Jump to content
Maxim V. Bloomfield

Ψάχνω άτομο για υλοποίηση project

Recommended Posts

Maxim V. Bloomfield

Καλησπέρα!

Είμαι καινούργιος στο forum και αυτό είναι το πρώτο μου thread...

Λοιπόν, έχω ξεκινήσει να φτιάχνω μία δική μου γλώσσα προγραμματισμού

σε Visual Basic 6.0.Φτιάχνω ουσιαστικά έναν Interpreter που τον ονομάζω

TurboNerd v1.1 (έχω κάνει και άλλα πειράματα στο παρελθόν εξού και το 1.1),

και θα ήθελα να δω αν ενδιαφέρεται κανείς να συνεργαστούμε ώστε να βγεί ένα

καλό αποτέλεσμα... Ακολουθώ έναν 'δικό μου' ας πούμε τρόπο ο οποίος διαφέρει

από τους άλλους λεξικογραφικούς αναλύτες που χρησιμοποιούν και έχει ενδοαφερόν.

όποιος ενδιαφέρεται ας απαντήσει εδώ...

Share this post


Link to post
Share on other sites
gcoder

χρησιμοποιείς Flex & Bison ή κάτι αντίστοιχο για VB?

Αν δεν σου είναι κόπος και μπορείς πες μερικές λεπτομέρειες...

Share this post


Link to post
Share on other sites

Δημιουργήστε ένα λογαριασμό ή συνδεθείτε προκειμένου να το δείτε

Πρέπει να είστε μέλος για να μπορέσετε να αφήσετε κάποιο σχόλιο

Δημιουργία λογαριασμού

Κάντε μια δωρεάν εγγραφή στην κοινότητά μας. Η εγγραφές μας είναι εύκολες.!

Εγγραφή τώρα

Σύνδεση

Εάν έχετε ήδη λογαριασμό σε αυτό το Forum; Συνδεθείτε εδώ.

Συνδεθείτε τώρα

  • Μηνύματα

    • Anastasis
      HexRaysPyTools Plugin assists in creation classes/structures and detection virtual tables. Also helps to transform decompiler output faster and allows to make some stuff otherwise impossible. Was introduced at ZeroNights 2016 (slides). Features 1) Structure Creation Best to use with Class Informer plugin, because it helps to automatically get original names of the classes.   Structure Builder (Alt + F8) The place where all collected information about scanned variables can be viewed and modified. Two ways to collect information: Right Click on variable -> Scan Variable. Recognizes fields usage within current function Right Click on variable -> Deep Scan Variable. First recursively touches functions to make Ida recognize proper arguments (it happens only once for each function during session). Than recursively applies scanner to variables and functions that get our structure pointer as argument. Types with BOLD font are virtual tables. Double click opens list with all virtual functions that helps to visit them. Visited functions are marked with cross and color: Types with ITALIC font have been found as void * arguments and are not used in shape recognition. Double click on Field’s names to edit Double click on offset opens window with every places where this type has been extracted. Click “Ok” button to open selected place in pseudocode window: Finalize – opens window with editable C-like declaration and assigns new type to all scanned variables. Disable, Enable – are used for collision resolution. Origin – switches base from which offset to produce new fields to structure (this value will be added to every offset of new scanned variable). Array – makes selected field as array, the size of which is calculated automatically. Pack – creates and substitutes substructure for selected items (collisions for this items should be resolved). Unpack – dismembers selected structure and adds all it’s fields to builder Remove – removes information about selected fields. Clear – clears everything. Recognize Shape – looks for appropriate structure for selected fields. 2) Disassembler code manipulations Structures with given size Usage: In Pseudocode viewer, right click on number -> “Structures with this size”. (hotkey W) Select library in which find structures Select structure. Number will become sizeof(Structure Name) and type will be imported to Local Types Recognition of structures by shapes Helps to find suitable structure by information gleaned from pseudocode after variable scanning. Usage: Method 1 Right click on variable with LEGAL_TYPE (See structure builder) -> Select “Recognize Shape”. Select structure. Type of variable will be changed automatically. Method 2 Clear Structure Builder if it’s currently used. Right click on variables supposed to be the same -> “Scan Variable”. Edit types (will be implemented later), disable or remove uninteresting fields and click button “Recognize Shape”. You can selected several fields and try to recognize shape for them. If found and selected, they will be replaced by new structure. After final structure selection, types of all scanned variables will be changed automatically. Install Just copy HexRaysPyTools.py file and HexRaysPyTools directory to Ida plugins directory Use Source: https://github.com/igogo-x86/
    • Anastasis
      Androguard Reverse engineering, Malware and goodware analysis of Android applications … and more (ninja !) Features Androguard is a full python tool to play with Android files. DEX, ODEX APK Android’s binary xml Android resources Disassemble DEX/ODEX bytecodes Decompiler for DEX/ODEX files Changelog v3.2.1 Small bugfixes Installation Tool androarsc Usage: androarsc.py [options] Options: -h, --help show this help message and exit -i INPUT, --input=INPUT filename input (APK or android resources(arsc)) -p PACKAGE, --package=PACKAGE select the package (optional) -l LOCALE, --locale=LOCALE select the locale (optional) -t TYPE, --type=TYPE select the type (string, interger, public, ...) -o OUTPUT, --output=OUTPUT filename output -v, --version version of the API     androauto Usage: androauto.py [options] Options: -h, --help show this help message and exit -d DIRECTORY, --directory=DIRECTORY directory input -v, --verbose add debug   androaxml Usage: androaxml.py [options] Options: -h, --help show this help message and exit -i INPUT, --input=INPUT filename input (APK or android's binary xml) -o OUTPUT, --output=OUTPUT filename output of the xml -v, --version version of the API   androdd Usage: androdd.py [options] Options: -h, --help show this help message and exit -i INPUT, --input=INPUT file : use this filename -o OUTPUT, --output=OUTPUT base directory to output all files -d DECOMPILER, --decompiler=DECOMPILER choose a decompiler -j, --jar output jar file -f FORMAT, --format=FORMAT write the method in specific format (png, ...) -l LIMIT, --limit=LIMIT limit analysis to specific methods/classes by using a regexp   androdis Usage: androdis.py [options] Options: -h, --help show this help message and exit -i INPUT, --input=INPUT file : use this filename (DEX/ODEX) -o OFFSET, --offset=OFFSET offset to disassemble -s SIZE, --size=SIZE size   androgui usage: androgui.py [-h] [-d] [-i INPUT_FILE] [-p INPUT_PLUGIN] Androguard GUI optional arguments: -h, --help show this help message and exit -d, --debug -i INPUT_FILE, --input_file INPUT_FILE -p INPUT_PLUGIN, --input_plugin INPUT_PLUGIN   androlyze androlyze is a tool that spawns an IPython shell.   Copyright (C) 2012 – 2016, Anthony Desnos (desnos at t0t0.fr) All rights reserved. Source: https://github.com/androguard/
    • Anastasis
      Seeker utilizes HTML5, Javascript, JQuery and PHP to grab Device Information and GeoLocation with High Accuracy. Other tools and services offer IP Geolocation which is not very accurate and does not give location of user. Generally if a user accepts location permsission, Accuracy of the information recieved is accurate to approximately 30 meters. Note : On iPhone due to some reason location accuracy is approximately 65 meters.
      It Hosts a fake website on Apache Server and uses Ngrok to generate a SSL link which asks for Location Permission and if the user allows it, we can get : Longitude Latitude Accuracy Altitude - Not always available Direction - Only available if user is moving Speed - Only available if user is moving Along with Location Information we can also get Device Information without any permissions : Operating System Platform Number of CPU Cores Amount of RAM - Approximate Results Screen Resolution GPU information Browser Name and Version Public IP Address
      Tested On : Kali Linux 2018.2 Ubuntu 18.04
      Requirements
      Supports both Python2 and Python3.
      Seeker uses common standard python modules : os time json requests subprocess
      Installation git clone https://github.com/thewhiteh4t/seeker.git cd seeker/ chmod 777 install.sh ./install.sh #After Installation just type seeker in console
      Screenshots

         
        Download Seeker
    • Anastasis
      Domain Hijacking is a well-known security issue that can be carried in many different ways. In addition to social engineering or unauthorized access to the domain owner’s account, the exploitation of neglected DNS records configured for cloud services is increasingly common. In the latter case, a threat actor (TA) can potentially take control of a subdomain configured for a disused or legacy third party cloud service allowing them to then launch a variety of attacks against your organization. Third party cloud services are an extremely common turnkey solution, used by many organizations, big and small. The configuration is simple: use the cloud service to create the resource you desire and then redirect clients from your subdomain to the third-party cloud service, using records such as CNAME or DNAME.   Abandoned domains or subdomains occur when an organization stops using a cloud service and forget to remove or update the DNS records pointing to them. Additionally, organizations may forget to re-register domain names allowing them to be purchased by anyone.   These abandoned domains and subdomains expose organizations to potential hijacking and takeover attacks.
        ARE YOU VULNERABLE TO DOMAIN HIJACKING?
    • dichvusocks
      Payment Instantly perfectmoney, bitcoin, wmtransfer, wex, ETH (Please click Buy Socks)
      Update Tools Client Dichvusocks.us http://dichvusocks.us/tools.php Link check socks http://check.dichvusocks.us/
      LIVE | 50.63.153.173:24960 | 0.15 | Arizona | 85260 | ip-50-63-153-173.ip.secureserver.net | United States | Blacklist: Yes | Checked at http://dichvusocks.us
      LIVE | 95.110.227.5:53773 | 0.66 | Toscana | 52100 | host5-227-110-95.serverdedicati.aruba.it | Italy | Blacklist: Yes | Checked at http://dichvusocks.us
      LIVE | 27.116.51.76:6667 | 1.01 | Unknow | Unknow | N/A | India | Blacklist: Yes | Checked at http://dichvusocks.us
      LIVE | 91.142.208.125:40045 | 0.61 | Madrid | 28001 | tangerinrestore.vservers.es | Spain | Blacklist: Yes | Checked at http://dichvusocks.us
      LIVE | 37.187.4.181:443 | 0.54 | Unknow | Unknow | ks3367480.kimsufi.com | France | Blacklist: Yes | Checked at http://dichvusocks.us
      LIVE | 103.216.82.30:6667 | 1.02 | Gujarat | 395006 | N/A | India | Blacklist: Yes | Checked at http://dichvusocks.us
      LIVE | 91.122.14.44:57684 | 0.75 | Saint Petersburg City | 190923 | ppp91-122-14-44.pppoe.avangarddsl.ru | Russian Federation | Blacklist: Yes | Checked at http://dichvusocks.us
      LIVE | 188.120.253.251:58832 | 0.67 | Unknow | Unknow | icecream-studio.ru | Russian Federation | Blacklist: Yes | Checked at http://dichvusocks.us
      LIVE | 78.155.219.48:8000 | 0.7 | Moscow City | 102487 | N/A | Russian Federation | Blacklist: Yes | Checked at http://dichvusocks.us
      LIVE | 78.46.140.2:443 | 0.56 | Unknow | Unknow | static.2.140.46.78.clients.your-server.de | Germany | Blacklist: Yes | Checked at http://dichvusocks.us
      LIVE | 46.101.165.185:8124 | 0.6 | Slough | EC2V | N/A | United Kingdom | Blacklist: Yes | Checked at http://dichvusocks.us
      LIVE | 95.110.229.22:44423 | 0.6 | Toscana | 52100 | www.freestyleweb.it | Italy | Blacklist: Yes | Checked at http://dichvusocks.us
      LIVE | 45.76.98.55:443 | 0.47 | Tokyo | 143-0006 | kolegov1.itgmail.com.nbrz.ru | Japan | Blacklist: No | Checked at http://dichvusocks.us
      LIVE | 146.252.241.88:54948 | 0.17 | Virginia | 20149 | N/A | United States | Blacklist: Yes | Checked at http://dichvusocks.us
      LIVE | 150.129.171.51:6667 | 1.16 | Gujarat | 364710 | N/A | India | Blacklist: Yes | Checked at http://dichvusocks.us
      LIVE | 95.110.224.30:13728 | 1.64 | Toscana | 52100 | ecommerce.eniaweb.com | Italy | Blacklist: Yes | Checked at http://dichvusocks.us
      LIVE | 150.129.52.75:6667 | 1.07 | Gujarat | 394601 | N/A | India | Blacklist: Yes | Checked at http://dichvusocks.us
      LIVE | 119.28.191.18:7070 | 0.71 | Beijing | Unknow | N/A | China | Blacklist: Yes | Checked at http://dichvusocks.us
×