Archive for February, 2010

ExeCryptor 2.4.x (Tips and Tricks)

Author: SunBeam

Author website:

Description Posting the start of a series that might be appreciated in the near-by future. EXECryptor is a good protector, but as time passes by, it gets deprecated. I included a few articles (3 so far) that discuss in depth some of its internals (mostly practical, not theoretical). Package contains a proof of concept (implementing SDK in a test application), our real target and the tools/scripts I used. As a side note, these articles differ (in content and thematic) from what Zool@nder posted in the other thread.

Download here:

PPC Altivec Plugin 1.6.6

Author Xorloser

Author website

Description PPC Altivec Plugin for IDA v5.6 which adds support for special instructions that are used by some PPC based devices. This was originally written by Dean Ashton and then updated by Takires. This is useful when disassembling Xbox360 and PS3 binaries in IDA as they utilise these special instructions that are not supported by IDA’s built in PPC disassembler module.

Support added for the instructions: attn, lwsync, ptesync, tlbiel, tlbie, tlbi, slbie.

Also added support for the SystemSim “callthru” instruction (should this even be used outside of a simulator?) and lastly an instruction that I cannot find any information about. The hex value is 0×02002000 so for now I have added this instruction as opcode_02002000 so that it will at least disassemble to code and can therefore be treated as code.

via Tuts 4 You: Downloads / / PPC Altivec Plugin 1.6.6.

Cracking Java programs part 2:

Cracking 4 java programs

Updating files under the jar archive if the archive contains case senzitive names like Ab.class AB.class

Adding stack dumps to classes


Debugging whit Jdb


First target deprotected:

Tools used in this paper: Advanced Find and Replace 5, Class Constructions Kit v1.0 Beta 5, DJ Java Decompiler v3.11.11.95, JavaClassViewer, jd-gui v0.3.1, pf-cda – Class depedency Analyzer v1.12:

Java Reversing.

Posted: February 10, 2010 in Java Reversing, Other Tutorials

Author Epokh
Author email epokh©
Author website

The following is a sample tutorial on Java reversing. The reader must know the architecture and Java JVM asm, however I will report some essentials during the article.

Download here:

A different approach – using Nektra Spy Studio

Hi everyone,

A quick tutorial on a different approach I tried when I was bored!

In the tutorial I show how I used a different approach to attack a simple crackme. Using Nekstra Spy Studio to hook the appropriate APIs and IDA to guage what was going on, we reverse this target very quickly.

Whilst the target is very simple, the approach will work in many different scenarios I think.

Anyway, I hope someone finds something useful in it! I tried to make it pretty clear, but this is maybe the 2nd or 3rd tutorial I’ve ever done – so be gentle


Download here: