40 lines
1.1 KiB
Markdown
40 lines
1.1 KiB
Markdown
[SECRET//DNR]
|
|
|
|
Secret//DO NOT RELEASE.
|
|
|
|
# Documentation of all files found in this folder.
|
|
|
|
# loader.nim
|
|
|
|
Takes an input bytearray and writes it to disk as first CLI argument when run.
|
|
format:
|
|
[seq[byte]](@[0x40,0x80]
|
|
|
|
|
|
|
|
# encfile.nim
|
|
Has multiple functions to encrypt text and/or files (streams) with AES-256 derived using HMAC (SHA512_256). Max. password size 1024 characters. Tested. Is suitable for sensitive data.
|
|
Has a fingerprint/is detectable.
|
|
# OFFENSIVEencfile.nim
|
|
Very stripped-down encryption tool. Takes a stream and encrypts it (AES256 with HMAC SHA512_256). No max. password size.
|
|
Has a fingerprint/is detectable.
|
|
|
|
# Packer.nim
|
|
Ideally a "packer"/loader for the main stage. Still very experimental and needs heavy rework.
|
|
|
|
|
|
# bsod.nim
|
|
Serves a BSOD to targets on Windows.
|
|
|
|
# mic_reg.nim
|
|
|
|
[Broken]
|
|
Checks if Windows OSD is enabled.
|
|
|
|
# checkfile.nim
|
|
Basic program that uses direct syscalls to know if a file exists. Undetectable in normal conditions.
|
|
Can be chained with other direct syscalls to copy sensitive files.
|
|
|
|
# basicadware.nim
|
|
Basic adware. At execution, shows a MessageBox with a title and content picked from a random (limited) pool.
|