diff --git a/bin/installer/build-docs.bat b/bin/installer/build-docs.bat index 5f78c38..d370185 100644 --- a/bin/installer/build-docs.bat +++ b/bin/installer/build-docs.bat @@ -9,5 +9,6 @@ cmd /c npx marked --gfm -i README.zh_CN.md -o README.zh_CN.html cmd /c npx marked --gfm -i README.ES.md -o README.ES.html cmd /c npx marked --gfm -i README.md -o README.html cmd /c npx marked --gfm -i TOOLS.md -o TOOLS.html +cmd /c npx marked --gfm -i TOOLS-LITE.md -o TOOLS.html pause diff --git a/bin/installer/build.txt b/bin/installer/build.txt index dcb9632..989c503 100644 --- a/bin/installer/build.txt +++ b/bin/installer/build.txt @@ -1,7 +1,8 @@ Microsoft Windows [Version 10.0.19045.2364] (c) Microsoft Corporation. All rights reserved. -C:\Users\DSR\Documents\GitHub\toolkit\bin\installer>python generate-sections.py -f C:\Users\DSR\Documents\GitHub\toolkit\toolkit +C:\code\toolkit\bin\installer>python generate-sections.py -f C:\code\toolkit\toolkit -o C:\code\toolkit\bin\installer\full +[*] Analyzing folder: Analysis [+] Process: 4n4lDetector [*] Adding: "4N4LDetector.exe" [!] force link creation @@ -14,9 +15,6 @@ C:\Users\DSR\Documents\GitHub\toolkit\bin\installer>python generate-sections.py [!!!] Find multiple exes. Grabbing the first! [*] Adding: "die.exe" [!] force link creation -[+] Process: ExeExplorer - [!!!] Find multiple exes. Grabbing the first! - [*] Adding: "EXE.exe" [+] Process: ExeinfoPe [*] Adding: "exeinfope.exe" [!] force link creation @@ -24,16 +22,10 @@ C:\Users\DSR\Documents\GitHub\toolkit\bin\installer>python generate-sections.py [*] Adding: "PE-bear.exe" [!] force link creation [!] x64 exe -[+] Process: PEiD - [*] Adding: "PEiD.exe" - [!] force link creation [+] Process: PEStudio [*] Adding: "pestudio.exe" [!] force link creation [!] x64 exe -[+] Process: ProtectionID - [*] Adding: "Protection_ID.eXe" - [!] force link creation [+] Process: XAPKDetector [!!!] Find multiple exes. Grabbing the first! [*] Adding: "xapkd.exe" @@ -44,6 +36,9 @@ C:\Users\DSR\Documents\GitHub\toolkit\bin\installer>python generate-sections.py [+] Process: XPEViewer [*] Adding: "xpeviewer.exe" [!] force link creation + + +[*] Analyzing folder: Decompilers [+] Process: [ANDROID] JADX [*] Adding: "jadx-gui.exe" [!] force link creation @@ -59,19 +54,12 @@ C:\Users\DSR\Documents\GitHub\toolkit\bin\installer>python generate-sections.py [!] CLI exe [*] Adding: "UnAutoIt-windows-i686.exe" [!] CLI exe -[+] Process: [DELPHI] Dede - [*] Adding: "DeDe.exe" - [!] force link creation [+] Process: [DELPHI] IDR [*] Adding: "Idr.exe" [!] force link creation [+] Process: [DOTNET] dnSpyEx [*] Adding: "dnSpy.exe" [!] x64 exe -[+] Process: [DOTNET] GrayWolf - [!] Iterate sub folder: "C:\Users\DSR\Documents\GitHub\toolkit\toolkit\Decompilers\[DOTNET] GrayWolf\GrayWolf - 1.88" - [*] Adding: "GrayWolf_188.exe" - [!] force link creation [+] Process: [DOTNET] ILSpy [*] Adding: "ILSpy.exe" [!] force link creation @@ -86,27 +74,19 @@ C:\Users\DSR\Documents\GitHub\toolkit\bin\installer>python generate-sections.py [+] Process: [VB] VB Decompiler [*] Adding: "VB Decompiler.exe" [!] force link creation -[+] Process: BDASM - [*] Adding: "bdasm.exe" - [!] force link creation + + +[*] Analyzing folder: Dissasembler [+] Process: Cutter [!!!] Find multiple exes. Grabbing the first! [*] Adding: "cutter.exe" [!] x64 exe -[+] Process: Immunity Debugger - [!!!] Find multiple exes. Grabbing the first! - [*] Adding: "ImmunityDebugger.exe" - [!] force link creation -[+] Process: OllyDbg 1.10 - [*] Adding: "OLLYDBG.EXE" - [!] force link creation -[+] Process: w32Dasm - [!] Iterate sub folder: "C:\Users\DSR\Documents\GitHub\toolkit\toolkit\Dissasembler\w32Dasm\[HiEndsoft] w32Dasm - 8.93" - [*] Adding: "W32DSM89.EXE" - [!] force link creation [+] Process: x64dbg [*] Adding: "x96dbg.exe" [!] force link creation + + +[*] Analyzing folder: HEX Editor [+] Process: HxD [*] Adding: "HxD32.exe" [*] Adding: "HxD64.exe" @@ -119,6 +99,9 @@ C:\Users\DSR\Documents\GitHub\toolkit\bin\installer>python generate-sections.py [*] Adding: "rehex.exe" [!] force link creation [!] x64 exe + + +[*] Analyzing folder: Monitor [+] Process: Api Monitor [*] Adding: "apimonitor-x64.exe" [!] x64 exe @@ -154,6 +137,9 @@ C:\Users\DSR\Documents\GitHub\toolkit\bin\installer>python generate-sections.py [*] Adding: "Procmon.exe" [*] Adding: "Procmon64.exe" [!] x64 exe +[+] Process: RegistryChangesView + [*] Adding: "RegistryChangesView.exe" + [!] force link creation [+] Process: RegShot [*] Adding: "Regshot-x64-ANSI.exe" [!] x64 exe @@ -161,15 +147,18 @@ C:\Users\DSR\Documents\GitHub\toolkit\bin\installer>python generate-sections.py [+] Process: SysAnalyzer [*] Adding: "sysAnalyzer.exe" [+] Process: System Informer - [!] Iterate sub folder: "C:\Users\DSR\Documents\GitHub\toolkit\toolkit\Monitor\System Informer\amd64" + [!] Iterate sub folder: "C:\code\toolkit\toolkit\Monitor\System Informer\amd64" [*] Adding: "SystemInformer.exe" [!] x64 exe - [!] Iterate sub folder: "C:\Users\DSR\Documents\GitHub\toolkit\toolkit\Monitor\System Informer\i386" + [!] Iterate sub folder: "C:\code\toolkit\toolkit\Monitor\System Informer\i386" [*] Adding: "SystemInformer.exe" [+] Process: TCPView [*] Adding: "tcpview.exe" [*] Adding: "tcpview64.exe" [!] x64 exe + + +[*] Analyzing folder: NFOMaker [+] Process: Ascii Generator 2 [*] Adding: "Ascgen2.exe" [!] force link creation @@ -179,6 +168,9 @@ C:\Users\DSR\Documents\GitHub\toolkit\bin\installer>python generate-sections.py [+] Process: NFO Maker [*] Adding: "nfomaker.exe" [!] force link creation + + +[*] Analyzing folder: Other [+] Process: APKEasyTool [!!!] Find multiple exes. Grabbing the first! [*] Adding: "apkeasytool.exe" @@ -190,49 +182,22 @@ C:\Users\DSR\Documents\GitHub\toolkit\bin\installer>python generate-sections.py [+] Process: AstroGrep [*] Adding: "AstroGrep.exe" [!] force link creation -[+] Process: AVFucker - [*] Adding: "AVFucker.exe" - [!] force link creation -[+] Process: DLest - [!!!] Find multiple exes. Grabbing the first! - [*] Adding: "dlest32.exe" [+] Process: FLOSS [*] Adding: "floss.exe" [!] force link creation [!] x64 exe [!] CLI exe -[+] Process: GetSymbol - [*] Adding: "GetSymbol.exe" - [!] force link creation - [!] x64 exe -[+] Process: HashCalc - [*] Adding: "HashCalc.exe" - [!] force link creation [+] Process: HashMyFiles [*] Adding: "HashMyFiles.exe" [!] force link creation -[+] Process: ImpREC - [!] Iterate sub folder: "C:\Users\DSR\Documents\GitHub\toolkit\toolkit\Other\ImpREC\ImpREC - 1.7f" - [*] Adding: "ImportREC.exe" - [!] force link creation -[+] Process: Indetectables Offset Locator - [!!!] Find multiple exes. Grabbing the first! - [*] Adding: "Indetectables Offset Locator.exe" - [!] force link creation [+] Process: ProcDOT - [!] Iterate sub folder: "C:\Users\DSR\Documents\GitHub\toolkit\toolkit\Other\ProcDOT\win32" + [!] Iterate sub folder: "C:\code\toolkit\toolkit\Other\ProcDOT\win32" [!!!] Find multiple exes. Grabbing the first! [*] Adding: "procdot.exe" - [!] Iterate sub folder: "C:\Users\DSR\Documents\GitHub\toolkit\toolkit\Other\ProcDOT\win64" + [!] Iterate sub folder: "C:\code\toolkit\toolkit\Other\ProcDOT\win64" [!!!] Find multiple exes. Grabbing the first! [*] Adding: "procdot.exe" [!] x64 exe -[+] Process: Process-Dump - [*] Adding: "pd32.exe" - [!] CLI exe - [*] Adding: "pd64.exe" - [!] x64 exe - [!] CLI exe [+] Process: RawCap [*] Adding: "RawCap.exe" [!] force link creation @@ -240,12 +205,8 @@ C:\Users\DSR\Documents\GitHub\toolkit\bin\installer>python generate-sections.py [+] Process: Resource Hacker [*] Adding: "ResourceHacker.exe" [!] force link creation -[+] Process: Scylla - [*] Adding: "Scylla_x64.exe" - [!] x64 exe - [*] Adding: "Scylla_x86.exe" -[+] Process: ShowString - [*] Adding: "showstring.exe" +[+] Process: RunAsDate + [*] Adding: "RunAsDate.exe" [!] force link creation [+] Process: Strings [*] Adding: "strings.exe" @@ -253,11 +214,61 @@ C:\Users\DSR\Documents\GitHub\toolkit\bin\installer>python generate-sections.py [*] Adding: "strings64.exe" [!] x64 exe [!] CLI exe -[+] Process: Threadtear - [*] Adding jar: "threadtear-gui-all.jar" [+] Process: VirusTotalUploader [*] Adding: "uploader.exe" [!] force link creation + + +[*] Analyzing folder: Reverse +[+] Process: AT4RE Patcher + [!] Iterate sub folder: "C:\code\toolkit\toolkit\Reverse\AT4RE Patcher\AT4RE Patcher - 0.7.6" + [!!!] Find multiple exes. Grabbing the first! + [*] Adding: "AT4RE Patcher.exe" + [!] force link creation +[+] Process: CryptoTester + [*] Adding: "CryptoTester.exe" + [!] force link creation +[+] Process: DLest + [*] Adding: "dlest32.exe" + [!] force link creation + [*] Adding: "dlest64.exe" + [!] force link creation + [!] x64 exe +[+] Process: dUP + [!] Iterate sub folder: "C:\code\toolkit\toolkit\Reverse\dUP\dUP - 2.26.1" + [!!!] Find multiple exes. Grabbing the first! + [*] Adding: "dup2.exe" + [!] force link creation +[+] Process: ExtremeDumper + [*] Adding: "ExtremeDumper-x86.exe" + [!] force link creation + [!] CLI exe + [*] Adding: "ExtremeDumper.exe" + [!] force link creation + [!] CLI exe +[+] Process: GetSymbol + [*] Adding: "GetSymbol.exe" + [!] force link creation + [!] x64 exe +[+] Process: Keygener Assistant + [*] Adding: "keyAssistant.exe" +[+] Process: Process-Dump + [*] Adding: "pd32.exe" + [!] force link creation + [!] CLI exe +[+] Process: Scylla + [*] Adding: "Scylla_x64.exe" + [!] x64 exe + [*] Adding: "Scylla_x86.exe" +[+] Process: Threadtear + [*] Adding jar: "threadtear-gui-all.jar" +[+] Process: uPPP + [*] Adding: "uPPP.exe" + [!] force link creation +[+] Process: WinAPI Search + [*] Adding: "WinApiSearch32.exe" + [*] Adding: "WinApiSearch64.exe" + [!] x64 exe [+] Process: x64dbgPluginManager [!!!] Find multiple exes. Grabbing the first! [*] Adding: "x64plgmnr.exe" @@ -266,19 +277,9 @@ C:\Users\DSR\Documents\GitHub\toolkit\bin\installer>python generate-sections.py [*] Adding: "xocalc.exe" [!] force link creation [!] x64 exe -[+] Process: AT4RE Patcher - [!] Iterate sub folder: "C:\Users\DSR\Documents\GitHub\toolkit\toolkit\Patcher\AT4RE Patcher\AT4RE Patcher - 0.7.6" - [!!!] Find multiple exes. Grabbing the first! - [*] Adding: "AT4RE Patcher.exe" - [!] force link creation -[+] Process: dUP - [!] Iterate sub folder: "C:\Users\DSR\Documents\GitHub\toolkit\toolkit\Patcher\dUP\dUP - 2.26.1" - [!!!] Find multiple exes. Grabbing the first! - [*] Adding: "dup2.exe" - [!] force link creation -[+] Process: uPPP - [*] Adding: "uPPP.exe" - [!] force link creation + + +[*] Analyzing folder: Rootkits Detector [+] Process: GMER [*] Adding: "gmer.exe" [!] force link creation @@ -290,43 +291,32 @@ C:\Users\DSR\Documents\GitHub\toolkit\bin\installer>python generate-sections.py [*] Adding: "WKE64.exe" [!] force link creation [!] x64 exe + + +[*] Analyzing folder: UnPacking [+] Process: De4Dot [*] Adding: "de4dot-x64.exe" [!] x64 exe [!] CLI exe [*] Adding: "de4dot.exe" [!] CLI exe -[+] Process: GUnPacker - [*] Adding: "GUnPacker v0.5.exe" - [!] force link creation -[+] Process: NETUnpack - [*] Adding: "NETUnpack-64.exe" - [!] force link creation - [!] x64 exe - [*] Adding: "NETUnpack.exe" - [!] force link creation [+] Process: QUnpack - [!] Iterate sub folder: "C:\Users\DSR\Documents\GitHub\toolkit\toolkit\UnPacking\QUnpack\QUnpack - 4.3" - [!] Iterate sub folder: "C:\Users\DSR\Documents\GitHub\toolkit\toolkit\UnPacking\QUnpack\QUnpack - 4.3\QUnpack32" + [!] Iterate sub folder: "C:\code\toolkit\toolkit\UnPacking\QUnpack\QUnpack - 4.3" + [!] Iterate sub folder: "C:\code\toolkit\toolkit\UnPacking\QUnpack\QUnpack - 4.3\QUnpack32" [*] Adding: "Explorer.exe" [!] force link creation - [!] Iterate sub folder: "C:\Users\DSR\Documents\GitHub\toolkit\toolkit\UnPacking\QUnpack\QUnpack - 4.3\QUnpack64" + [!] Iterate sub folder: "C:\code\toolkit\toolkit\UnPacking\QUnpack\QUnpack - 4.3\QUnpack64" [*] Adding: "Explorer.exe" [!] force link creation [!] x64 exe -[+] Process: RL!dePacker - [*] Adding: "RL!dePacker.exe" - [!] force link creation [+] Process: UniExtract [!!!] Find multiple exes. Grabbing the first! [*] Adding: "UniExtract.exe" [!] force link creation -[+] Process: VMUnpacker - [!] Iterate sub folder: "C:\Users\DSR\Documents\GitHub\toolkit\toolkit\UnPacking\VMUnpacker\VMUnpacker - 1.6" - [*] Adding: "VMUnpacker.exe" - [!] force link creation [+] Process: XVolkolak [*] Adding: "xvlk.exe" [!] force link creation -[+] Generate cli register code \ No newline at end of file + + +[+] Generate cli register code diff --git a/bin/installer/full/sections/analysis.iss b/bin/installer/full/sections/analysis.iss index 8b3204f..39db3b8 100644 --- a/bin/installer/full/sections/analysis.iss +++ b/bin/installer/full/sections/analysis.iss @@ -37,19 +37,6 @@ Name: "{#MyAppBinsFolder}\sendto\sendto\Analysis\DIE"; Filename: "{#MyAppToolsFo -; ExeExplorer -[Components] -Name: "analysis\exeexplorer"; Description: "ExeExplorer"; Types: full; - -[Files] -Source: "{#MySrcDir}\toolkit\Analysis\ExeExplorer\*"; DestDir: "{#MyAppToolsFolder}\Analysis\ExeExplorer"; Components: "analysis\exeexplorer"; Flags: ignoreversion recursesubdirs createallsubdirs; - -[Icons] -Name: "{group}\ExeExplorer"; Filename: "{#MyAppToolsFolder}\Analysis\ExeExplorer\EXE.exe"; WorkingDir: "{#MyAppToolsFolder}\Analysis\ExeExplorer"; Components: "analysis\exeexplorer"; Check: not Is64BitInstallMode; -Name: "{#MyAppBinsFolder}\sendto\sendto\Analysis\ExeExplorer"; Filename: "{#MyAppToolsFolder}\Analysis\ExeExplorer\EXE.exe"; WorkingDir: "{#MyAppToolsFolder}\Analysis\ExeExplorer"; Components: "analysis\exeexplorer"; Check: not Is64BitInstallMode; - - - ; ExeinfoPe [Components] Name: "analysis\exeinfope"; Description: "ExeinfoPe"; Types: full compact; diff --git a/bin/installer/lite/clean-old-tools.bat b/bin/installer/lite/clean-old-tools.bat index 10c518f..793046f 100644 --- a/bin/installer/lite/clean-old-tools.bat +++ b/bin/installer/lite/clean-old-tools.bat @@ -4,7 +4,6 @@ cd "..\..\..\" :: Analysis RMDIR "toolkit\Analysis\4n4lDetector" /S /Q -RMDIR "toolkit\Analysis\ExeExplorer" /S /Q RMDIR "toolkit\Analysis\XAPKDetector" /S /Q RMDIR "toolkit\Analysis\XPEViewer" /S /Q