Jump to content

cr4ckerK9

Members
  • Posts

    10
  • Joined

  • Last visited

Everything posted by cr4ckerK9

  1. RC6 Source Code /* This is an independent implementation of the encryption algorithm: */ /* */ /* RC6 by Ron Rivest and RSA Labs */ /* */ /* which is a candidate algorithm in the Advanced Encryption Standard */ /* programme of the US National Institute of Standards and Technology. */ /* */ /* Copyright in this implementation is held by Dr B R Gladman but I */ /* hereby give permission for its free direct or derivative use subject */ /* to acknowledgment of its origin and compliance with any conditions */ /* that the originators of the algorithm place on its exploitation. */ /* */ /* Dr Brian Gladman (gladman@seven77.demon.co.uk) 14th January 1999 */ /* Timing data for RC6 (rc6.c) 128 bit key: Key Setup: 1632 cycles Encrypt: 270 cycles = 94.8 mbits/sec Decrypt: 226 cycles = 113.3 mbits/sec Mean: 248 cycles = 103.2 mbits/sec 192 bit key: Key Setup: 1885 cycles Encrypt: 267 cycles = 95.9 mbits/sec Decrypt: 235 cycles = 108.9 mbits/sec Mean: 251 cycles = 102.0 mbits/sec 256 bit key: Key Setup: 1877 cycles Encrypt: 270 cycles = 94.8 mbits/sec Decrypt: 227 cycles = 112.8 mbits/sec Mean: 249 cycles = 103.0 mbits/sec */ #include "../std_defs.h" static char *alg_name[] = { "rc6", "rc6.c", "rc6" }; char **cipher_name() { return alg_name; } #define f_rnd(i,a,b,c,d) \ u = rotl(d * (d + d + 1), 5); \ t = rotl(b * (b + b + 1), 5); \ a = rotl(a ^ t, u) + l_key[i]; \ c = rotl(c ^ u, t) + l_key[i + 1] #define i_rnd(i,a,b,c,d) \ u = rotl(d * (d + d + 1), 5); \ t = rotl(b * (b + b + 1), 5); \ c = rotr(c - l_key[i + 1], t) ^ u; \ a = rotr(a - l_key[i], u) ^ t u4byte l_key[44]; /* storage for the key schedule */ /* initialise the key schedule from the user supplied key */ u4byte *set_key(const u4byte in_key[], const u4byte key_len) { u4byte i, j, k, a, b, l[8], t; l_key[0] = 0xb7e15163; for(k = 1; k < 44; ++k) l_key[k] = l_key[k - 1] + 0x9e3779b9; for(k = 0; k < key_len / 32; ++k) l[k] = in_key[k]; t = (key_len / 32) - 1; // t = (key_len / 32); a = b = i = j = 0; for(k = 0; k < 132; ++k) { a = rotl(l_key[i] + a + b, 3); b += a; b = rotl(l[j] + b, ; l_key[i] = a; l[j] = b; i = (i == 43 ? 0 : i + 1); // i = (i + 1) % 44; j = (j == t ? 0 : j + 1); // j = (j + 1) % t; } return l_key; }; /* encrypt a block of text */ void encrypt(const u4byte in_blk[4], u4byte out_blk[4]) { u4byte a,b,c,d,t,u; a = in_blk[0]; b = in_blk[1] + l_key[0]; c = in_blk[2]; d = in_blk[3] + l_key[1]; f_rnd( 2,a,b,c,d); f_rnd( 4,b,c,d,a); f_rnd( 6,c,d,a,; f_rnd( 8,d,a,b,c); f_rnd(10,a,b,c,d); f_rnd(12,b,c,d,a); f_rnd(14,c,d,a,; f_rnd(16,d,a,b,c); f_rnd(18,a,b,c,d); f_rnd(20,b,c,d,a); f_rnd(22,c,d,a,; f_rnd(24,d,a,b,c); f_rnd(26,a,b,c,d); f_rnd(28,b,c,d,a); f_rnd(30,c,d,a,; f_rnd(32,d,a,b,c); f_rnd(34,a,b,c,d); f_rnd(36,b,c,d,a); f_rnd(38,c,d,a,; f_rnd(40,d,a,b,c); out_blk[0] = a + l_key[42]; out_blk[1] = b; out_blk[2] = c + l_key[43]; out_blk[3] = d; }; /* decrypt a block of text */ void decrypt(const u4byte in_blk[4], u4byte out_blk[4]) { u4byte a,b,c,d,t,u; d = in_blk[3]; c = in_blk[2] - l_key[43]; b = in_blk[1]; a = in_blk[0] - l_key[42]; i_rnd(40,d,a,b,c); i_rnd(38,c,d,a,; i_rnd(36,b,c,d,a); i_rnd(34,a,b,c,d); i_rnd(32,d,a,b,c); i_rnd(30,c,d,a,; i_rnd(28,b,c,d,a); i_rnd(26,a,b,c,d); i_rnd(24,d,a,b,c); i_rnd(22,c,d,a,; i_rnd(20,b,c,d,a); i_rnd(18,a,b,c,d); i_rnd(16,d,a,b,c); i_rnd(14,c,d,a,; i_rnd(12,b,c,d,a); i_rnd(10,a,b,c,d); i_rnd( 8,d,a,b,c); i_rnd( 6,c,d,a,; i_rnd( 4,b,c,d,a); i_rnd( 2,a,b,c,d); out_blk[3] = d - l_key[1]; out_blk[2] = c; out_blk[1] = b - l_key[0]; out_blk[0] = a; };
  2. Error The file could not be found. Please check the download link. thx.
  3. RapidShare: Easy Filehosting Error The file could not be found. Please check the download link. upload again thx.
  4. you can upload sourec code M4sT3r Trojan v2.0 to me ??? thx.
  5. The Big Book of Windows Hacks,Tips and Tools Author: Preston Gralla Paperback: 652 pages Publisher: O'Reilly Media, Inc.; 1 edition (October 23, 2007) Language: English ISBN-10: 0596528353 ISBN-13: 978-0596528355 Format: pdf Details: Bigger, better, and broader in scope, the Big Book of Windows Hacks gives you everything you need to get the most out of your Windows Vista or XP system, including its related applications and the hardware it runs on or connects to. Whether you want to tweak Vista's Aero interface, build customized sidebar gadgets and run them from a USB key, or hack the "unhackable" screensavers, you'll find quick and ingenious ways to bend these recalcitrant operating systems to your will. The Big Book of Windows Hacks focuses on Vista, the new bad boy on Microsoft's block, with hacks and workarounds that also work for Windows XP. You can read each hack in just a few minutes, saving countless hours of searching for the right answer. The step-by-step instructions let you apply the solutions in no time. This book takes you beyond the operating system with hacks for applications like Internet Explorer 7 and Office 2007, and hardware such as the Zune, your wireless router, and the PC itself. The Big Book of Windows Hacks includes: Expanded tutorials, new background material, a series of "quick hacks", and informative sidebars Security hacks, including protection at wireless hotspots, hacking Vista file permissions and user account protection, and more Efficiency hacks, such as tweaking your PC hardware, troubleshooting hardware problems, and speeding up system performance Fun hacks, like building a custom Media Center PC or turning a PC into a digital video recorder "Beyond Windows" hacks for running Linux inside Vista, dual-booting Linux/Windows or XP/Vista, or emulate classic video games on your PC In all, this remarkable book contains more than 100 hacks so that the power user in you never again needs to be at the mercy of systems and hardware run by Microsoft's omnipotent Vista and XP operating systems. Download: RapidShare: Easy Filehosting RapidShare: Easy Filehosting RapidShare: Easy Filehosting
  6. Pro Decrypting VBScript Viruses Author: Martini Fakhrou Paperback: 46 pages Publisher: MARTANI eXpress (April 2008) Language English ISBN-10: N/A ISBN-13: N/A Format: pdf Details: In this book, you will learn how to decrypt a VBScript and find the original source code; it will also teach you a number of techniques used by hackers to protect their source code. That may be so effective for use with your own code or your secret algorithms, which is very useful. This book will not talk about the virus behavior or its VBScript specified functions right now (another book will discuss the VBScript viruses behavior wait for it?, you check for other related books), it is intended to discuss the methods hackers use to obfuscate their source code so others can’t understand it. And AVs cannot just detect the threats so early. I gave also some examples about some easy-to-understand viruses and other algorithms I found on the web, so they can make a good base you can start from, I also mention some ways of decrypting Encoded scripts by the WSD (Windows Script Decoder), but I don’t provide any tools or real codes (you know Microsoft and the Copyrights!!!!). Also, this book supposes that you have a little knowledge about VBScript and scripting in general. It will not teach you VBScript, if you wish learn VBScript those books are so good to start: wrox vbscript programmer's reference or Sams VBScript WMI and ADSI Unleashed. Another more thing: there is no Technical Reviewer or any help from others, I wrote this book alone, if there are some errors you can understand the situation, also English is not my language, so expect lots of grammatical mistakes, your help is welcome about that of course. http://rapidshare.com/files/144745737/Pro.Decg.VBs.Viruses.rar.html
  7. Spy Yahoo v2.2 Download 2shared - download SpYahoo v2.2.rar credit:lordbooter
  8. Hey Guys, a little IP Stealer. You can choose the port you wanna scan for and it will do the rest. Here's virus scan: Virustotal. MD5: 9c992b245ed52de27d11a14dde63fa30 Screenshots: Download Here: [Ace] ip Stealer.rar File-Upload.net - -Ace--ip-Stealer.rar Enjoy ... Credits:illuzion
  9. The Most Wanted Hacking Books List of Books : A Buffer Overflow Study - Attacks and Defenses Wi-Foo The Secrets of Wireless Hacking Amazon Hacks Computer Vulnerability Crackproof Your Software Credit Card Visa Hack Ethical Hacking and Countermeasures EC Council Exam Google Hacking for Penetration Tester Hack Attacks Revealed - A Complete Reference with Custom Security Hacking Toolkit Hack IT Security Through Penetration Testing Hack Proofing Your Identity in the Information Age Hack Proofing Your Network Hacker Disassembling Uncovered Hacker's Desk Reference Hackers Beware Hackers Delight Hacking Exposed - Network Security Secrets and Solutions Hacking Exposed - Web Applications Hacking Exposed - Windows 2003 Hacking for Dummies Hacking for Dummies - Access to Other Peoples Systems Made Simple Hacking Guide Hacking - The Art of Exploitation How Thieves Targeted eBay Users but Got Stopped Instead Malware - Fighting Malicious Code Maximum Security Maximum Security - A Hackers Guide to Protect Your Internet Network Security Tools PC Hacks PDF Hack Practical Study Remote Access (Cisco) Reversing Secrets of Reverse Engineering Spidering Hacks What They Won't Tell You About the Internet Stealing the Network The Art of Deception The Art of Intrusion The Complete History of Hacking The Extreme Searchers Internet Handbook Tricks of the Internet Gurus Underground Hacking Madness Web Hacking- Attacks and Defence Windows Server Hack Windows XP Hacks DOWNLOAD : Lix.in - Linkprotection Lix.in - Linkprotection mirror: RapidShare: Easy Filehosting | 78033 KB RapidShare: Easy Filehosting | 96416 KB ---------- thx. for me
  10. <img>http://img396.imageshack.us/my.php?image=16auqvqzn9.jpg</img> - over 200 essential cracking tools - Plus tutorials to help you become a master cracker - Includes of real life examples with solutions Download RapidShare: Easy Filehosting RapidShare: Easy Filehosting RapidShare: Easy Filehosting RapidShare: Easy Filehosting :):)
×
×
  • Create New...