Quantcast
Channel: Tuts 4 You : Downloads
Browsing latest articles
Browse All 327 View Live
↧

PinMe! 0.6

I wanted to be able to view and access all windows from the click of the tray icon and be able to set their window state to either TopMost (pinned) or NoTopMost (normal) quickly and in a discreet...

View Article


Multiline Ultimate Assembler 2.3.1 (2)

Multiline Ultimate Assembler (formerly MUltimate Assembler) is a multiline (and ultimate) assembler (and disassembler) plugin for OllyDbg. It's a perfect tool for modifying and extending a compiled...

View Article


Imprimer La Selection 28.12.2014

This plugin allows you to print the selected text using CTRL+I

View Article

FastPad Plugin 19.01.2015

Allows you to take notes without the window encroaching on the program being debugged.

View Article

Debug Plugin 30.12.2014

Allows the debugger OllyDbg 2 plugins.

View Article


IDA Pro Disassembler 6.8.15.413 (Windows, Linux, Mac)

IDA Pro is a programmable, interactive, multi-processor disassembler combined with a local and remote debugger and augmented by a complete plugin programming environment.IDA Pro is in many ways unique....

View Article

x64_dbg 0.24

This is a x32/x64 debugger that is currently in active development.The debugger has (currently) three parts:- DBG- GUI- BridgeDBG is the debugging part of the debugger. It handles debugging (using...

View Article

ArkDasm 1.0.0

ArkDasm is a 64-bit interactive disassembler. Supported file types: PE64, raw binary files.Main features:- parsing PE32+ imports, exports, resources- subroutine stack data (arguments, local variables)...

View Article


Verifying Curve25519 Software

This paper presents results on formal verification of high-speed cryptographic software. We consider speed-record-setting hand-optimized assembly software for Curve25519 elliptic-curve key exchange...

View Article


Keygenning Using the Z3 SMT Solver

Quoting Wikipedia, In computer science and mathematical logic, the satisfiability modulo theories (SMT) problem is a decision problem for logical formulas with respect to combinations of background...

View Article

Dyamar Protector 1.3x Unpacker

Recently I get over a nice easy keygenme protected with this protector and I feel the need to automate the unpacking process.Was a fun journey because the protector insert a unique stub almost every...

View Article

Deep Packer Inspection - A Longitudinal Study of the Complexity of Run-Time...

Run-time packers are often used by malware-writers to obfuscate their code and hinder static analysis. The packer problem has been widely studied, and several solutions have been proposed in order to...

View Article

Behavioral Analysis of Obfuscated Code

Classically, the procedure for reverse engineering binary code is to use a disassembler and to manually reconstruct the logic of the original program. Unfortunately, this is not always practical as...

View Article


iOS App Reverse Engineering

Software reverse engineering refers to the process of deducing the implementation and design details of a program or a system by analyzing the functions, structures or behaviors of it. When we are very...

View Article

Keygenning Phoenix-Dev Shrink

This tutorial is for the experienced reverse engineer and not a beginners help. I'm not going deep into everything, but you should be able to follow my ideas. It took me some time to understand how...

View Article


Mass Surveillance

This document identifies the risks of data breaches for users of publicly available Internet services such as email, social networks and cloud computing, and the possible impacts for them and the...

View Article

Reassembleable Disassembling

Reverse engineering has many important applications in computer security, one of which is retrofitting software for safety and security hardening when source code is not available. By surveying...

View Article


The Memory Sinkhole

In x86, beyond ring 0 lie the more privileged realms of execution, where code is invisible to AV, we have unfettered access to hardware, and can trivially preempt and modify the OS. The architecture...

View Article

Translingual Obfuscation

Program obfuscation is an important software protection technique that prevents attackers from revealing the programming logic and design of the software. We introduce translingual obfuscation, a new...

View Article

Symbolic Execution of Obfuscated Code

Symbolic and concolic execution find important applications in a number of security-related program analyses, including analysis of malicious code. However, malicious code tend to very often be...

View Article

Reversing An Obfuscated Java Malware

Some time in the recent past, I stumbled upon a news on The Intercept, about a malware being used against some Argentine prosecutor, who was found dead under uncanny circumstances (Fig. 1 & 2)....

View Article


Preventing Reverse Engineering of Native and Managed Programs

One of the important aspects of protecting software from attack, theft of algorithms, or illegal software use is eliminating the possibility of performing reverse engineering. One common method used to...

View Article


Offensive Techniques in Binary Analysis

Finding and exploiting vulnerabilities in binary code is a challenging task. The lack of high-level, semantically rich information about data structures and control constructs makes the analysis of...

View Article

Obfuscation Code Localization Based on CFG Generation of Malware

This paper presents a tool BE-PUM (Binary Emulator for PUshdown Model generation), which generates a precise control flow graph (CFG), under presence of typical obfuscation techniques of malware, e.g.,...

View Article

Looking Inside the (Drop) Box

Dropbox is a cloud based file storage service used by more than 100 million users. In spite of its widespread popularity, we believe that Dropbox as a platform hasn’t been analyzed extensively enough...

View Article


GPU-Disasm - A GPU-based x86 Disassembler

Static binary code analysis and reverse engineering are crucial operations for malware analysis, binary-level software protections, debugging, and patching, among many other tasks. Faster binary code...

View Article

Factoring RSA Keys With TLS Perfect Forward Secrecy

This report describes the successful factorization of RSA moduli, by connecting to faulty TLS servers which enable forward secrecy and which use an insufficiently hardened RSA-CRT implementation. The...

View Article

De-anonymizing Programmers via Code Stylometry

Source code authorship attribution is a significant privacy threat to anonymous code contributors. However, it may also enable attribution of successful attacks from code left behind on an infected...

View Article

Control Flow Graph Based Multiclass Malware Detection Using Bi-normal Separation

Control flow graphs (CFG) and OpCodes extracted from disassembled executable files are widely used for malware detection. Most of the research in static analysis is focused on binary class malware...

View Article



Context-Sensitive Analysis of Obfuscated x86 Executables

A method for context-sensitive analysis of binaries that may have obfuscated procedure call and return operations is presented. Such binaries may use operators to directly manipulate stack instead of...

View Article

Characterizing Loops in Android Applications

When performing program analysis, loops are one of the most important aspects that needs to be taken into account. In the past, many approaches have been proposed to analyze loops to perform different...

View Article

A Proposal For a Stateless Laptop

Modern Intel x86-based endpoint systems, such as laptops, are plagued by a number of security-related problems. Additionally, with the recent introduction of Intel Management Engine (ME)...

View Article

A Practical Cryptanalysis of the Telegram Messaging Protocol

The number one rule for cryptography is never create your own crypto. Instant messaging application Telegram has disregarded this rule and decided to create an original message encryption protocol. In...

View Article


RCE Messageboard's Regroupment (2008 - 2016)

RCE Messageboard's Regroupment, "serious reversing, cracking and programming discussions."Discussion board content archived between 2008 and 2016. Previously hosted at: http://www.woodmann.com/

View Article

The Immortal Descendants (1997 - 2001)

The Immortal Descendants started out as members of an IRC group on irc.prodigy.net called "Deadmen.Society" way back in 1995. As we gained skills, we realized that there were better, and more...

View Article

Fravias Second Period: Web Searching ("Search Lores") (2000 - 2009)

I have opened my www.searchlores.org, in Oz, in February 2000. Searchlores seems fairly popular: I receive on my main site alone an average of (around) a million hits per month, without counting the...

View Article


Fravias First Period: Reverse Engineering ("Reality Cracking") (1995 - 1999)

My reader, this labyrinth of pages (you'll never be able to count them all :-) contains many teachings, and will help you gain knowledge that you will not find elsewhere. Please wander slowly inside:...

View Article


Crackmes.de (2011 - 2015)

Crackmes.de, a site for testing reversing skills. Crackmes range from "Very Easy" to "Very Hard" for many operating systems.Archive contains a 2011 release from Malware Ninja... Well after the...

View Article

PECOFF Revision 11.0

This specification describes the structure of executable (image) files and object files under the Windows family of operating systems. These files are referred to as Portable Executable (PE) and Common...

View Article

Obsidium 1.5.x.x (Unpacking)

A quick unpacking tutorial covering Obsidium 1.5.x.x builds. Example unpackme file of Obsidium 1.5.2 Build 11 included.

View Article
Browsing latest articles
Browse All 327 View Live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>