|
|
![]() |
|
![]() |
||
|
last update @ 24.09.03 contact me via email : cdaemon@gmx.net or via irc (efnet) #unpacking |
|
|
![]() |
|


| NEWS: |
-
OED [on exception dumper] - /start it from
explorer! funny stuff nothing serious! (24.09.03) |
-
my tracer build 21 is finally available
WITHOUT MANUAL! figure it out yourself or let it be BUT NEVER EVER ask
me about i!(24.09.03) |
-
updated beta gallery (24.09.03) |
-
softdefender unpacker (21.06.03) |
-
decided to release my "old" pelock
unpacker (20.01.03) |
| -
added fooling "protect
on" to icedump (01.10.02) |
| -
finished my pelock unpacker :) give this protector a try @ www.pelock.prv.pl
(the unpacker will stay private) (13.10.02) |
| -
updated bpts v1.02 (added support for NT/2000/XP)
in anti-tracing (24.07.02) (small bug fixed!) <-- may still crash on
some NT/9x systems when no SICE is loaded or SP2 is installed on NT (this
could be fixed but hey iam a lazy pig :) |
| -
added appdebugger NT (NT/2000/XP) to
anti-tracing (16.06.02) |
| -
added sice detection (NT/2000/XP) to
anti-tracing (15.06.02) |
| -
updated bpts v1.0 (added support for NT/2000/XP)
in anti-tracing (14.06.02) |
| -
added sourcecode to my old k8-rebuilder
(31.05.02) |
| -
added sourcecode to my old visual protect unpacker
(31.05.02) |
| -
added "demaradillo v0.4 *final*"
to unpackers (27.05.02) <-- !!!RTFM!!! |
| -
added "bpts v0.2" to anti-tracing
(27.05.02) |
| -
added "import protection"
to processes (11.05.02) |
| -
added "copy_mem protection"
to processes (10.05.02) |
| -
added "protect last beta"
to other shit (08.04.02) |
| -
added "anti loader" to processes
(01.04.02) |
| -
added "sice detector" to anti-tracing
(20.03.02) |
| -
added "iceugedition" to icedump
(26.02.02) |
| -
added "appdebugger" to anti-tracing
(30.01.02) |
| -
added "int1&int3" to ring0
stuff (28.01.02) |
| -
added "int1hooking" to anti-tracing
(26.01.02) |
| -
added "single stepping"
to anti-tracing (26.01.02) |

| detect tracer | Explanation: |
| OS: w95b | is a nice program i wrote up to show you that it is pretty simple to detect if someone is tracing your program (the program is tracing itself) |
| detect tracer (api) | Explanation: |
| OS: w95b | the same as above.... improved only the tracer to handle api calls |
| detect tracer | Explanation: |
| OS: w98se | another shit how to detect if someone is tracing your program (enabling the overflow bit in eflags and check it by "into" -> this causes overflow exception (interrupt 4 redirected to own handler)) |
| detect tracer2 | Explanation: |
| OS: w95b | the idea behind this proggy is that the cracker is using "F10" @ the loop instruction (decryptor) the problem here is that i use debug register #3 to store the decryption key... so if the cracker single steps everything will go fine but if he uses f10 to jump over the loop, soft-ice is setting a bpm @ next eip (intern) so it will mess up our decryption-key used by (risc's) k-kryptor |
| detect tracer | Explanation: |
| OS: w98se | more or less from the oldschool - by reading the current time and comparing it to an value read some instructions afterwards |
| detect tracer | Explanation: |
| OS: w98se | yeah yeah!!!! my first ring0 tracer... it's really lame... but hey! it (ring0) worx!!!! |
| detect tracer | Explanation: |
| OS: w98se |
yeah yeah!!!! my first ring0 tracer... it's really lame... but hey! it (ring0-with api) worx!!!! this one is able to detect calls, puts an int3 @ next eip (after returning from our call) and reenables trap flag in eflags... (reenables tracing engine this way) (several bugs in it!!! stack problems...) |
| Anti Tracer 3 | Explanation: |
| OS: w98se |
same as above one just a little bit better (again!) Heavy worx only for soft-ice (unpatched, and not hided with frogs-ice...) (i haven't tested it with frogs-ice so i can't tell u what happens if u have loaded it) |
| Anti BPM | Explanation: |
| OS: w98se |
another trick how to kill debug register breaking (could also be ported to NT by using context_structure instead of idt interrupt redirecting) |
| Int1Hooking | Explanation: |
| OS: w98se |
please enable I3HERE ON! if u execute this file!!! it shows u a nice example, how u could defeat single stepping! be careful with this program it could crash your system with easy! |
| Single Stepping | Explanation: |
| OS: w9x only |
same as above, BUT using a VXD instead of exploiting Ring0 |
| Appdebugger | Explanation: |
| OS: w9x only |
using fs:[20h] to detect if the program is being executed under an application debugger! like Ollydbg ;-) (do you remember Hypno ???) |
| Sice detector | Explanation: |
| OS: NT/2000/XP |
using int1 to detect the presence of soft-ice |
| bpts v1.02[bptsv1.02.zip - MISSING] | Explanation: |
| OS: ALL |
A small breakpoint table scanner for softice --- works for ALL os now (thx EliCZ!) |
| sice_detection | Explanation: |
| OS: NT/2000/XP |
by scanning the loaded drivers (simple but as always EFFECTIVE!) |
| appdebugger NT | Explanation: |
| OS: NT/2000/XP |
using PEB (aka FS:[30h]) (detects appdebuggers like Ollydbg!) |

| Icedump 6.0.2.4 | Explanation: |
| OS: w9x only |
ähmm, yeah! just played around with icedump and saw that they prevent the setting of the gd-flag in debug register 7! so the easiest way is to set gd-flag and check afterwards if it's still turned on |
| Icedump detect[icedump-6.0.2.4-detection.asm - MISSING] | Explanation: |
| OS: w9x only |
how to detect if softice is running in memory or not :) this idea came in my mind while reading the .docs and while playing around with icedump! icedump installs new interrupt handlers for a lot of interrupts so why not compare em ???? this method worx VERY good! |
| detecting tracex | Explanation: |
| OS: w9x only |
this program detects if it got traced via the lovely \tracex command! and YEAH it's for the updated version of their tracer icedump v6.0.2.4! idea in here is simple! \tracex command sets up a fake idt and this is what we use to detect it! if u wanna test this program, please let icedump trace it till the messagebox! |
| Icedump detect | Explanation: |
| OS: w9x only |
another way how we can determine if icedump is (or was) active in memory (checking the interrupt 0x68) icedump just patches it to 0xCF (iret) So why not check for 0xCF ???? (worx fine!) |
| (18.12.01) |
| Sice & Ice detector | Explanation: |
| OS: w9x only |
idea is again easy
just gaining r0 (via idt! pretty lame i know!) then calling VMMCall GetVxDLocationList
and scanning the vxd names (etc) (tested with softice v4.00 and icedump
6.0.2.5) |
| (20.12.01) |
| Fooling Protect on | Explanation: |
| OS: w9x only |
idea is again easy... we just modify the permissions of the page! (nearly NO one uses this stuff beside of SVKP)... turn \PROTECT on and execute this file... icedump WON'T catch the IDT accesses :) |
| (01.10.02) |
| Icedump v6.0.2.5 UG2002 Edition | Explanation: |
| OS: ALL |
added a new command to icedump called: \hook for hooking any api in any dll (global and iat hooking) |
| (26.02.02) |
![]()
| Api hooking via Export Table | Explanation: |
| OS: w9x only |
it's just a small program i developed to hook any api via our beloved export table |
| Anti Dumping | Explanation: |
| OS: w9x only |
just a small piece of code... don't blame me! i know the source might be pretty incompatible better use the above one! |
| Anti Procdump | Explanation: |
| OS: w9x only |
just another idea... nothing special! |
| Anti loader | Explanation: |
| OS: w9x only |
a nice way how to stop the process getting loaded from an unpacker for example or any other app (using fs:30h to get pointer to the process database) |
| copy_mem_prot. | Explanation: |
| OS: ALL |
Playing around with page_access levels.... very nice idea by silicon_realms (armadillo) |
| import protection | Explanation: |
| OS: ALL |
same idea as above but a bit changed (it's just a test and it suceeded!) |
![]()
| VMMCalls | Explanation: |
| OS: -- |
A nice lookup table (collected em all... hopefully i didn't miss any!) |
| DDB Struc | Explanation: |
| OS: -- |
Still under development |
| hook_v86 (int 3) | Explanation: |
| OS: 9x |
hook_v86_int_chain installs the handler in the system the com file then executes the interrupt which is getting caught by my handler.... nothing more! |
| 03.01.02 |
| hook_v86 (int 68) | Explanation: |
| OS: 9x |
hook_v86_int_chain installs the handler in the system (allocates memory in the system area... copies the hooking routine to that place and stays active after ExitProcess) the com file then executes the interrupt which is getting caught by my handler.... nothing more! a little bit improved with VxDCall SYSMODAL_Message etc... defeating Sice detection via int68h (ah=43) |
| 04.01.02 |
| int1&int3 (v0.2) | Explanation: |
| OS: 9x |
a nice vxd, that shows u whenever an int1 or 3 gets executed in your sice console (using vwin32 trace_out) (cs:eip) |
| 28.01.02 |
![]()
| crc.zip | Explanation: |
| OS: ALL |
just a small source for generating crc |
| rc4 | Explanation: |
| OS: ALL |
just a small source rc4 in asm (mainly done by tE!) |
| my own one | Explanation: |
| OS: ALL |
encryption algo based on rc4 (just modified!) |
![]()
| delame | Explanation: |
| OS: ALL |
unpacker for lame encryptor |
| deryptor | Explanation: |
| OS: ALL |
unpacker for ryptor |
| descc | Explanation: |
| OS: ALL |
unpacker for scc |
| idec | Explanation: |
| OS: ALL |
unpacker for idec |
| denoodle | Explanation: |
| OS: ALL |
unpacker for noodlecrypt |
| softunlocx | Explanation: |
| OS: ALL |
unpacker for softlocx |
| vdp v1.0 | Explanation: |
| OS: ALL |
unpacker for visual protect |
| dpcgd v0.7 | Explanation: |
| OS: ALL |
unpacker for pc guard |
| tEunlock v1.1 | Explanation: |
| OS: ALL |
unpacker for tElock (this version got never released to the public!) |
| tbs v1.5 | Explanation: |
| OS: ALL |
unpacker for different Bit-Arts Products! |
| k-pack2 | Explanation: |
| OS: ALL |
unpacker for k-kryptor.k2 |
| k-pack4 | Explanation: |
| OS: ALL |
unpacker for k-kryptor.k4 |
| k-pack5 | Explanation: |
| OS: ALL |
unpacker for k-kryptor.k5 |
| k-pack8 | Explanation: |
| OS: ALL |
unpacker for k-kryptor.k8 (ONLY DUMP REBUILDER!!!) |
| demaradillo v0.4 | Explanation: |
| OS: ALL |
full decryptor for Armadillo v2.51 (Final Build, Trial Version) |
| softdefender v1.0 | Explanation: |
| OS: ALL |
full decryptor for Softdefender V1.1 |
other shit
| crackme8 | Explanation: |
| OS: ALL |
crackme8 by noodlespa solved |
| 11.01.02 | RENAME THIS FILE BACK TO ZIP!!! |
| unpacking | Explanation: |
| OS: ALL |
A tutorial on general unpacking (GERMAN!) |
| protect v0.6.7 | Explanation: |
| OS: ALL |
finally i release a public version of it :))) people don't cry, it's damn incompatible so be warned... use it only @ tasm generated files!!! otherwise it will fail in 90% :))) |
