) Support for most Apktool CLI arguments Android resource frameworks management (Coming soon!) Support for user-provided keystore for APK signing Download and configure missing dependencies Excellent Smali language support with Smalise Supports Linux, Windows, and Mac Changelog v1.5 Added apktool updated to v2.6.0 apk-mitm updated to v1.1.0 feat: auto update check for tools on startup (dev) use yarn instead of npm (ci) auto publish release on tag (ci) use yarn cache for faster builds (ci) migrate to nodejs v14 Fixed fixed some bug/warning (dev) updated other dependencies [hide][Hidden Content]]
  4. Malicious docx generator to exploit CVE-2021-40444 (Microsoft Office Word Remote Code Execution) Creation of this Script is based on some reverse engineering over the sample used in-the-wild: 938545f7bbe40738908a95da8cdeabb2a11ce2ca36b0f6a74deda9378d380a52 (docx file) You need to install lcab first (sudo apt-get install lcab) Check REPRODUCE.md for manual reproduce steps If your generated cab is not working, try pointing out exploit.html URL to calc.cab Finally try the docx in a Windows Virtual Machine: [hide][Hidden Content]]
  5. Karta - source code assisted fast binary matching plugin for IDA. [hide][Hidden Content]]
  6. Obfuscation Detection Automatically detect obfuscated code and other state machines Scripts to automatically detect obfuscated code and state machines in binaries. Implementation is based on IDA 7.4+ (Python3). Check out the following blog posts for more information on the Binary Ninja implementation: Automated Detection of Control-flow Flattening Automated Detection of Obfuscated Code Referenced Repository Note: Due to the recursive nature of plotting a dominator tree of every found function within the binary, the implementation and runtime overhead is expensive. As such, the flattening heuristic is omitted when the binary loaded has more than 50 functions. Functions will be skipped if the ctree structure is too large (more than 50 nodes) to prevent crashes. Changelog v1.5 GUI Features: QTable Heuristic result view Node limiting Single/All function heuristic search Heuristic result export Heuristic Features: Control-Flow Flattening Cyclomatic Complexity Basic Block Size Instruction Overlapping [hide][Hidden Content]]
  7. Leaked source code of the babuk ransomware by VXUG Use For Educational Purposes Only [Hidden Content]
  8. [hide][Hidden Content]]
  9. Obfuscation Detection Automatically detect obfuscated code and other state machines Scripts to automatically detect obfuscated code and state machines in binaries. obfDetect v1.4 Heuristic Features: Control-Flow Flattening Cyclomatic Complexity Basic Block Size Instruction Overlapping [hide][Hidden Content]]
  10. Burpcrypto is a collection of burpsuite encryption plug-ins, supporting AES/RSA/DES/ExecJs(execute JS encryption code in burpsuite). Usage Add this jar to your burpsuite’s Extensions. Switch to the BurpCrypto tab, select you to need the Cipher tab. Set key or some value. Press “Add processor”, and give a name for this processor. Switch to Intruder->Payloads->Payload Processing. Press “Add”, select “Invoke Burp extension”, and the select processor you just created. Press “Start attack”, have fun! Key Example Aes Key(UTF8String): abcdefgabcdefg12 Aes IV(UTF8String): abcdefgabcdefg12 Rsa X509 Key: MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCC0hrRIjb3noDWNtbDpANbjt5Iwu2NFeDwU16Ec87ToqeoIm2KI+cOs81JP9aTDk/jkAlU97mN8wZkEMDr5utAZtMVht7GLX33Wx9XjqxUsDfsGkqNL8dXJklWDu9Zh80Ui2Ug+340d5dZtKtd+nv09QZqGjdnSp9PTfFDBY133QIDAQAB Rsa Modulus: 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 Rsa Exponent: 010001 Changelog v0.1.9 Fix JS editor can’t activate. add htmlunit JS engine. add jre built-in JS engine. add JS engine switcher. [hide][Hidden Content]]
  11. You’ve used GitHub. Maybe you’ve established your own workflow. How much do you know about the broader possibilities, though? Test your skills and find new options through this set of challenges. Instructor Ray Villalobos presents a series of brief challenges centered around building a basic app, from making a copy of an existing repo with an empty history to deploying static sites and apps using GitHub. This course aims not only to develop your skills in GitHub, but also to show you some tricks of the trade that you can use every day. [Hidden Content] [hide][Hidden Content]]
  12. CawkVM Virtualization [hide][Hidden Content]]
  13. itsMe

    (BIM) Hide Link And Code 3.1.0

    Added version for IPS 4.5 [Hidden Content] [hide][Hidden Content]]
  14. Overview Lighthouse is a powerful code coverage explorer for IDA Pro and Binary Ninja, providing software researchers with uniquely interactive controls to study execution maps for native applications without requiring symbols or source. This project placed 2nd in IDA's 2017 Plug-In Contest and was later nominated in the 2021 Pwnie Awards for its contributions to the security research industry. Special thanks to @0vercl0k for the inspiration. [hide][Hidden Content]]
  15. HyperDbg is now available for tests! Please test it and provide us with your valueable feedback and possible bugs. HyperDbg Debugger is an open-source, community-driven, hypervisor-assisted, user-mode and kernel-mode Windows debugger with a focus on using modern hardware technologies. It is a debugger designed for analyzing, fuzzing and reversing. Follow HyperDbg on Twitter to get notified about new releases ! Description HyperDbg is designed with a focus on using modern hardware technologies to provide new features to the reverse engineering world. It operates on top of Windows by virtualizing an already running system using Intel VT-x and Intel PT. This debugger aims not to use any APIs and software debugging mechanisms, but instead, it uses Second Layer Page Table (a.k.a. Extended Page Table or EPT) extensively to monitor both kernel and user executions. Unique Features First Release (v0.1.0.0) Classic EPT Hook (Hidden Breakpoint) [link][link] Inline EPT Hook (Inline Hook) [link][link] Monitor Memory For R/W (Emulating Hardware Debug Registers Without Limitation) [link][link] SYSCALL Hook (Disable EFER & Handle #UD) [link][link] SYSRET Hook (Disable EFER & Handle #UD) [link][link] CPUID Hook & Monitor [link] RDMSR Hook & Monitor [link] WRMSR Hook & Monitor [link] RDTSC/RDTSCP Hook & Monitor [link] RDPMC Hook & Monitor [link] VMCALL Hook & Monitor [link] Debug Registers Hook & Monitor [link] I/O Port (In Instruction) Hook & Monitor [link] I/O Port (Out Instruction) Hook & Monitor [link] MMIO Monitor Exception (IDT < 32) Monitor [link][link] External-Interrupt (IDT > 32) Monitor [link][link] Running Automated Scripts [link] Transparent-mode (Anti-debugging and Anti-hypervisor Resistance) [link][link] Running Custom Assembly In Both VMX-root, VMX non-root (Kernel & User) [link] Checking For Custom Conditions [link][link] VMX-root Compatible Message Tracing [link] Powerful Kernel Side Scripting Engine [link][link] Support To Symbols (Parsing PDB Files) [link][link] Event Forwarding (#DFIR) [link][link] Transparent Breakpoint Handler Various Custom Scripts [link] [hide][Hidden Content]]
  16. itsMe

    VirusMaker Source Code

    [hide][Hidden Content]]
  17. [Hidden Content]
  18. [Hidden Content]
  19. PageTableInjection Code Injection, Inject malicious payload via pagetables pml4. Introduction This is just a proof-of-concept of the page table injection technique to inject malicious code into the arbitrary user processes. On Windows(and some modern OSes), every process has a its PML4 a.k.a Directory Table Base. Thus the process A cannot access process B without APIs. but how about if we can inject arbitrary PML4 entry? of course, the PML4 entry will point to the corresponding physical address of entries, PDP, PD, and PT as exactly the same as the backing process. In order to inject malicious PML4 entry to the target process, we need to have an actual resident page (physical memory) that backing the malicious PML4 entry. Thus literally the resident page must be a resident, otherwise, the system will crash or would become unstable, because, during the MMU translating to the physical address, there is nothing that MMU expects, as well as there is nothing the windows memory manager has nothing expects. Let’s look at the both backing process and target process buffers. In this case, the buffers are: Backing Process VA: 0x1A45F810000 Deployment Process Injected VA: 0x6EA45F810000 Before step to the next, some of you may think that the 2nd address(0x6EA45F810000) looks weird like usually, we allocated buffer via malloc or VirtualAlloc, the virtual address should look like 0x17C7CAC0000 0x23BE9D80000 0x19FE76F0000 or some sort of these. it’s because the malicious PML4 entry is not involved to the memory manager of windows, and is not managed as well. of course every virtual address on Windows 64-bit process could possibly have any value within a range of user memory range. So if we look into both addresses… [hide][Hidden Content]]
  20. Satoshi box ~ Sell your digital content for bitcoins [Hidden Content]
  21. [hide][Hidden Content]]
  22. Python Obfuscator for FUD Python Code. Obfuscation Method List Obfustucators ( * = May cause Syntax Errors ) -=============- 0 /one_line/hex 1 /one_line/base64 2 /one_line/base32 3 /one_line/gunzip* 4 /one_line/rot13* 5 /cmd/command 6 /cmd/powershell 7 /cmd/powershellhidden [hide][Hidden Content]]
  23. this script will scan your code the script can find check_file_upload issues host_header_injection SQl injection insecure deserialization open_redirect SSRF XSS LFI command_injection features fast simple report [hide][Hidden Content]]
  24. Full Orcus 1.9.1 Source Code [hide][Hidden Content]]
  25. APK Lab The ultimate Android RE experience right inside your VS Code. APKLab seamlessly integrates the best open-source tools: Apktool, Jadx, uber-apk-signer, and more to the excellent VS Code so you can focus on app analysis and get it done without leaving the IDE. Features Decode all the resources from an APK Disassemble the APK to Dalvik bytecode aka Smali Decompile the APK to Java source Analyze & Hack effectively with feature-rich VS Code Build an APK from Smali and resources Sign the APK seamlessly during the build Install the APK directly from VS Code Support for Apktool-style projects (apktool.yml) Support for most Apktool CLI arguments Android resource frameworks management (Coming soon!) Support for user-provided keystore for APK signing Download and configure missing dependencies Excellent Smali language support with Smalise Supports Linux, Windows, and Mac Changelog v1.4 Added apk-mitm updated to v0.12.0 New GitHub Org and website Add ‘show inconsistent code’ arg to jadx (#127) (thanks @psolyca) Add deobfuscation args to jadx (#117) (thanks @psolyca) Fixed show quark analysis report on project open (#121) use common process executor for quark analysis (#125) refactor project src dir structure (#122) dep: bump dependencies (#128) CI: fix Quark analysis tests (#126) [hide][Hidden Content]]