SmartKill v.0.6
Author Kurapica and UFO-PU55Y
Description A tool that Kurapica and UFO-PU55Y from SnD have written to attack assemblies protected with SmartAssembly Protector.
Author Kurapica
Description The idea of this tool is to achieve two objects:
1 - It will dump the body of every Method (Function, Procedure) called by the executable assembly you select, The dumping occurs whenever compiler enters that method, for example if you Click some button and this button calls method "CheckLicense" then you will find a file named "CheckLicense.txt" in the "\Dump" folder.
2 - It will show you in details the methods being called and also the modules that your application loads so it could be used as a simple tracing utility for .net assemblies.
I wrote this tool to help me rebuild assemblies protected with JIT hooking technique, those assemblies can't be explored in Reflector because their methods' body is encrypted and only decrypted in runtime when the method is called so you will see no code in reflector, I assumed that I will have access to the encrypted MSIL code of the methods using Profiling APIs, there was a 50% chance of success but it turned out to be only useful against certain protections like the one that LibX coded which depends on System.Reflection.Emit.DynamicMethod to excute protected methods.
you can find more on LibX protection here
hxxp://e0aK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4u0W2N6r3g2S2L8g2)9J5k6h3!0J5k6#2)9J5c8X3u0G2j5i4u0V1i4K6u0r3M7$3S2G2N6%4c8Z5M7X3g2S2k6q4)9J5k6i4m8Z5M7q4)9K6c8Y4c8Q4x3@1b7%4z5e0V1`.
* Extract resources from assemblies
* View raw metadata tables
* Open assemblies as files or as Global Assembly Cache entries
* View disassembly (by cheating and spawning ILDASM)
* View PE file structures
* Browse types, namespaces, method parameters etc
DotNET Tracer
Author Kurapica
Description This is a simple tool that has a similar functionality to RegMon or FileMon but it's designed to trace events in .NET assemblies in runtime, many events can be reported so you can understand what's going on in the background