XOR_Crypter | XOR encryption , malware crypter | Encryption library

 by   Jyang772 C++ Version: v1.0 License: No License

kandi X-RAY | XOR_Crypter Summary

kandi X-RAY | XOR_Crypter Summary

XOR_Crypter is a C++ library typically used in Security, Encryption applications. XOR_Crypter has no bugs, it has no vulnerabilities and it has low support. You can download it from GitLab, GitHub.

This is a simple file crypter. 1. Reads in file data.
Support
    Quality
      Security
        License
          Reuse

            kandi-support Support

              XOR_Crypter has a low active ecosystem.
              It has 63 star(s) with 37 fork(s). There are 5 watchers for this library.
              OutlinedDot
              It had no major release in the last 12 months.
              There are 1 open issues and 3 have been closed. On average issues are closed in 487 days. There are no pull requests.
              It has a neutral sentiment in the developer community.
              The latest version of XOR_Crypter is v1.0

            kandi-Quality Quality

              XOR_Crypter has no bugs reported.

            kandi-Security Security

              XOR_Crypter has no vulnerabilities reported, and its dependent libraries have no vulnerabilities reported.

            kandi-License License

              XOR_Crypter does not have a standard license declared.
              Check the repository for any license declaration and review the terms closely.
              OutlinedDot
              Without a license, all rights are reserved, and you cannot use the library in your applications.

            kandi-Reuse Reuse

              XOR_Crypter releases are available to install and integrate.

            Top functions reviewed by kandi - BETA

            kandi's functional review helps you automatically verify the functionalities of the libraries and avoid rework.
            Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of XOR_Crypter
            Get all kandi verified functions for this library.

            XOR_Crypter Key Features

            No Key Features are available at this moment for XOR_Crypter.

            XOR_Crypter Examples and Code Snippets

            No Code Snippets are available at this moment for XOR_Crypter.

            Community Discussions

            QUESTION

            How to protect strings in a unmanaged application from process dump
            Asked 2018-Sep-21 at 06:35

            First of all it's not a duplicate post!

            Please read to the end,you clearly understand!

            I'm developing some apps and the security is very important to me...

            I searched a lot, I did a lot of ways, I tested every method I found but not so much difference !

            ◾️ I need to protect some really important strings in my application like the Key and IV Key of AES256 or Base64 encryption.

            Two Fact We All Faced :
            1. We all know that the security of .NET is very low! In fact, A kid can crack it by a cellphone !!!

            2. There is nothing as 100% security, we only reduce the speed of access to resources by making it harder and harder ...

            But what I'm facing right now is really a serious security problem and it can hurt lot of customers.

            Okay, Time to Ask...

            I need to know how can I keep my AES Key and AES IV safe from dumpers and memory extractors, Even if I can not be able to create a very high security I need to protect it of opening by one click!

            ...

            ANSWER

            Answered 2018-Sep-21 at 06:35

            First of all, remember that if an attacker can attach a debugger to your process and your process has to be the one in charge of the decryption, you have already lost by definition; the best you can get is "security through obscurity". More secure approaches generally require offloading part of the work to an actor that the attacker cannot access - be it an external, tamper-proof cryptographical device or a remote service.

            But most importantly, any method is vulnerable to being dumped, as sooner or later you'll need to access the plaintext, and it'll be there in memory ready for anyone with a debugger to be read.

            That being said, you can mitigate this last problem by decrypting your string only on demand, and wiping it away immediately after; this shrinks the window of opportunity for the attacker. So, you don't want a function that decrypts a static buffer, but a function that fills a client-provided buffer with the needed secrets (and make sure that the clients actually zero out the content of such buffer before deallocating it - use a memset-like which takes a volatile pointer to make sure that the wiping isn't optimized out).

            As for actually storing the keys into the executable, you can use a variety of methods to create confusion. Initializing a global with a plain initializer puts the relevant data in the .rodata section of the executable, which is the first place where I'd look; any string with high enough entropy would be a dead giveaway to investigate further where it is used (the IDA disassembler makes this particularly easy). A possibility that comes to mind is to actually initialize the buffer one byte at time from a function (possibly making the pointer to the buffer volatile, to make sure the compiler doesn't pull strange tricks); this should put your data straight into the code section, which is a bit less suspect, and where the entropy should be kept lower thanks to the interleaving with opcodes.

            This data could have been further encrypted by using some simple trick - say, XORed with the output of a simple XorShift PRNG; this again adds to the confusion, but a XorShift is implemented in a handful of instructions, so you don't have extra dependencies or "suspect" code.

            Another important point, if you are hiding decryption keys, is not to use cryptographic primitives provided by your operating system, but link statically your implementation, and possibly one that doesn't use AES-NI or other obvious giveaways. If I were trying to extract decryption keys first thing I'd hook into a debugger all the relevant CryptoAPIs, and look into the executable for cryptographic instructions to locate the most interesting zones.

            Source https://stackoverflow.com/questions/52437492

            Community Discussions, Code Snippets contain sources that include Stack Exchange Network

            Vulnerabilities

            No vulnerabilities reported

            Install XOR_Crypter

            You can download it from GitLab, GitHub.

            Support

            Fork the project
            Find more information at:

            Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items

            Find more libraries
            CLONE
          • HTTPS

            https://github.com/Jyang772/XOR_Crypter.git

          • CLI

            gh repo clone Jyang772/XOR_Crypter

          • sshUrl

            git@github.com:Jyang772/XOR_Crypter.git

          • Stay Updated

            Subscribe to our newsletter for trending solutions and developer bootcamps

            Agree to Sign up and Terms & Conditions

            Share this Page

            share link

            Explore Related Topics

            Consider Popular Encryption Libraries

            certbot

            by certbot

            Signal-Android

            by signalapp

            unlock-music

            by unlock-music

            client

            by keybase

            Signal-Server

            by signalapp

            Try Top Libraries by Jyang772

            HideProcessHookMDL

            by Jyang772C

            WebCrypt

            by Jyang772C++

            alpaca-cpp

            by Jyang772C++

            MacSpoof

            by Jyang772Shell

            Hello_MFC

            by Jyang772C++