• XSS.stack #1 – первый литературный журнал от юзеров форума

Packer/FUDCrypte SourceCode For C++

you can but if you want a shorter time and full power you need to reversing the Anti-Virtus to understand how it works when a file is found, but there are recommended techniques such as:

Obfuscation / Encryption & Encoding | Build your one algorithm or use XOR , AES & B64
store your payload in sections PE like .text, .data etc..
Anti Debugging
Obuscation Calls
Packers
RPM Injection
Reflective DLL Injection
Process Hollowing
Inline Hooking
Network Defense
Rootkits/Bootkits
and more and for sure that's a few of teq

and read windows internals and hacking exposed malware good luck
 
Пожалуйста, обратите внимание, что пользователь заблокирован
you can but if you want a shorter time and full power you need to reversing the Anti-Virtus to understand how it works when a file is found, but there are recommended techniques such as:

Obfuscation / Encryption & Encoding | Build your one algorithm or use XOR , AES & B64
store your payload in sections PE like .text, .data etc..
Anti Debugging
Obuscation Calls
Packers
RPM Injection
Reflective DLL Injection
Process Hollowing
Inline Hooking
Network Defense
Rootkits/Bootkits
and more and for sure that's a few of teq

and read windows internals and hacking exposed malware good luck
Hmmm interesting, i never heard about "Network defense or Rootkits/Bootkits" crypting or obfuscation method.
Im sure you have done ctrl+c and ctrl+v without reading.
 
This point has nothing to do with the topic of the question.
Rootkits exist to hide other malware. Bootkits are a low-level way to persist in a compromised system, thanks to them we have the possibility to bypass (disable) some internal OS protection mechanisms and, therefore, to unload our own modules into the OS address space. This is a very broad, but highly specialized topic, about which we can argue for a very long time.

Specifically on the author's question. There used to be an Adrena Crypter source on github, you can try to find it there. Also, there are some articles by Octavian on this forum, where he explains the idea of writing this kind of software.
true that the published techniques crypter are used for learn and not to use, because will be detected sometimes and will not give you a 0/0 result
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Последнее редактирование:
Пожалуйста, обратите внимание, что пользователь заблокирован
you can but if you want a shorter time and full power you need to reversing the Anti-Virtus to understand how it works when a file is found, but there are recommended techniques such as:

Obfuscation / Encryption & Encoding | Build your one algorithm or use XOR , AES & B64
store your payload in sections PE like .text, .data etc..
Anti Debugging
Obuscation Calls
Packers
RPM Injection
Reflective DLL Injection
Process Hollowing
Inline Hooking
Network Defense
Rootkits/Bootkits
and more and for sure that's a few of teq

and read windows internals and hacking exposed malware good luck
Wow, how much you know about it?) Maby you have some private tools coded from scratch?
 
Wow, how much you know about it?) Maby you have some private tools coded from scratch?
if you wanna my skills np to education u but i specialize in reverse engineering de/obfuscation,kernel exploitation & UEFI if u need help I don't have problem
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Any Senior C++/asm coder is welcome. DM me, if you have such skills, we could bring you to our private team, where you will get $$$ and improve your skills.
how much $$$?
 
Пожалуйста, обратите внимание, что пользователь заблокирован
you can but if you want a shorter time and full power you need to reversing the Anti-Virtus to understand how it works when a file is found, but there are recommended techniques such as:

Obfuscation / Encryption & Encoding | Build your one algorithm or use XOR , AES & B64
store your payload in sections PE like .text, .data etc..
Anti Debugging
Obuscation Calls
Packers
RPM Injection
Reflective DLL Injection
Process Hollowing
Inline Hooking
Network Defense
Rootkits/Bootkits
and more and for sure that's a few of teq

and read windows internals and hacking exposed malware good luck
you know any good fud crypter even its paid
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх