Here you may find the collection of different applications and tools I made (mainly for my own crazy needs of course). Applications are made in different times and for different reasons. Probably there are no fully finished projects here, - rather results or sub-products of different experiments. Some applications are provided with the source code, some not. All of them without any exceptions can be downloaded and used for free for non-commercial purposes. I would appreciate any kind of feedback, wishlists and of course new ideas (the more - the better)! :-) Writing Crypter. Bypassing Antivirus - "how-to" For Beginners.A test project where we are trying to create a fully working crypter: a program which allows to run any third-party (and potentially malicious) code the way it will not be detected by antivirus programs. We are ambitious beasts, so we will "raise a bar" and try to create FUD Crypter (stands for: Fully Undetectable). :-) The article explains basic functionality of the malware and the way it may bypass antivirus protection mechanisms. Check the corresponding article and download the binaries and the source code in Delphi. Blind SQL Injection Exploitation with "Blind Cat" toolThe experimental multithreaded tool (Blind Cat) is running multiple instances of CURL, which send parametrized HTTP requests to the vulnerable web application. Then responses are analyzed and another requests with modified parameters are issued until the correct characters in SQL response are detected. Download the program from [here] or source code in Delphi. Important! Strongly recommended to read the article first! Self-modifying code – short overview for beginnersTutorial for beginners - simple example how to build self-modifying code in Delphi. In this article we will be playing with the code modification throughout execution ('on-the-fly') with emphasis on direct creation of instructions in memory. Download the source code in Delphi. Important! Strongly recommended to read the article first! Image Encryption With Polyalphabetic Ciphers (experimental analytical tool)A tiny software for playing around with statistical and visual analysis of binary data encrypted with polyaphabetic ciphers. Just a nice visual tool which let you see (literally: by your own eyes) that e.g. Vigener's Square is rather not so secure method of data encryption (especially if applied to data streams with predictable patterns, as images). You can manipulate cipher parameters and immediately see effects. More information about it can be found here [Image encryption with polyalphabetic ciphers - experimental approach]. Download the tool from [here] with source code in Delphi. Important! Strongly recommended to read the article first! TrueCrypt USB Auto Mount toolThe tool automatically mounts TrueCrypt container, located on USB drive, once inserted. Target drive letter is automatically maintained. By single click it is possible quickly unmount secure container and eject USB device. The password is stored on the computer only, so if USB drive is lost - sensitive data are pretty secure. More information can be found [here]. Download TrueCrypt USB Auto Mount tool. Substitution Cipher SolverThe tool allows quickly solve simple substitution ciphers and was made while solving the Cyber Security Challenge UK. User can manipulate characters pretty visually, which effectively speeds-up entire process. Program automatically calculates characters frequency table, assign unique colour code to the every character based on its value and does many more. Additional information can be found [here]. [12.08.2010 19:30:21] Updated to version 1.1. Download Substitution Cipher Solver. Skype Chatsync ReaderProgram used for retrieving stored Skype conversations from the .dat files. Program was created rather as a a proof of concept then the final product. More information can be found [here] and [here]. [20.08.2010 22:54:41] Updated to version 1.1 Download binaries and the source code (Delphi). GUI Objects ManipulationThis program allows to manipulate objects (buttons, comboboxes, text edit fileds) in windows binary applications. You can simulate mouse click, read/write data, modify nr of elements in combobox, etc. Program was created rather as a a proof of concept and techniques illustrations then the final product. More information can be found [here]. Download binaries and the source code (Delphi). |
|