Skip to content

Commit

Permalink
2021 version of project
Browse files Browse the repository at this point in the history
  • Loading branch information
xchwarze committed Feb 10, 2021
0 parents commit 6370838
Show file tree
Hide file tree
Showing 65 changed files with 402 additions and 0 deletions.
Binary file added Analysis/DIE/DIE - 3.01.7z
Binary file not shown.
Binary file added Analysis/ExeinfoPe/ExeinfoPe - 0.0.6.3.7z
Binary file not shown.
Binary file added Analysis/PEiD/PEiD - 0.95.7z
Binary file not shown.
Binary file added Analysis/ProtectionID/ProtectionID - 0.6.9.0.7z
Binary file not shown.
Binary file not shown.
Binary file added Analysis/Stud PE/Stud PE - 2.6.7z
Binary file not shown.
Binary file added Analysis/XAPKDetector/XAPKDetector - 0.01.7z
Binary file not shown.
Binary file added Analysis/XELFViewer/XELFViewer - 0.01.7z
Binary file not shown.
Binary file added Analysis/XPEViewer/XPEViewer - 0.01.7z
Binary file not shown.
Binary file added Decompilers/[ANDROID] JADX/JADX - 1.2.0.7z
Binary file not shown.
Binary file added Decompilers/[DELPHI] Dede/Dede - 3.5.7z
Binary file not shown.
Binary file added Decompilers/[DELPHI] IDR/IDR - master.7z
Binary file not shown.
Binary file added Decompilers/[DOTNET] DnSpy/DnSpy - 6.1.8.7z
Binary file not shown.
Binary file added Decompilers/[DOTNET] GrayWolf/GrayWolf - 1.83.7z
Binary file not shown.
Binary file added Decompilers/[DOTNET] GrayWolf/GrayWolf - 1.88.7z
Binary file not shown.
Binary file not shown.
Binary file added Decompilers/[FLASH] Flasm/Flasm - 1.62.7z
Binary file not shown.
Binary file added Decompilers/[JAVA] JAD/JAD - 1.5.8g.7z
Binary file not shown.
Binary file added Decompilers/[JAVA] JD-GUI/JD-GUI - 1.6.6.7z
Binary file not shown.
Binary file not shown.
Binary file added Dissasembler/BDASM/BDASM - 2.5.7z
Binary file not shown.
Binary file not shown.
Binary file added Dissasembler/OllyDbg 1.10/OllyDbg - 1.10.7z
Binary file not shown.
Binary file added Dissasembler/w32Dasm/[++] w32Dasm - 8.93.7z
Binary file not shown.
Binary file added Dissasembler/w32Dasm/[10] w32Dasm - 8.93.7z
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file added Dissasembler/x64dbg/x64dbg - 2021-02-09_17-28.7z
Binary file not shown.
Binary file added HEX Editor/HxD/HxD - 2.4.7z
Binary file not shown.
Binary file added HEX Editor/WinHex/WinHex - 20.0.7z
Binary file not shown.
Binary file added Monitor/Autoruns/Autoruns - 13.98.7z
Binary file not shown.
Binary file added Monitor/CurrPorts/CurrPorts - 2.63.7z
Binary file not shown.
Binary file added Monitor/MultiMon/MultiMon - 3.00.7z
Binary file not shown.
Binary file added Monitor/Portmon/Portmon - 3.03.7z
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file added Monitor/Procmon/Procmon - 3.61.7z
Binary file not shown.
Binary file added Monitor/RegShot/RegShot - 1.9.0.7z
Binary file not shown.
Binary file added Monitor/SysAnalyzer/SysAnalyzer - 2.10.7z
Binary file not shown.
Binary file added Monitor/TCPView/TCPView - 3.05.7z
Binary file not shown.
Binary file added Other/AVFucker/AVFucker - 1.1.2.7z
Binary file not shown.
Binary file added Other/ImpREC/ImpREC - 1.7e.7z
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file added Other/NFO-Tools/NFO Maker/NFO Maker - 1.0.7z
Binary file not shown.
Binary file added Other/ShowString/ShowString - 2.0.7z
Binary file not shown.
Binary file added Other/Strings/Strings - 2.53.7z
Binary file not shown.
Binary file added Other/XOpCodeCalc/XOpcodeCalc - 0.02.7z
Binary file not shown.
19 changes: 19 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,19 @@
# Indetectables Toolkit

Esta compilación de herramientas está pensada para que sea útil al que se inicia, a los más avanzados,
al que quiere entrar en el análisis de malware y también para los que quieren probar suerte en el mundo del cracking.

Es el complemento ideal para ser usado con para empezar con los [manuales](https://github.com/indetectables-net/manuals) del sitio.

## Instalación

Puede clonar el repo con [git](https://git-scm.com/download/win) o simplemente bajarlo desde descargar.

```bash
git clone https://github.com/indetectables-net/toolkit
```

## Contribuciones
Los pull requests son bienvenidos. Para cambios importantes abra primero un issue para analizarlo entre todos.

Las herramientas están comprimidas con 7zip y el formato usado para los nombres es {nombre} - {version}.7z
Binary file added Rootkits Detector/GMER/GMER - 2.2.19882.7z
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file added UnPacking/GUnPacker/GUnPacker - 0.5.7z
Binary file not shown.
Binary file added UnPacking/NETUnpack/NETUnpack - 1.0.0.1.7z
Binary file not shown.
Binary file added UnPacking/QUnpack/QUnpack - 2.2.7z
Binary file not shown.
Binary file added UnPacking/QUnpack/QUnpack - 3.4.7z
Binary file not shown.
Binary file added UnPacking/QUnpack/QUnpack - 4.3.7z
Binary file not shown.
Binary file added UnPacking/RL!dePacker/RL!dePacker - 1.5.7z
Binary file not shown.
Binary file added UnPacking/UniExtract/UniExtract - 2.0.0-rc.3.7z
Binary file not shown.
Binary file added UnPacking/VM Unpacker/VM Unpacker - 1.6.7z
Binary file not shown.
Binary file added UnPacking/XVolkolak/XVolkolak - 0.22.7z
Binary file not shown.
192 changes: 192 additions & 0 deletions Updater/tools.ini
Original file line number Diff line number Diff line change
@@ -0,0 +1,192 @@
[DIE]
folder = Analysis\DIE
url = https://github.com/horsicq/DIE-engine
from = github
local_version = 3.01
re_version = <span class="css-truncate-target" [^>]*>(.*?)</span>
re_download = "(.*?/die_win64_portable_(?:\S+).zip)"

[ExeinfoPe]
folder = Analysis\ExeinfoPe
url = https://github.com/ExeinfoASL/ASL
update_url = https://github.com/ExeinfoASL/ASL/raw/master/exeinfope.zip
from = web
local_version = 0.0.6.3
re_version = Version : (.*?) -

[XELFViewer]
folder = Analysis\XELFViewer
url = https://github.com/horsicq/XELFViewer
from = github
local_version = 0.01
re_version = <span class="css-truncate-target" [^>]*>(.*?)</span>
re_download = "(.*?/xelfviewer_win32_portable_(?:\S+).zip)"

[XPEViewer]
folder = Analysis\XPEViewer
url = https://github.com/horsicq/XPEViewer
from = github
local_version = 0.01
re_version = <span class="css-truncate-target" [^>]*>(.*?)</span>
re_download = "(.*?/xpeviewer_win32_portable_(?:\S+).zip)"

[XAPKDetector]
folder = Analysis\XAPKDetector
url = https://github.com/horsicq/XAPKDetector
from = github
local_version = 0.01
re_version = <span class="css-truncate-target" [^>]*>(.*?)</span>
re_download = "(.*?/xapkdetector_win64_portable_(?:\S+).zip)"

[JADX]
folder = Decompilers\[ANDROID] JADX
url = https://github.com/skylot/jadx
from = github
local_version = 1.2.0
re_version = <span class="css-truncate-target" [^>]*>v(.*?)</span>
re_download = "(.*?/jadx-gui-(?:\S+)-with-jre-win.zip)"

[DnSpy]
folder = Decompilers\[DOTNET] DnSpy
url = https://github.com/dnSpy/dnSpy
from = github
local_version = 6.1.8
re_version = <span class="css-truncate-target" [^>]*>v(.*?)</span>
re_download = "(.*?/dnSpy-net-win64.zip)"

[ILSpy]
folder = Decompilers\[DOTNET] ILSpy
url = https://github.com/icsharpcode/ILSpy
from = github
local_version = 7.0-preview2
re_version = <span class="css-truncate-target" [^>]*>v(.*?)</span>
re_download = "(.*?/ILSpy_binaries_(?:\S+).zip)"

[JD-GUI]
folder = Decompilers\[JAVA] JD-GUI
url = https://github.com/java-decompiler/jd-gui
from = github
local_version = 1.6.6
re_version = <span class="css-truncate-target" [^>]*>v(.*?)</span>
re_download = "(.*?/jd-gui-windows-(?:\S+).zip)"

[x64dbg]
folder = Dissasembler\x64dbg
url = https://sourceforge.net/projects/x64dbg/files/snapshots/
update_url = https://razaoinfo.dl.sourceforge.net/project/x64dbg/snapshots/
from = web
local_version = 2021-02-09_17-28
re_version = snapshot_(.*?).zip
re_download = <span class="sub-label">(.*?) \(

[Autoruns]
folder = Monitor\Autoruns
url = https://docs.microsoft.com/en-us/sysinternals/downloads/autoruns
from = web
local_version = 13.98
re_version = <h1 [^>]*>Autoruns for Windows v(.*?)</h1>
re_download = "(.*?/Autoruns.zip)"

[CurrPorts]
folder = Monitor\CurrPorts
url = https://www.nirsoft.net/utils/cports.html
update_url = https://www.nirsoft.net/utils/cports.zip
from = web
local_version = 2.63
re_version = <td>CurrPorts v(.*?) - Monitoring Opened

[Portmon]
folder = Monitor\Portmon
url = https://docs.microsoft.com/en-us/sysinternals/downloads/portmon
update_url = https://download.sysinternals.com/files/PortMon.zip
from = web
local_version = 3.03
re_version = <h1 [^>]*>Portmon for Windows v(.*?)</h1>

[Process Explorer]
folder = Monitor\Process Explorer
url = https://docs.microsoft.com/en-us/sysinternals/downloads/process-explorer
update_url = https://download.sysinternals.com/files/ProcessExplorer.zip
from = web
local_version = 16.32
re_version = <h1 [^>]*>Process Explorer v(.*?)</h1>

[Process Hacker 2]
folder = Monitor\Process Hacker 2
url = https://github.com/processhacker/processhacker
from = github
local_version = 2.39
re_version = <span class="css-truncate-target" [^>]*>v(.*?)</span>
re_download = "(.*?/processhacker-(?:\S+)-bin.zip)"

[Process Hacker 3]
folder = Monitor\Process Hacker 3
url = https://processhacker.sourceforge.io/nightly.php
from = web
local_version = 3.0.3813
re_version = Build: <span style="font-weight:bold">(.*?)</span>
re_download = href="(.*?artifacts/processhacker-(?:\S+)-bin.zip)
[Procmon]
folder = Monitor\Procmon
url = https://docs.microsoft.com/en-us/sysinternals/downloads/procmon
update_url = https://download.sysinternals.com/files/ProcessMonitor.zip
from = web
local_version = 3.61
re_version = <h1 [^>]*>Process Monitor v(.*?)</h1>
[TCPView]
folder = Monitor\TCPView
url = https://docs.microsoft.com/en-us/sysinternals/downloads/tcpview
update_url = https://download.sysinternals.com/files/TCPView.zip
from = web
local_version = 3.05
re_version = <h1 [^>]*>TCPView v(.*?)</h1>
[Strings]
folder = Other\Strings
url = https://docs.microsoft.com/en-us/sysinternals/downloads/strings
update_url = https://download.sysinternals.com/files/Strings.zip
from = web
local_version = 2.53
re_version = <h1 [^>]*>Strings v(.*?)</h1>
[XOpcodeCalc]
folder = Other\XOpcodeCalc
url = https://github.com/horsicq/XOpcodeCalc
from = github
local_version = 0.02
re_version = <span class="css-truncate-target" [^>]*>(.*?)</span>
re_download = "(.*?/xopcodecalc_win64_portable_(?:\S+).zip)"
[Windows Kernel Explorer]
folder = Rootkits Detector\Windows Kernel Explorer
url = https://github.com/AxtMueller/Windows-Kernel-Explorer
update_url = https://github.com/AxtMueller/Windows-Kernel-Explorer/raw/master/binaries/WKE64.exe
from = web
local_version = 20201111
re_version = >Current Version: (.*?)<
[SysInspector]
folder = Rootkits Detector\SysInspector
url = https://www.eset.com/ar/soporte/diagnostico-de-pc-gratuito/?type=13554&tx_esetdownloads_ajax[product]=46&tx_esetdownloads_ajax[beta]=0&tx_esetdownloads_ajax[page_id]=17328&tx_esetdownloads_ajax[plugin_id]=571902&tx_esetdownloads_ajax[product]=46&tx_esetdownloads_ajax[beta]=0&tx_esetdownloads_ajax[page_id]=17328&tx_esetdownloads_ajax[plugin_id]=571902
update_url = https://download.eset.com/com/eset/tools/diagnosis/sysinspector/latest/sysinspector_nt64_esn.exe
from = web
local_version = 1.4.2.0
re_version = "full_version":"(.*?)"
[GMER]
folder = Rootkits Detector\GMER
url = http://www.gmer.net
update_url = http://www2.gmer.net/gmer.zip
from = web
local_version = 2.2.19882
re_version = <STRONG>GMER (.*?)<\/STRONG>
[UniExtract]
folder = UnPacking\UniExtract
url = https://github.com/Bioruebe/UniExtract2
from = github
local_version = 2.0.0-rc.3
re_version = <span class="css-truncate-target" [^>]*>v(.*?)</span>
re_download = "(.*?/UniExtract(?:\S+).zip)"
Loading

0 comments on commit 6370838

Please sign in to comment.