• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

executable

  1. dEEpEst

    Hide Malicious Files in Images

    Understanding Steganography: How Attackers Hide Malicious Files in Images and How to Protect Yourself Introduction Steganography is the art of hiding data or files within seemingly harmless content, such as images, audio, or videos. Cybercriminals often use steganography to conceal malware or...
  2. itsMe

    PortexAnalyzerGUI: Portable Executable and Malware Analysis Library

    Graphical interface for PortEx, a Portable Executable and Malware Analysis Library. PortEx is a Java library for static malware analysis of Portable Executable files. Its focus is on PE malformation robustness, and anomaly detection. PortEx is written in Java and Scala and targeted at Java...
  3. itsMe

    PortEx: Java library for static malware analysis of Portable Executable files

    PortEx is a Java library for static malware analysis of Portable Executable files. Its focus is on PE malformation robustness, and anomaly detection. PortEx is written in Java and Scala, and targeted at Java applications. Features     Reading header information from: MSDOS Header, COFF File...
  4. itsMe

    .NET Milfuscator Free - Portable Executable x86 Mutator

    Milfuscator Free - Portable Executable x86 Mutator The 'Free Milfuscator' is now an open-source project, the essence of which is to mutate the x32 code by rebuilding the entire PE using the Zydis & AsmJit libraries. The very idea of mutation is taken from one P2C project for CS:GO The...
  5. itsMe

    C# PeNet - Portable Executable (PE) library written in .Net

    PeNet Logo PeNet is a parser for Windows Portable Executable headers. It completely written in C# and does not rely on any native Windows APIs. Furthermore it supports the creation of Import Hashes (ImpHash), which is a feature often used in malware analysis. You can extract Certificate...
  6. itsMe

    Sharperner - Simple executable generator with encrypted shellcode

    Sharperner is a tool written in CSharp that generate .NET dropper with AES and XOR obfuscated shellcode. Generated executable can possibly bypass signature check but I cant be sure it can bypass heuristic scanning. Features PE binary     Process Hollowing     PPID Spoofing     Random...
  7. itsMe

    Reverse Engineering PageBuster: gather dumps of all executable pages of packed processes

    PageBuster There are plenty of scenarios in which the ability to dump executable pages is highly desirable. Of course, there are many methods, some of which standard de facto, but it is not always as easy as it seems. For example, think about the case of packed malware samples. Run-time...
  8. itsMe

    C/C++ Maskedkitty - Icon Changer, File Pumper & Extension Spoofer - Quickly Modify Executable Files

    Hidden content
  9. itsMe

    C# ILibPack - Binder Dll [Merging dll files into an executable file]

    Hidden content
  10. itsMe

    Reverse Engineering PE Tree - Python module for viewing Portable Executable

    Python module for viewing Portable Executable (PE) files in a tree-view using pefile and PyQt5. Can also be used with IDA Pro to dump in-memory PE files and reconstruct imports. Features     Standalone application and IDAPython plugin     Supports Windows/Linux/Mac     Rainbow PE ratio map:  ...
  11. itsMe

    Reverse Engineering Capa v1.1 RC1: identify capabilities in executable files

    capa detects capabilities in executable files. You run it against a PE file or shellcode and it tells you what it thinks the program can do. For example, it might suggest that the file is a backdoor, is capable of installing services, or relies on HTTP to communicate. Changelog v1.1 RC1    ...
  12. itsMe

    EvilPDF v1.1 - Embedding executable files in PDF Documents

    Hiding executable files in PDF documents Legal disclaimer: Usage of EvilPDF for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any...
  13. 1

    Exploits McAfee ePO 5.9.1 Registered Executable Local Access Bypass

    McAfee ePO version 5.9.1 suffers from a local access bypass vulnerability. View the full article
  14. 1

    Exploits AddressSanitizer (ASan) SUID Executable Privilege Escalation

    This Metasploit module attempts to gain root privileges on Linux systems using setuid executables compiled with AddressSanitizer (ASan). ASan configuration related environment variables are permitted when executing setuid executables built with libasan. The log_path option can be set using the...
Back
Top