last update @ 24.09.03

contact me via email : cdaemon@gmx.net or via irc (efnet) #unpacking

 

 

NEWS:
FORUM IS NOW AVAILABLE | BETA GALLERY
- OED [on exception dumper] - /start it from explorer! funny stuff nothing serious! (24.09.03)
- my tracer build 21 is finally available WITHOUT MANUAL! figure it out yourself or let it be BUT NEVER EVER ask me about i!(24.09.03)
- updated beta gallery (24.09.03)
 
- softdefender unpacker (21.06.03)
- decided to release my "old" pelock unpacker (20.01.03)
- added fooling "protect on" to icedump (01.10.02)
- finished my pelock unpacker :) give this protector a try @ www.pelock.prv.pl (the unpacker will stay private) (13.10.02)
- updated bpts v1.02 (added support for NT/2000/XP) in anti-tracing (24.07.02) (small bug fixed!) <-- may still crash on some NT/9x systems when no SICE is loaded or SP2 is installed on NT (this could be fixed but hey iam a lazy pig :)
- added appdebugger NT (NT/2000/XP) to anti-tracing (16.06.02)
- added sice detection (NT/2000/XP) to anti-tracing (15.06.02)
- updated bpts v1.0 (added support for NT/2000/XP) in anti-tracing (14.06.02)
- added sourcecode to my old k8-rebuilder (31.05.02)
- added sourcecode to my old visual protect unpacker (31.05.02)
- added "demaradillo v0.4 *final*" to unpackers (27.05.02) <-- !!!RTFM!!!
- added "bpts v0.2" to anti-tracing (27.05.02)
- added "import protection" to processes (11.05.02)
- added "copy_mem protection" to processes (10.05.02)
- added "protect last beta" to other shit (08.04.02)
- added "anti loader" to processes (01.04.02)
- added "sice detector" to anti-tracing (20.03.02)
- added "iceugedition" to icedump (26.02.02)
- added "appdebugger" to anti-tracing (30.01.02)
- added "int1&int3" to ring0 stuff (28.01.02)
- added "int1hooking" to anti-tracing (26.01.02)
- added "single stepping" to anti-tracing (26.01.02)

 

 

detect tracer Explanation:
OS: w95b is a nice program i wrote up to show you that it is pretty simple to detect if someone is tracing your program (the program is tracing itself)
   
detect tracer (api) Explanation:
OS: w95b the same as above.... improved only the tracer to handle api calls
   
detect tracer Explanation:
OS: w98se another shit how to detect if someone is tracing your program (enabling the overflow bit in eflags and check it by "into" -> this causes overflow exception (interrupt 4 redirected to own handler))
   
detect tracer2 Explanation:
OS: w95b the idea behind this proggy is that the cracker is using "F10" @ the loop instruction (decryptor) the problem here is that i use debug register #3 to store the decryption key... so if the cracker single steps everything will go fine but if he uses f10 to jump over the loop, soft-ice is setting a bpm @ next eip (intern) so it will mess up our decryption-key used by (risc's) k-kryptor
   
detect tracer  Explanation:
OS: w98se more or less from the oldschool - by reading the current time and comparing it to an value read some instructions afterwards
   
detect tracer  Explanation:
OS: w98se yeah yeah!!!! my first ring0 tracer... it's really lame... but hey! it (ring0) worx!!!!
   
detect tracer  Explanation:
OS: w98se

yeah yeah!!!! my first ring0 tracer... it's really lame... but hey! it (ring0-with api) worx!!!! this one is able to detect calls, puts an int3 @ next eip (after returning from our call) and reenables trap flag in eflags... (reenables tracing engine this way) (several bugs in it!!! stack problems...)

   
Anti Tracer 3 Explanation:
OS: w98se

same as above one just a little bit better (again!) Heavy worx only for soft-ice (unpatched, and not hided with frogs-ice...) (i haven't tested it with frogs-ice so i can't tell u what happens if u have loaded it)

   
Anti BPM Explanation:
OS: w98se

another trick how to kill debug register breaking (could also be ported to NT by using context_structure instead of idt interrupt redirecting)

   
Int1Hooking Explanation:
OS: w98se

please enable I3HERE ON! if u execute this file!!! it shows u a nice example, how u could defeat single stepping! be careful with this program it could crash your system with easy!

   
Single Stepping Explanation:
OS: w9x only

same as above, BUT using a VXD instead of exploiting Ring0

   
Appdebugger Explanation:
OS: w9x only

using fs:[20h] to detect if the program is being executed under an application debugger! like Ollydbg ;-) (do you remember Hypno ???)

   
Sice detector Explanation:
OS: NT/2000/XP

using int1 to detect the presence of soft-ice

   
bpts v1.02[bptsv1.02.zip - MISSING] Explanation:
OS: ALL

A small breakpoint table scanner for softice --- works for ALL os now (thx EliCZ!)

   
sice_detection Explanation:
OS: NT/2000/XP

by scanning the loaded drivers (simple but as always EFFECTIVE!)

   
appdebugger NT Explanation:
OS: NT/2000/XP

using PEB (aka FS:[30h]) (detects appdebuggers like Ollydbg!)

   

 

 

Icedump 6.0.2.4 Explanation:
OS: w9x only

ähmm, yeah! just played around with icedump and saw that they prevent the setting of the gd-flag in debug register 7! so the easiest way is to set gd-flag and check afterwards if it's still turned on

   
Icedump detect[icedump-6.0.2.4-detection.asm - MISSING] Explanation:
OS: w9x only

how to detect if softice is running in memory or not :) this idea came in my mind while reading the .docs and while playing around with icedump! icedump installs new interrupt handlers for a lot of interrupts so why not compare em ???? this method worx VERY good!

   
detecting tracex Explanation:
OS: w9x only

this program detects if it got traced via the lovely \tracex command! and YEAH it's for the updated version of their tracer icedump v6.0.2.4! idea in here is simple! \tracex command sets up a fake idt and this is what we use to detect it! if u wanna test this program, please let icedump trace it till the messagebox!

   
Icedump detect Explanation:
OS: w9x only

another way how we can determine if icedump is (or was) active in memory (checking the interrupt 0x68) icedump just patches it to 0xCF (iret) So why not check for 0xCF ???? (worx fine!)

(18.12.01)  
Sice & Ice detector Explanation:
OS: w9x only

idea is again easy just gaining r0 (via idt! pretty lame i know!) then calling VMMCall GetVxDLocationList and scanning the vxd names (etc) (tested with softice v4.00 and icedump 6.0.2.5)

(20.12.01)  
Fooling Protect on Explanation:
OS: w9x only

idea is again easy... we just modify the permissions of the page! (nearly NO one uses this stuff beside of SVKP)... turn \PROTECT on and execute this file... icedump WON'T catch the IDT accesses :)

(01.10.02)  

 

Icedump v6.0.2.5 UG2002 Edition Explanation:
OS: ALL

added a new command to icedump called: \hook for hooking any api in any dll (global and iat hooking)

(26.02.02)  

 


Api hooking via Export Table Explanation:
OS: w9x only

it's just a small program i developed to hook any api via our beloved export table

   
Anti Dumping Explanation:
OS: w9x only

just a small piece of code... don't blame me! i know the source might be pretty incompatible better use the above one!

   
Anti Procdump Explanation:
OS: w9x only

just another idea... nothing special!

   
Anti loader Explanation:
OS: w9x only

a nice way how to stop the process getting loaded from an unpacker for example or any other app (using fs:30h to get pointer to the process database)

   
copy_mem_prot. Explanation:
OS: ALL

Playing around with page_access levels.... very nice idea by silicon_realms (armadillo)

   
import protection Explanation:
OS: ALL

same idea as above but a bit changed (it's just a test and it suceeded!)

   

 

 

VMMCalls Explanation:
OS: --

A nice lookup table (collected em all... hopefully i didn't miss any!)

   
DDB Struc Explanation:
OS: --

Still under development

   
hook_v86 (int 3) Explanation:
OS: 9x

hook_v86_int_chain installs the handler in the system

the com file then executes the interrupt which is getting caught by my handler.... nothing more!

03.01.02  
hook_v86 (int 68) Explanation:
OS: 9x

hook_v86_int_chain installs the handler in the system (allocates memory in the system area... copies the hooking routine to that place and stays active after ExitProcess) the com file then executes the interrupt which is getting caught by my handler.... nothing more! a little bit improved with VxDCall SYSMODAL_Message etc... defeating Sice detection via int68h (ah=43)

04.01.02  
int1&int3 (v0.2) Explanation:
OS: 9x

a nice vxd, that shows u whenever an int1 or 3 gets executed in your sice console (using vwin32 trace_out) (cs:eip)

28.01.02  

 

crc.zip Explanation:
OS: ALL

just a small source for generating crc

   
rc4 Explanation:
OS: ALL

just a small source rc4 in asm (mainly done by tE!)

   
my own one Explanation:
OS: ALL

encryption algo based on rc4 (just modified!)

   

 

 

delame Explanation:
OS: ALL

unpacker for lame encryptor

   
deryptor Explanation:
OS: ALL

unpacker for ryptor

   
descc Explanation:
OS: ALL

unpacker for scc

   
idec Explanation:
OS: ALL

unpacker for idec

   
denoodle Explanation:
OS: ALL

unpacker for noodlecrypt

   
softunlocx Explanation:
OS: ALL

unpacker for softlocx

   
vdp v1.0 Explanation:
OS: ALL

unpacker for visual protect

   
dpcgd v0.7 Explanation:
OS: ALL

unpacker for pc guard

   
tEunlock v1.1 Explanation:
OS: ALL

unpacker for tElock (this version got never released to the public!)

   
tbs v1.5 Explanation:
OS: ALL

unpacker for different Bit-Arts Products!

   
k-pack2 Explanation:
OS: ALL

unpacker for k-kryptor.k2

   
k-pack4 Explanation:
OS: ALL

unpacker for k-kryptor.k4

   
k-pack5 Explanation:
OS: ALL

unpacker for k-kryptor.k5

   
k-pack8 Explanation:
OS: ALL

unpacker for k-kryptor.k8 (ONLY DUMP REBUILDER!!!)

   
demaradillo v0.4 Explanation:
OS: ALL

full decryptor for Armadillo v2.51 (Final Build, Trial Version)

   
softdefender v1.0 Explanation:
OS: ALL

full decryptor for Softdefender V1.1

   

 

 

 

other shit

crackme8 Explanation:
OS: ALL

crackme8 by noodlespa solved

11.01.02 RENAME THIS FILE BACK TO ZIP!!!
unpacking Explanation:
OS: ALL

A tutorial on general unpacking (GERMAN!)

   
protect v0.6.7 Explanation:
OS: ALL

finally i release a public version of it :))) people don't cry, it's damn incompatible so be warned... use it only @ tasm generated files!!! otherwise it will fail in 90% :)))

   

 

Unpacking Gods
EliCZ
Anticracking.sk
Anticrack.de
Yoda