Friday, March 12, 2021

Renault & Dacia Car Radio Code Calculator & Generator

Generate the unlocking code for Renault & Dacia car radio using our calculator.






Find the serial number (pre code) of your radio, enter it in the calculator & unlock your car radio.

Renault Radio Pre-Code

Why is my Renault or Dacia car radio locked down?

Following a breakdown or a disconnection of the car battery, the Renault (or Dacia) vehicle radio will ask for a security code to become operational.

However, if you can't find the code for your radio, do not panic. This guide will help you calculate the car radio code.

Link to the Renault & Dacia Car Radio Code Calculator & Generator.

Ford Radio Code M Serial Calculator & Generator

Generate the activation code for Ford car radio M Serial using our calculator.



Find the serial number (pre code) of your radio, enter it in the calculator & unlock your car radio.

Ford Radio Code M - Pre Code

Following a breakdown or a disconnection of the car battery, the Ford radio will ask for a security code to become operational.

However, if you can't find the code for your radio, do not panic. This guide will help you calculate the car radio code.

Link - Ford Radio Code M Serial Calculator & Generator

Monday, March 8, 2021

Twitter retweet automation - Auto-retweet tool

How to automate Twitter retweeting? Try Social Media Bot browser extension in its latest version. It allows for Twitter retweet automation for any #hashtag page and the search term result.

Twitter retweet automation with Social Media Bot
Twitter retweet automation with Social Media Bot

Features:
  • Retweet tweets from the #hashtag pages
  • Retweet single tweets & user comments
  • Retweet tweets from the search results
Social Media Bot is available for:

Ford Radio Codes for V Model - Online Radio Code Calculator

Radio asking for code? Unlock it now in a few simple steps. Works for any Ford radio V model. Instant and easy online process. 6000 CD, Sony, Travelpilot...


Generate the activation code for Ford car radio V Serial using our calculator. Find the serial number (pre-code) of your radio, enter it in the calculator & unlock your car radio.


Link - Ford Radio Codes Generator

Friday, January 1, 2021

Obfuscate AutoIt Scripts from Python code

If you would like to protect your AutoIt scripts from hackers and decompilation you might want to obfuscate their source code with an AutoIt Obfuscator.

Obfuscation protects the original AutoIt source code against analysis & reverse engineering. Unfortunately, AutoIt decompilation is easy with tools like aut2exe (try it yourself).

Obfuscation protects the AutoIt code against reversing, so even after decompilation the source code will stay safe from prying eyes, hackers, and competition.

Now it's possible to automate this process using Python 3 code with a dedicated Python 3 module:

https://pypi.org/project/autoitobfuscator/

Source code of this module along with usage examples is available at GitHub:

https://github.com/PELock/AutoIt-Obfuscator-Python

Sample usage example in Python:
#!/usr/bin/env python

###############################################################################
#
# AutoIt Obfuscator WebApi interface usage example.
#
# In this example we will obfuscate sample source with default options.
#
# Version        : v1.0
# Language       : Python
# Author         : Bartosz Wójcik
# Web page       : https://www.pelock.com
#
###############################################################################

#
# include AutoIt Obfuscator module
#
from autoitobfuscator import AutoItObfuscator

#
# if you don't want to use Python module, you can import directly from the file
#
#from pelock.autoitobfuscator import AutoItObfuscator

#
# create AutoIt Obfuscator class instance (we are using our activation key)
#
myAutoItObfuscator = AutoItObfuscator("ABCD-ABCD-ABCD-ABCD")

#
# source code in AutoIt v3 format
#
scriptSourceCode = 'ConsoleWrite("Hello World")'

#
# by default all options are enabled, both helper random numbers
# generation & obfuscation strategies, so we can just simply call:
#
result = myAutoItObfuscator.obfuscate_script_source(scriptSourceCode)

#
# it's also possible to pass script path instead of a string with the source e.g.
#
# result = myAutoItObfuscator.obfuscate_script_file("/path/to/script/source.au3")

#
# result[] array holds the obfuscation results as well as other information
#
# result["error"]         - error code
# result["output"]        - obfuscated code
# result["demo"]          - was it used in demo mode (invalid or empty activation key was used)
# result["credits_left"]  - usage credits left after this operation
# result["credits_total"] - total number of credits for this activation code
# result["expired"]       - if this was the last usage credit for the activation key it will be set to True
#
if result and "error" in result:

    # display obfuscated code
    if result["error"] == AutoItObfuscator.ERROR_SUCCESS:

        # format output code for HTML display
        print(result["output"])

    else:
        print(f'An error occurred, error code: {result["error"]}')

else:
  print("Something unexpected happen while trying to obfuscate the code.")

Saturday, July 25, 2020

String & File Encryption Extension for Visual Studio Code

Encrypt and hide plain text strings & files contents within your source code in a secure & encrypted form with the help of a polymorphic engine, generating random-looking decryption code every time.

https://www.stringencrypt.com

Now available as a Visual Studio Code extension.

https://marketplace.visualstudio.com/items?itemName=PELock.stringencrypt

Simple & fast encryption — try it yourself!

Encrypt new string directly from the Visual Studio Editor



Encrypt selected strings



Insert and encrypt files into your source code



Monday, July 20, 2020

Top ten reverse engineering tools

Are you interested in software reverse engineering? You would like to know how to peek inside compiled applications, how to restore source code from binary code? Here is a list of top ten reverse engineering tools to do that.

IDA Disassembler, debugger & decompiler
IDA Disassembler, debugger & decompiler



Thursday, July 16, 2020

The best reverse engineering tools for .NET apps

The best reverse engineering tools for .NET applications. It is very different from classic tools used for the reversing of native x86 / x64 applications in PE (Windows EXE/DLL Portable Executable) or ELF (Linux Executable and Linkable Format) formats.



Different code architecture forced to create a whole range of dedicated tools for .NET executable files, I will try to present some of them that may be useful in software reversing.

Read the full article at:

Sunday, July 5, 2020

Assembly Optimization Tips - Optimize Assembler Code For Size

There is one particular area of assembly programming that focues on size optimization. I have used this knowledge many times in many of my software reverse engineering projects to modify compiled binaries with a limited amount of space available to include the modified code or to develop shellcodes for 0 day exploits, where again the size of the shellcode is limited.



Read the free article about assenbly optimization tips at:

https://dev.to/pelock/assembly-code-size-optimization-tricks-2abd

I also recommend this one:

http://mark.masmcode.com/

Thursday, July 2, 2020

Total Commander FTP Password Recovery Tool

Total Commander is a popular file manager for Windows, Windows CE, Windows Phone, and now also Android.

Total Commander has a built-in FTP client and it keeps the FTP logins and passwords in wcx_ftp.ini configuration file in an encrypted format.

Total Commander FTP Password Recovery Tool


Total Commander FTP Password Recovery Tool allows you to recover the FTP account password information for all versions of Total Commander / Windows Commander.

https://www.pelock.com/products/total-commander-ftp-password-recovery

Additionally, you will find there the original reverse engineered source code of the decryption algorithm in x86 assembly and in a more friendly PHP source code format.

Friday, May 29, 2020

Steganography Online Tool & Codec - Hide Message in Image

What is steganography and how it works?


The art and science of hiding information by embedding messages within other, seemingly harmless files like images and photos.

With our steganography online tool you will be able to conceal any text message in the image in a secure manner and send it without raising any suspicion. It will only be possible to read the message after entering the decryption password.

https://www.pelock.com/products/steganography-online-codec

In this case, the individual bits of the encrypted hidden message is saved as the least significant bits in the RGB color components in the pixels of the selected image.

Our steganographic code uses strong AES encryption with 256-bit key derived with another strong crypto function PBKDF2.

What are the practical uses of steganography?


  • Undercover journalism
  • Whistleblowing
  • Bypassing highly monitored Internet (state-monitored)
  • Watermarking images

Sunday, April 5, 2020

Instagram Bot - Autoclicker Growbot for Instagram, Twitter & SoundCloud

Social Media Bot is an automatic growbot for social media sites such as Instagram, Twitter and SoundCloud.



By automatically and mass liking other users' posts, selected #hashtags, and by automatically following other users' fans you will quickly attract a group of your new followers. It's in the human nature, you are clicking likes for other, they will do it for you too.

Instagram bot tutorial




Social Media Bot is a browser extension (otherwise known as a plug-in) that allows you to automate your typical social media activities. It's available both for Firefox and for Chrome compatible browsers.

Instagram bot for Chrome


Instagram bot for Firefox



Privacy


All of the operations are performed directly from your computer and from your IP address as if you were doing it yourself. This way you can rest assured that your account will not be blocked.

More information about Social Media Bot at:

Thursday, January 9, 2020

Source code recovery

How to recover the lost source code?


To recover source code from the compiled application (e.g. legacy software) you lost access to, you must reverse engineer the binary code of the application. This process is extremely complicated, requiring disassemblers, debuggers and other specialized tools. And a lot of time and experience.

IDA Disassembler is used to analyze the compiled application


Source code recovery solution


Our company offers services of recovering source codes from compiled applications, but also the very fragments of codes, selected algorithms, or sensitive data such as database access passwords. We have a long track of successful reverse engineering projects under our belt and over 15 years of experience in the field, you can read testimonials of what others wrote about our services.

Supported programming project types


We provide source code recovery for the following technologies:

  • C & C++ - recover source code and software algorithms from C/C++ compiled binaries, including Windows EXE, Linux ELF executables & DLL libraries created in Visual C++, Intel C++ Compiler, GCC, MinGW, G++, Clang, C++Builder, Watcom C++, LCC, Pelles C, Digital Mars and other compilers.
  • Java - recover source code from Java and J2EE / JEE applications & applets, restore source code from *.class files, JAR & WAR packages. Restore code from Android APK packages & DEX files. Recover sources from encrypted & obfuscated Java packages.
  • C# aka C Sharp - recover full source code from C# applications, also from protected apps, including those created using WinForms, WPF, WCF, ASP.NET.
  • Visual Basic & VB.NET - restore source code from Visual Basic executables compiled to native or p-code output. Restore sources for the latest VB.NET applications created for the .NET Framework.
  • Delphi & Pascal - source code and algorithm recovery from Delphi applications and any other Pascal based tool & compiler like Lazarus, FreePascal etc.
  • Visual FoxPro - recover source code, databases, queries and other resources from Visual FoxPro, FoxBASE+, FoxPro 1.*- 2.6, Visual FoxPro 3.0, 5.0, 6.0, 7.0, 8.0 and 9.0 applications.
  • AutoIt - recover *.au3 script source codes from compiled AutoIt applications. Restore obfuscated script sources to the original form.
  • Flash SWF ActionScript - recover flash script sources in the ActionScript language and other binary resources from compiled Flash SWF files and standalone Flash applications in EXE format.


Source code recovery example


Here is the sample C++ output code in x86 assembler :

Compiled code. Simple function, disassembled to x86 code

.text:00401000 ; int __cdecl main(int argc, const char **argv, const char **envp)
.text:00401000 _main proc near ; CODE XREF: ___tmainCRTStartup+F8 p
.text:00401000 push 40h ; uType
.text:00401002 push offset Caption  ; "Hi!"
.text:00401007 push offset Text ; "Hello World!"
.text:0040100C push 0 ; hWnd
.text:0040100E call ds:MessageBoxW
.text:00401014 xor eax, eax
.text:00401016 retn
.text:00401016 _main endp

Restored source. C++ code from the x86 output

int __cdecl main(int argc, char *argv[], char *envp[])
{
MessageBox(NULL, L"Hello World!", L"Hi!", MB_ICONINFORMATION);

return 0;
}

Contact information


To learn more or to get in touch with us, please visit our site at:

https://www.pelock.com/services/source-code-recovery

Thursday, January 2, 2020

Automobile pin code calculation, pass code & seed key immo calculator

Nowadays, a car is not only a precise mechanic but also an advanced computer managing every aspect of driving or any other functionality.

Automobile pass code

Special diagnostic software that allows you to update your car's software, program new keys or perform any other functions, often requires you to provide access keys in order to perform a specific action.



These keys are required every time and are not free of charge. These are usually generated from the VIN number of the vehicle.

Seed key calculator

Our company offers a specialized service consisting in performing reverse engineering of any diagnostic software and attempting to extract algorithms needed to generate access keys and creating calculators based on them or providing source codes of algorithms in any programming language.

Learn more at:

https://www.pelock.com/services/reverse-engineering/automobile-seed-key-calculation-pass-code-pin-code-immo-calculator

Wednesday, January 1, 2020

Bypass EURion protection in Photoshop

Way to get around Photoshop's "does not support editing of banknote images"? 

Software such as Photoshop and other similar products contain security features that prevent the opening, editing and printing of banknotes.

This protection is based on the detection in the image of a special dotted marker, the so-called EURion constellation. It is used in banknote designs of many countries.


How can I edit banknote images in Photoshop?

Our company has created a modification to the Photoshop software that allows you to work with banknote images, both when opening and printing.


We are also able to modify any other software and firmware that can detect EURion protection.

To learn more visit our website at:


Radio code for Chrysler Dodge RAM

If you’re having trouble with your Dodge Ram radio after a battery disconnection or malfunction, you might be prompted for a security code. ...