Crypto protocol beta 1.0 is out

Current status:
Beta version release: - done
Add ping command to server - done
Client/Server data exchange - done
Add subclients registration for username - done
Users registration - done
RSA key exchange on fly - done
AES-256 strong encryption channel
Inflate/Deflate - compression of transmitted data - done
Shorthand masking of transmitted data - done
Encapsulation of data in any data transfer protocol - done
Crypto protocol beta 1.0 is out

Cryptone protocol sources:
Cryptone sublibs:

Presentation about Cryptoprotocol from 2600 Moscow:

Cryptoprotocol User registration client/server handshake and decryption of cryptography and keys exchange scheme

Обход UAC, и Load untrusted code to signed/trusted code and level up to SYSTEM on fly

Обход UAC, и Load untrusted code to signed/trusted code and level up to SYSTEM on fly
Презентация -
Any windows BackDooring;) -
FuckUac/FuckSystem -
Windows Shim DB add our malware -
Russian/English Add U ass to SYSTEM -
^(o-o)^~~ Leo Davidson method
^(o-o)^~~ Application Compatibility Shim Redirect method, from WinNT/Gootkit
^(o-o)^~~ ISecurityEditor WinNT/Simda method, used to turn off UAC
^(o-o)^~~ Wusa method used by Win32/Carberp
^(o-o)^~~ Appinfo.dll way of whitelisting autoelevated applications and KnownDlls cache changes
^(o-o)^~~ Memory patching from MS "Fix it" patch shim (and as side effect arbitrary dll injection)
^(o-o)^~~ Windows 10 sysprep method, abusing different dll dependency added in Windows 10
^(o-o)^~~ Microsoft Management Console and EventViewer missing dependency
^(o-o)^~~ WinNT/Sirefef method, abusing appinfo.dll way of whitelisting OOBE.exe
^(o-o)^~~ Win32/Addrop method, also used in Metasploit uacbypass module
^(o-o)^~~ Microsoft GWX backdoor
^(o-o)^~~ Appinfo whitelist/logic/API choice&usage
^(o-o)^~~ Microsoft Management Console and incorrect dll loading scheme
^(o-o)^~~ SxS DotLocal and targeting consent to gain system privileges
^(o-o)^~~ Package Manager and DISM

Art of exploiting

Stoned Bootkit Framework

Stoned Bootkit Framework
Stoned Bootkit Framework
What is Stoned Bootkit?

Stoned Bootkit

A bootkit is a boot virus that is able to hook and patch Windows to get load into the Windows kernel, and thus getting unrestricted access to the entire computer. It is even able to bypass full volume encryption, because the master boot record (where Stoned is stored) is not encrypted. The master boot record contains the decryption software which asks for a password and decrypts the drive. This is the weak point, the master boot record, which will be used to pwn your whole system. No one’s secure!

attacks Windows XP, Sever 2003, Windows Vista, Windows 7 with one single master boot record
attacks TrueCrypt full volume encryption
has integrated FAT and NTFS drivers
has an integrated structure for plugins and boot applications (for future development)