久久国产成人av_抖音国产毛片_a片网站免费观看_A片无码播放手机在线观看,色五月在线观看,亚洲精品m在线观看,女人自慰的免费网址,悠悠在线观看精品视频,一级日本片免费的,亚洲精品久,国产精品成人久久久久久久

分享

Projects ? IT Security Lab

 quasiceo 2014-01-16

Here you may find the collection of different applications and tools I made (mainly for my own crazy needs of course). Applications are made in different times and for different reasons. Probably there are no fully finished projects here, - rather results or sub-products of different experiments. Some applications are provided with the source code, some not. All of them without any exceptions can be downloaded and used for free for non-commercial purposes. I would appreciate any kind of feedback, wishlists and of course new ideas (the more - the better)! :-)

Writing Crypter. Bypassing Antivirus - "how-to" For Beginners.

A test project where we are trying to create a fully working crypter: a program which allows to run any third-party (and potentially malicious) code the way it will not be detected by antivirus programs. We are ambitious beasts, so we will "raise a bar" and try to create FUD Crypter (stands for: Fully Undetectable). :-) The article explains basic functionality of the malware and the way it may bypass antivirus protection mechanisms.

Check the corresponding article and download the binaries and the source code in Delphi.

Blind SQL Injection Exploitation with "Blind Cat" tool

The experimental multithreaded tool (Blind Cat) is running multiple instances of CURL, which send parametrized HTTP requests to the vulnerable web application. Then responses are analyzed and another requests with modified parameters are issued until the correct characters in SQL response are detected.

Download the program from [here] or source code in Delphi. Important! Strongly recommended to read the article first!

Self-modifying code – short overview for beginners

Tutorial for beginners - simple example how to build self-modifying code in Delphi. In this article we will be playing with the code modification throughout execution ('on-the-fly') with emphasis on direct creation of instructions in memory.

Download the source code in Delphi. Important! Strongly recommended to read the article first!

Image Encryption With Polyalphabetic Ciphers (experimental analytical tool)

A tiny software for playing around with statistical and visual analysis of binary data encrypted with polyaphabetic ciphers. Just a nice visual tool which let you see (literally: by your own eyes) that e.g. Vigener's Square is rather not so secure method of data encryption (especially if applied to data streams with predictable patterns, as images). You can manipulate cipher parameters and immediately see effects. More information about it can be found here [Image encryption with polyalphabetic ciphers - experimental approach].

Download the tool from [here] with source code in Delphi. Important! Strongly recommended to read the article first!

TrueCrypt USB Auto Mount tool

The tool automatically mounts TrueCrypt container, located on USB drive, once inserted. Target drive letter is automatically maintained. By single click it is possible quickly unmount secure container and eject USB device. The password is stored on the computer only, so if USB drive is lost - sensitive data are pretty secure. More information can be found [here].

Download TrueCrypt USB Auto Mount tool.

Substitution Cipher Solver

The tool allows quickly solve simple substitution ciphers and was made while solving the Cyber Security Challenge UK. User can manipulate characters pretty visually, which effectively speeds-up entire process. Program automatically calculates characters frequency table, assign unique colour code to the every character based on its value and does many more. Additional information can be found [here]. [12.08.2010 19:30:21] Updated to version 1.1.

Download Substitution Cipher Solver.

Skype Chatsync Reader

Program used for retrieving stored Skype conversations from the .dat files. Program was created rather as a a proof of concept then the final product. More information can be found [here] and [here]. [20.08.2010 22:54:41] Updated to version 1.1

Download binaries and the source code (Delphi).

GUI Objects Manipulation

This program allows to manipulate objects (buttons, comboboxes, text edit fileds) in windows binary applications. You can simulate mouse click, read/write data, modify nr of elements in combobox, etc. Program was created rather as a a proof of concept and techniques illustrations then the final product. More information can be found [here].

Download binaries and the source code (Delphi).

    本站是提供個人知識管理的網(wǎng)絡存儲空間,所有內(nèi)容均由用戶發(fā)布,不代表本站觀點。請注意甄別內(nèi)容中的聯(lián)系方式,、誘導購買等信息,謹防詐騙,。如發(fā)現(xiàn)有害或侵權(quán)內(nèi)容,,請點擊一鍵舉報。
    轉(zhuǎn)藏 分享 獻花(0

    0條評論

    發(fā)表

    請遵守用戶 評論公約

    類似文章 更多