Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      itsMe

      PE-Packer: Windows x86 PE file packer written in C & Microsoft Assembly

      Recommended Posts

      Staff

      Hidden Content

        Give reaction to this post to see the hidden content.

      PE-Packer

      PE-Packer is a simple packer for Windows PE files. The new PE file after packing can obstruct the process of reverse engineering.

      It will do the following things when packing a PE file:

          Transforming the original import table.
          Encrypting sections.
          Clearing section names.
          Installing the shell-entry.

      When running a packed PE file, the shell-entry will decrypt and load the original program as follows:

          Decrypting sections.
          Initializing the original import table.
          Relocation.

      Before packing, using some disassembly tools can disassemble the executable file to analyze the code, such as IDA Pro.

      Hidden Content

        Give reaction to this post to see the hidden content.

      Share this post


      Link to post
      Share on other sites

      Join the conversation

      You can post now and register later. If you have an account, sign in now to post with your account.
      Note: Your post will require moderator approval before it will be visible.

      Guest
      Reply to this topic...

      ×   Pasted as rich text.   Paste as plain text instead

      ×   Your link has been automatically embedded.   Display as a link instead

      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. This ia an simple and powerful stealer that steals victim credentials and send to your discord server...
          This File Steals:
          1. Ip address
          2. Screenshot
          3. Discord token
          4. Mac Address
          5. System Information

          Hidden Content
          Give reaction to this post to see the hidden content.  
           
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Ninjutsu-OS is a dedicated Windows 10 OS (Build 1909) that contains more than 800 cybersecurity testing tools. Kali Linux, just from the Windows world. The release is quite fresh, took place on 18.04.2020.
          The INSTALLATION of the OS itself is no different from the standard Win 10 installation, except that it is noticeably longer.

          Hidden Content
          Give reaction to this post to see the hidden content. After the OS itself is launched, it will take about 10 minutes to install and customize everything. After all the manipulations we are met with a slightly overloaded (in my opinion) and a very colorful desktop.

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content. Now let's see what's inside.
          In total, more than 800 utilities were included in the assembly. Some of them the author had to adapt to start running under Windows.
          At the top is a separate bar, which contains all the utilities by category for speed access. The utility categorization is done with an emphasis on OSCP methodology with an eye to categorization in Kali Linux:
          "Mr.Robot tools kit are the most commonly used utilities and other additional materials, according to the author of the assembly. Personal top, so to speak;
          " Red Teaming is the most commonly used tool for category testing. In fact, these are all top utilities with all the categories below under one tab;
          Information Gathering - gathering information;
          "Exploitation Tools is an exploiting vulnerability
          Malware analysis
          Mobile Security Tools - Mobile Testing
          Network Attack - Network Attacks
          Password Attacks - password hacking
          Proxy and Privacy Tools - proxing and anonymizers;
          - Reverse Engineering is a reverse engineering;
          Stress Testing - Stress Testing (DDoS);
          Vulnerability Analysis - Finding vulnerabilities
          Web Application Attack , web pentest;
          Wireless Attacks - Wireless Attacks
          Fuzzing and payloads - phasing and workloads;
          Remote Control Tools - Remote Control
          - Utility Tools - other auxiliary utilities (Winrar, MyS'L, etc.);
          The full list of available utilities can be found on the project's website. The OS is perfect for both pure pentest and people who are engaged in reverse engineering, OSINT or malware analysis. In a few days of work on the OS, I didn't catch any critical bugs or software failures. Tested on machines with Hack the Box plus turned up an additional project on OSINT.


          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. OnionShare lets you securely and anonymously share files of any size. It works by starting a web server, making it accessible as a Tor onion service, and generating an unguessable URL to access and download the files. It doesn’t require setting up a server on the internet somewhere or using a third party file-sharing service. You host the file on your own computer and use a Tor onion service to make it temporarily accessible over the internet. The other user just needs to use Tor Browser to download the file from you.
          Features:
              A user-friendly drag-and-drop graphical user interface that works in Windows, Mac OS X, and Linux
              Ability to share multiple files and folders at once
              Support for multiple people downloading files at once
              Automatically copies the unguessable URL to your clipboard
              Shows you the progress of file transfers
              When file is done transferring, automatically closes OnionShare to reduce the attack surface
              Localized into several languages, and supports international Unicode filenames
          Changelog v2.3
              Major new feature: Multiple tabs, including better support for persistent services, faster Tor connections
              New feature: Chat anonymously mode
              New feature: All new design
              New feature: Ability to display QR codes of OnionShare addresses
              New feature: Web apps have responsive design and look better on mobile
              New feature: Flatpak and Snapcraft packaging for Linux
              Several bug fixes

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Bind files in single .exe file
          Two types of file binder:
          Via CodeDOM compiler
          Via NSIS compiler

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.