exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 9 of 9 RSS Feed

Files from belial

First Active2012-02-13
Last Active2020-03-28
Hyperion Runtime Encrypter 2.3.1
Posted Mar 28, 2020
Authored by belial | Site nullsecurity.net

Hyperion is a runtime encrypter for 32-bit and 64-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter".

Changes: A bugfix in .net file detection.
tags | tool, encryption
SHA-256 | 546bba6c21a8e53a0ebd1b8665fdb96452b6cab6ffbd9956b7c34f8bdab5e518
Hyperion Runtime Encrypter 2.3
Posted Mar 21, 2020
Authored by belial | Site nullsecurity.net

Hyperion is a runtime encrypter for 32-bit and 64-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter".

Changes: Hyperion now rejects unsupported .NET executables, preserves the GUI/Commandline PE flag, has a lower AV detection because static stuff was removed, and 64 bit output file size was reduced by 4 kilo bytes.
tags | tool, encryption
SHA-256 | 2364513b2f75c3dc33a2b0a95b24e345d7dbe8fb2c3717c63cb058613b286779
Hyperion Runtime Encrypter 2.0
Posted Jun 12, 2019
Authored by belial | Site nullsecurity.net

Hyperion is a runtime encrypter for 32-bit and 64-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter".

Changes: Support for 64bit was added. C++ has been replaced by a more clean C implementation. More modular concept allows extensions with custom payloads.
tags | tool, encryption
SHA-256 | 4aca3455bf543f257a9dfc1d5a9809a4e42a520b7053074ac940fa74b968bb72
Hyperion Runtime Encrypter 1.2
Posted Feb 18, 2015
Authored by belial | Site nullsecurity.net

Hyperion is a runtime encrypter for 32-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter".

Changes: Added Windows 8/8.1 support.
tags | tool, encryption
SHA-256 | 463693c779a9fe1609ab19cf5871b4c590340ef78f68ac0055a8b97792888187
Hyperion Runtime Encrypter 1.1
Posted May 9, 2014
Authored by belial | Site nullsecurity.net

Hyperion is a runtime encrypter for 32-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter".

Changes: Code base has been cleaned up to decrease size and increase maintainability. Furthermore, a new command line allows enabling/disabling of logging and verbose informations. Key space can be reduced too which speeds up the bruteforcing process for larger input files. Next stop will be AV evasion to reduce detection rate.
tags | tool, encryption
SHA-256 | fa0f0dd00142c7e8afb79cd7f2585a81d1ad07048a94db78fb3f1d9234ea8c36
Ideas On Advanced Runtime Encryption Of .NET Executables
Posted Dec 14, 2012
Authored by belial | Site nullsecurity.net

This paper reveals the aspects of .NET runtime encryption and presents a proof of concept implementation for Hyperion, the implementation that generates a random key and uses it to encrypt the input file with AES-128.

tags | paper, proof of concept
SHA-256 | f31b8436d55346c13187da8a039529d9ca343bc4b8657db89122883e35bca035
Hyperion Runtime Encrypter 1.0
Posted May 26, 2012
Authored by belial | Site nullsecurity.net

Hyperion is a runtime encrypter for 32-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter".

tags | tool, encryption
SHA-256 | c66e6ff1b37e64fba12f60f561cdd9e8055b39f03c9995e6b21f14088f779c52
Hyperion: Implementation Of A PE Crypter
Posted May 8, 2012
Authored by belial | Site nullsecurity.net

This paper reveals the theoretical aspects behind run-time crypters and describes a reference implementation for Portable Executables.

tags | paper
SHA-256 | 151b5b88ae878e07f3f061bd79b9e8bdd14d125d1e574f3e6cedd6317fb54d52
FASM AES Implementation 1.0
Posted Feb 13, 2012
Authored by belial | Site nullsecurity.net

This is an AES-128, AES-192 and AES-256 implementation for FASM. It uses the x86 32-bit instruction set and operates completely on the stack. No additional data segments are necessary which makes it easy to integrate the AES functions in any existing project. The implementation is not optimized for speed but for easy maintainability.

tags | x86, encryption
systems | unix
SHA-256 | cc0cf8acced2ff663cde433a3b46fe8c8b9f9998d39d248c5e164872917db1a6
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close