Update docs

This commit is contained in:
DSR! 2023-03-09 15:50:53 -03:00
parent 4711243480
commit 97984c77c9
6 changed files with 45 additions and 3 deletions

View File

@ -14,6 +14,8 @@
- Add RunAsDate - Add RunAsDate
- Add Keygener Assistant - Add Keygener Assistant
- Add CryptoTester - Add CryptoTester
- New Toolkit Extra: Oldies
- New Toolkit Extra: Unpacking
### Changed ### Changed

View File

@ -33,7 +33,7 @@ El mismo está en la carpeta `bin\updater\updater.exe`.
## Herramientas ## Herramientas
El toolkit está compuesto por 90 herramientas que cubren todo lo que podemos necesitar para la reversa y el análisis. <br/> El toolkit está compuesto por 94 herramientas que cubren todo lo que podemos necesitar para la reversa y el análisis. <br/>
Las herramientas están todas descargadas de sus páginas oficiales pero de todas formas se recomienda usarlas con cautela, en especial las que las paginas oficiales son hilos en foros y ese tipo de cosas. <br/> Las herramientas están todas descargadas de sus páginas oficiales pero de todas formas se recomienda usarlas con cautela, en especial las que las paginas oficiales son hilos en foros y ese tipo de cosas. <br/>
Para ver la lista completa de herramientas puedes [hacerlo aqui](TOOLS.md). Para ver la lista completa de herramientas puedes [hacerlo aqui](TOOLS.md).

View File

@ -32,7 +32,7 @@ You will find the binary in the folder `bin\updater\updater.exe`.
## Tool set ## Tool set
This toolkit is composed by 90 apps that cover everything we might need to perform reverse engineering and binary/malware analysis. <br/> This toolkit is composed by 94 apps that cover everything we might need to perform reverse engineering and binary/malware analysis. <br/>
Every tool has been downloaded from their original/official websites, but we still recommend you to use them with caution, specially those tools whose official pages are forum threads. Always exercise common sense. <br/> Every tool has been downloaded from their original/official websites, but we still recommend you to use them with caution, specially those tools whose official pages are forum threads. Always exercise common sense. <br/>
You can check the complete list of tools [here](TOOLS.md). You can check the complete list of tools [here](TOOLS.md).

View File

@ -30,7 +30,7 @@
## 工具集 ## 工具集
这个工具包由 90 个应用组成,涵盖了我们执行逆向工程和二进制/恶意软件分析可能需要的一切。 <br/> 这个工具包由 94 个应用组成,涵盖了我们执行逆向工程和二进制/恶意软件分析可能需要的一切。 <br/>
每个工具都是从他们的原发布地址/官网下载的,但是我们还是建议大家谨慎使用,尤其是那些官方页面是论坛线程的工具。经常运用常识。<br/> 每个工具都是从他们的原发布地址/官网下载的,但是我们还是建议大家谨慎使用,尤其是那些官方页面是论坛线程的工具。经常运用常识。<br/>
您可以在 [here](TOOLS.md) 查看完整的工具列表。 您可以在 [here](TOOLS.md) 查看完整的工具列表。

View File

@ -341,6 +341,26 @@ Unlike most archiving programs, UniExtract is not limited to **standard archives
***Developer:*** dswlab <br/> ***Developer:*** dswlab <br/>
***Description:*** This tool uses the technology of Virtual Machines. It can unpack various known & unknown shells. It is suitable for unpacking the shelled Trojan horse in virus analysis, and because all codes are run under the VM, they will not take any danger to your system. <br/> ***Description:*** This tool uses the technology of Virtual Machines. It can unpack various known & unknown shells. It is suitable for unpacking the shelled Trojan horse in virus analysis, and because all codes are run under the VM, they will not take any danger to your system. <br/>
### Magicmida *Available using the extra called: Unpacking*
***Web:*** https://github.com/Hendi48/Magicmida <br/>
***Developer:*** Hendi48 <br/>
***Description:*** Magicmida is a Themida auto-unpacker that works on some 32-bit applications. It works on all versions of Windows. <br/>
### NoVmp *Available using the extra called: Unpacking*
***Web:*** https://github.com/can1357/NoVmp <br/>
***Developer:*** Can Bölük <br/>
***Description:*** A static devirtualizer for VMProtect x64 3.x powered by VTIL. <br/>
### VMUnprotect *Available using the extra called: Unpacking*
***Web:*** https://github.com/void-stack/VMUnprotect <br/>
***Developer:*** voidstack <br/>
***Description:*** VMUnprotect is a project engaged in hunting virtualized VMProtect methods. It makes use of Harmony to dynamically read VMP behavior. Currently only supports method administration. Works on VMProtect 3.6.0 (Latest) and few versions back. <br/>
### VMUnprotect Dumper *Available using the extra called: Unpacking*
***Web:*** https://github.com/void-stack/VMUnprotect.Dumper <br/>
***Developer:*** voidstack <br/>
***Description:*** VMUnprotect.Dumper is a project engaged in hunting tampered VMProtect assemblies. It makes use of AsmResolver to dynamically unpack VMP protected assembly. Works on VMProtect 3.7.0 (Latest) and few versions back. <br/>
### XVolkolak ### XVolkolak
***Web:*** https://horsicq.github.io/ <br/> ***Web:*** https://horsicq.github.io/ <br/>
***Developer:*** Hors <br/> ***Developer:*** Hors <br/>

View File

@ -501,6 +501,26 @@ Unlike most archiving programs, UniExtract is not limited to **standard archives
***Developer:*** dswlab <br/> ***Developer:*** dswlab <br/>
***Description:*** This tool uses the technology of Virtual Machines. It can unpack various known & unknown shells. It is suitable for unpacking the shelled Trojan horse in virus analysis, and because all codes are run under the VM, they will not take any danger to your system. <br/> ***Description:*** This tool uses the technology of Virtual Machines. It can unpack various known & unknown shells. It is suitable for unpacking the shelled Trojan horse in virus analysis, and because all codes are run under the VM, they will not take any danger to your system. <br/>
### Magicmida *Available using the extra called: Unpacking*
***Web:*** https://github.com/Hendi48/Magicmida <br/>
***Developer:*** Hendi48 <br/>
***Description:*** Magicmida is a Themida auto-unpacker that works on some 32-bit applications. It works on all versions of Windows. <br/>
### NoVmp *Available using the extra called: Unpacking*
***Web:*** https://github.com/can1357/NoVmp <br/>
***Developer:*** Can Bölük <br/>
***Description:*** A static devirtualizer for VMProtect x64 3.x powered by VTIL. <br/>
### VMUnprotect *Available using the extra called: Unpacking*
***Web:*** https://github.com/void-stack/VMUnprotect <br/>
***Developer:*** voidstack <br/>
***Description:*** VMUnprotect is a project engaged in hunting virtualized VMProtect methods. It makes use of Harmony to dynamically read VMP behavior. Currently only supports method administration. Works on VMProtect 3.6.0 (Latest) and few versions back. <br/>
### VMUnprotect Dumper *Available using the extra called: Unpacking*
***Web:*** https://github.com/void-stack/VMUnprotect.Dumper <br/>
***Developer:*** voidstack <br/>
***Description:*** VMUnprotect.Dumper is a project engaged in hunting tampered VMProtect assemblies. It makes use of AsmResolver to dynamically unpack VMP protected assembly. Works on VMProtect 3.7.0 (Latest) and few versions back. <br/>
### XVolkolak ### XVolkolak
***Web:*** https://horsicq.github.io/ <br/> ***Web:*** https://horsicq.github.io/ <br/>
***Developer:*** Hors <br/> ***Developer:*** Hors <br/>