国外2016年最新一款捆绑器,支持无限exe文件捆绑,加密,伪装,反调试等(x86/x64)
原文介绍:
Multi file binder/crypter (x86/x64) UNICODE
Execution, only injection is runtime protected
Injection inself (x86/x64 depend Stub/OS), choose correct stub regarding PE image
Injection default browser (x86/x64 depend Stub/OS/Browser), x64 PE will not be injected if the browser is x86, FWB, if failed will try in IE
Injection IE (x86/x64 depend Stub/OS), PE will be injected regarding PE image, choose this option if the PE is compiled in VB6, FWB, if failed will try in default browser
Injection shost (x86 only), choose this option only for x86 PE, if failed will try in inself
Injection DotNet (x86/x64 depend Stub/OS/Framework), choose this option if your PE is compiled in DotNet, if failed will try under previous framework version
Drop and execute visible (x86/x64 depend OS), you can execute x64 PE with x86/x64 stub regarding OS
Drop and execute hidden (x86/x64 depend OS), you can execute x64 PE with x86/x64 stub regarding OS, hidden execution depend on file
Encryption, encrypt or not the files
Nothing
RC4, regular cipher
RC4+, double encryption
XOR, regular cipher
Compression, compress or not the files, it can be added to encryption
Nothing
LZNT, native compression
Command parameters, execute the files with command line parameters
Nothing, any parameters will be added
Custom, choose your custom parameters
Same as invoker, it will have same as parent process
AutoRun, run the files at each system start
No, just run at manual execution
Yes, run at manual execution and system start
Wait reboot, run only on system start
Anti, do not run the files under those env
No, always run
Debug, not run under debugger
Sandbox, not run under sandbox
Virtual, not run under virtual machine
All, not run under debug, sandbox and virtual
Firewall exception, add windows firewall exception for himself and programs injected in it
Melt if install, melt the file if it’s the installer, delete it after first execution
Global anti, block main execution under those env
Debug, not run under debugger
Sandbox, not run under sandbox
Virtual, not run under virtual machine
Copy overlay, copy first found PE EOF
Update checksum, set correct PE header checksum
Clone file, steal PE icons
Steal cert, steal PE Certification, choose correct PE image regarding the stub
大致翻译:
多文件夹/ crypter(x86/x64)Unicode
执行,只有注入是运行时保护
在注射(x86/x64靠存根/ OS),选择正确的存根对于PE映像
注射的默认浏览器(x86/x64靠存根/操作系统/浏览器),64 PE不会注入如果浏览器是x86,FWB,如果失败,将尝试在IE
注入IE(x86/x64靠存根/ OS),PE将被注入的有关体育的形象,如果PE是VB6,FWB编译选择此选项,如果失败会在默认浏览器
注入svchost(x86只),只能用于x86 PE选择此选项,如果失败,将尝试在自我
注射DotNet(x86/x64靠存根/操作系统/框架),如果你的PE编制–选择此选项,如果失败,将以往的框架下的版本
降和执行可见(x86/x64取决于操作系统),你可以用x86/x64存根对于OS执行x64 PE
降和执行隐藏(x86/x64取决于操作系统),你可以用x86/x64存根对于OS执行x64 PE,隐藏的执行依赖于文件
加密,加密或不加密的文件
没有什么
RC4,定期的密码
4 +,双重加密
异或,定期的密码
压缩,压缩或不压缩的文件,它可以添加到加密
没有什么
lznt,本地压缩
命令参数,用命令行参数执行文件
没有,任何参数将被添加
自定义,选择您的自定义参数
相同的调用,它将有相同的父进程
自动运行,每次系统启动运行文件
不,只在手动执行
是的,运行在手动执行和系统启动
等待重新启动,只在系统启动时运行
反,不在这种环境运行文件
不,总是运行
调试,不在调试器下运行
砂箱,不是在砂箱下运行
虚拟,而不是在虚拟机下运行
所有,不是运行在调试,虚拟和虚拟
防火墙例外,为自己添加了防火墙异常和注入的程序
如果安装程序融化,如果它是安装程序的话,在第一次执行后删除文件
全球反,在这些环境块主要执行
调试,不在调试器下运行
砂箱,不是在砂箱下运行
虚拟,而不是在虚拟机下运行
复制叠加,复制第一个发现PE EOF
更新校验和,树立正确的体育报头校验和
克隆文件,窃取体育图标
窃取证书,偷PE认证,选择正确的体育形象对于存根
百度网盘下载:http://pan.baidu.com/s/1kUT7WBP
提取密码:xjua
解压密码:www.exehack.net