Search the Community
Showing results for tags 'runtime'.
-
Crypter dEEpEst v25 (6/26) - [C++ RunTime Update 11/02/2021] Download: [hide][Hidden Content]] Password: Only for Users PRIV8 for private message
-
Crypter dEEpEst v24 (9/21) - [C++ RunTime Update 28/01/2021] Despues de perder todo el disco y todo el trabajo me a sido dificil retomar este crypter, en las proximas actualizaciones intentare bajar las detecciones. Download: [Hidden Content] Password: Only Users PRIV8
-
Crypter dEEpEst v23 (6/36) - [C++ RunTime Update 13/11/2020] Scan result: This file was detected by 6 / 40 engines File name: Stub.exe File size: 117 KB Analysis date: 2020-11-12 | 12:16:07 CRC32: 70c707cf MD5: fb87b0ac3b55c0413facb18ff9ccb4cf SHA-1: 0c9a16dce1c6b7bbf3a01cac7ab22500ddd6b425 SHA-2: af8ea924c7bb40c07630825e8602ea14fac0069f5e9a5fe069c4a61d1d233ff6 SSDEEP: 1536:be1Tl71RPU38azdZKPigH5C0Om1IphBhEHH:b0lRVazdZVdm1IphBhS [Hidden Content] AdAware Undetected Amiti Undetected Arcabit Undetected Avast Undetected AVG Undetected Avira HEUR/AGEN.1127758 Bitdefender Undetected Bullguard Undetected ClamAV Undetected Comodo Undetected Comodo Linux Undetected DrWeb Trojan.PWS.Maria.3 Emsisoft Undetected eScan Undetected F-Prot Undetected F-Secure Heuristic.HEUR/AGEN.1127758 G Data Undetected IKARUS Undetected Immunet Undetected Kaspersky Undetected Max Secure Undetected McAfee Undetected Microsoft Defender Undetected NANO Undetected NOD32 Win32/Injector.AVKS trojan Norman Undetected Preventon Undetected Quick Heal Undetected SecureAge APEX Malicious Seqrite Undetected Sophos Undetected Symantec Undetected TrendMicro Undetected Vba32 BScope.Trojan.Inject VirITExplorer Undetected VirusFighter Undetected Xvirus Undetected Zillya Undetected ZoneAlarm Undetected Zoner Undetected DOWNLOAD: [Hidden Content] PASSWORD: Only for Users PRIV8 ,send PM
-
Scan result: This file was detected by 5 engines File name: Stub.exe File size: 117 KB Analysis date: 2020-08-30 | 07:16:53 CRC32: 53daccb2 MD5: 5e90f98703963d2d49235dd3041ede91 SHA-1: 7b2eaf5de37e51d5c116d9b39c963108f1971459 SHA-2: 0bda1c6efe76de55a77f0e2de369bc97efb86162e94fba849e529b015a222c18 AdAware Undetected Amiti Undetected Arcabit Undetected Avast Undetected AVG Undetected Avira HEUR/AGEN.1127758 Bitdefender Undetected Bullguard Timeout ClamAV Undetected DrWeb Undetected Emsisoft Scanning results incomplete eScan Timeout F-Prot Undetected F-Secure Undetected G Data Timeout IKARUS Scanning results incomplete Immunet Undetected Kaspersky Undetected Max Secure Undetected McAfee GenericRXKH-YF!5E90F9870396 trojan !!! Microsoft Defender Undetected NANO Undetected NOD32 Win32/Injector.AVKS trojan Norman Undetected Quick Heal Undetected SecureAge APEX Malicious Seqrite Undetected Sophos Scanning results incomplete Symantec Undetected TrendMicro Undetected Vba32 BScope.Trojan.Inject VirusFighter Undetected Xvirus Undetected Zillya Scanning results incomplete ZoneAlarm Undetected Zoner Undetected Download: [Hidden Content] Password: Password by private message Only for Users PRIV8
-
Runtime Mobile Security v1.4 - manipulate Android Java Classes and Methods at Runtime Runtime Mobile Security (RMS), powered by FRIDA, is a powerful web interface that helps you to manipulate Android Java Classes and Methods at Runtime. You can easily dump all the loaded classes and relative methods, hook everything on the fly, trace methods args and return value, load custom scripts, and much other useful stuff. General Info Runtime Mobile Security (RMS) is currently supporting Android devices only. It has been tested on MacOS and with the following devices: AVD emulator Genymotion emulator Amazon Fire Stick 4K It should also work well on Windows and Linux but some minor adjustments may be needed. Changelog v1.4 All the most important features of RMS have been ported to iOS devices [hide][Hidden Content]]
-
Result Scanner: File Name: Stub.exe Scan Date: 2020-05-24 12:35 MD5: 417c73d81f6493bc35294b5cefad589f Filesize: 117.05 KB Detection: 3 / 26 Link: [Hidden Content] Scanned with CyberScan.org (No distribute scanner) Ad-Aware Antivirus - Clean Arcabit Antivirus - Clean Avast Internet Security - Clean AVG Internet Security - Clean Avira Anti-Malware - HEUR/AGEN.1127758 BitDefender Antivirus - Clean BullGuard Antivirus - Clean ClamAv Antivirus - Clean Comodo Essentials - Clean Cyren Antivirus - Clean Windows Defender - Clean eScan Antivirus - Clean Eset Internet Security - Win32/Injector.AVKS trojan F-Prot Security - Clean F-Secure Antivirus - Clean Emisoft Anti-Malware - Clean Immunet Antivirus - Clean Kaspersky Endpoint- HEUR:Trojan.Win32.Inject.vho Nano Antivirus - Clean Norman Antivirus - Clean Ikarus Antivirus - Clean Sophos Antivirus - Clean Xvirus Anti-Malware - Clean VirusFighter Antivirus - Clean Zillya Antivirus - Clean ZoneAlarm Antivirus - Clean Download: [HIDE][Hidden Content]] Password: Password by private message Only for Users PRIV8
-
Scan Result: [Hidden Content] Download: [HIDE][Hidden Content]] Password: Password by private message Only for Users PRIV8
-
File Name: Stub.exe Scan Date: 28/03/2020 18:14 MD5: 13e42b6467bec56d56210b91faec0780 Filesize: 117.05 KB Detection: 2 / 24 Link: [Hidden Content] Scanned with CyberScan.org (No distribute scanner) Ad-Aware Antivirus - Clean Arcabit Antivirus - Clean Avast Internet Security - Clean AVG Internet Security - Clean Avira Anti-Malware - HEUR/AGEN.1036224 BitDefender Antivirus - Clean BullGuard Antivirus - Clean ClamAv Antivirus - Clean Comodo Essentials - Clean Cyren Antivirus - Clean Windows Defender - Clean eScan Antivirus - Clean Eset Internet Security - Win32/Injector.AVKS trojan F-Prot Security - Clean F-Secure Antivirus - Clean Emisoft Anti-Malware - Clean Immunet Antivirus - Clean Kaspersky Endpoint- Clean Nano Antivirus - Clean Ikarus Antivirus - Clean Sophos Antivirus - Clean Xvirus Anti-Malware- Clean Zillya Antivirus - Clean ZoneAlarm Antivirus - Clean Download: [Hidden Content] Password: Only for users PRIV8 by PM
-
File Name: Stub.exe Scan Date: 02/04/2020 17:41 MD5: a2dd18c38f0a337fbf393c46e631af3f Filesize: 117.05 KB Detection: 3 / 24 Link: [Hidden Content] Scanned with CyberScan.org (No distribute scanner) Ad-Aware Antivirus - Clean Arcabit Antivirus - Clean Avast Internet Security - Clean AVG Internet Security - Clean Avira Anti-Malware - HEUR/AGEN.1036224 BitDefender Antivirus - Clean BullGuard Antivirus - Clean ClamAv Antivirus - Comodo Essentials - Clean Cyren Antivirus - Clean Windows Defender - Clean eScan Antivirus - Clean Eset Internet Security - Win32/Injector.AVKS trojan F-Prot Security - Clean F-Secure Antivirus - Clean Emisoft Anti-Malware - Clean Immunet Antivirus - Kaspersky Endpoint- HEUR:Trojan.Win32.Inject.vho Nano Antivirus - Clean Ikarus Antivirus - Clean Sophos Antivirus - Clean Xvirus Anti-Malware- Clean Zillya Antivirus - Clean ZoneAlarm Antivirus - Clean Download: [HIDE][Hidden Content]] Pass: Only for users PRIV8 by PM
-
File Name: Stub.exe Scan Date: 22/03/2020 21:17 MD5: b15ca6c3fea87e7b481ef0c95a08a5ec Filesize: 117.05 KB Detection: 3 / 24 Link: [Hidden Content] Scanned with CyberScan.org (No distribute scanner) Ad-Aware Antivirus - Clean Arcabit Antivirus - Clean Avast Internet Security - Clean AVG Internet Security - Clean Avira Anti-Malware - HEUR/AGEN.1036224 BitDefender Antivirus - Clean BullGuard Antivirus - Clean ClamAv Antivirus - Clean Comodo Essentials - Clean Cyren Antivirus - Clean Windows Defender - Clean eScan Antivirus - Clean Eset Internet Security - Win32/Injector.AVKS trojan F-Prot Security - Clean F-Secure Antivirus - Clean Emisoft Anti-Malware - Clean Immunet Antivirus - Clean Kaspersky Endpoint- HEUR:Trojan.Win32.Inject.vho Nano Antivirus - Clean Ikarus Antivirus - Clean Sophos Antivirus - Clean Xvirus Anti-Malware- Clean Zillya Antivirus - Clean ZoneAlarm Antivirus - Clean Download: [Hidden Content] Password: Only for users PRIV8 by PM
-
File Name: Stub.exe Scan Date: 20/01/2020 01:20 MD5: beb2f7019cbcfe37eda92dc55d078264 Filesize: 217.10 KB Detection: 4 / 24 Link: [Hidden Content] Scanned with CyberScan.org (No distribute scanner) Ad-Aware Antivirus - Clean Arcabit Antivirus - Clean Avast Internet Security - Clean AVG Internet Security - Clean Avira Anti-Malware - HEUR/AGEN.1036224 BitDefender Antivirus - Clean BullGuard Antivirus - Clean ClamAv Antivirus - Clean Comodo Essentials - Clean Cyren Antivirus - Clean Windows Defender - Clean eScan Antivirus - Clean Eset Internet Security - Win32/Injector.AVKS trojan F-Prot Security - Clean F-Secure Antivirus - Clean Emisoft Anti-Malware - Clean Immunet Antivirus - Clean Kaspersky Endpoint- HEUR:Trojan.Win32.Generic Nano Antivirus - Clean Ikarus Antivirus - Clean Sophos Antivirus - Clean Xvirus Anti-Malware- Clean Zillya Antivirus - Trojan.Injector.Win32.677386 ZoneAlarm Antivirus - Clean Download: [Hidden Content]
-
[HIDE][Hidden Content]] introduction objection is a runtime mobile exploration toolkit, powered by Frida. It was built with the aim of helping assess mobile applications and their security posture without the need for a jailbroken or rooted mobile device. The project's name quite literally explains the approach as well, whereby runtime specific objects are injected into a running process and executed using Frida. Note: This is not some form of jailbreak / root bypass. By using objection, you are still limited by all of the restrictions imposed by the applicable sandbox you are facing. features Supporting both iOS and Android and having new features and improvements added regularly as the tool is used in real world scenarios, the following is a short list of only a few key features: For all supported platforms, objection allows you to: Patch iOS and Android applications, embedding a Frida gadget that can be used with objection or just Frida itself. Interact with the filesystem, listing entries as well as upload & download files where permitted. Perform various memory related tasks, such as listing loaded modules and their respective exports. Attempt to bypass and simulate jailbroken or rooted environments. Discover loaded classes and list their respective methods. Perform common SSL pinning bypasses. Dynamically dump arguments from methods called as you use the target application. Interact with SQLite databases inline without the need to download the targeted database and use an external tool. Execute custom Frida scripts. iOS specific features in objection include the ability to: Dump the iOS keychain, and export it to a file. Dump data from common storage such as NSUserDefaults and the shared NSHTTPCookieStorage. Dump various formats of information in human readable forms. Bypass certain forms of TouchID restrictions. Watch for method executions by targeting all methods in a class, or just a single method. Monitor the iOS pasteboard. Dump encoded .plist files in a human readable format without relying on external parsers. Android specific features in objection include the ability to: List the applications Activities, Services and Broadcast receivers. Start arbitrary Activities available in the target application. Watch a class method, reporting execution as it happens. screenshots The following screenshots show the main objection repl, connected to a test application on both an iPad running iOS 10.2.1, and Samsung Galaxy S5 running Android 6. A file system listing of the iOS applications main bundle A file system listing of the Android applications bundle iOS Keychain dumped for the current application, and later written to a file called keychain.json Inline SQLite query tool SSL Pinning bypass running for an iOS application SSL Pinning bypass running for an Android application sample usage A sample session, where objection version 0.1 is used to explore the applications environment. Newer versions have the REPL prompt set to the current applications name, however usage has remained the same: