Hyperion is a runtime encrypter for 32-bit and 64-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter".
546bba6c21a8e53a0ebd1b8665fdb96452b6cab6ffbd9956b7c34f8bdab5e518
Hyperion is a runtime encrypter for 32-bit and 64-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter".
2364513b2f75c3dc33a2b0a95b24e345d7dbe8fb2c3717c63cb058613b286779
Hyperion is a runtime encrypter for 32-bit and 64-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter".
4aca3455bf543f257a9dfc1d5a9809a4e42a520b7053074ac940fa74b968bb72
Hyperion is a runtime encrypter for 32-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter".
463693c779a9fe1609ab19cf5871b4c590340ef78f68ac0055a8b97792888187
Hyperion is a runtime encrypter for 32-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter".
fa0f0dd00142c7e8afb79cd7f2585a81d1ad07048a94db78fb3f1d9234ea8c36
This paper reveals the aspects of .NET runtime encryption and presents a proof of concept implementation for Hyperion, the implementation that generates a random key and uses it to encrypt the input file with AES-128.
f31b8436d55346c13187da8a039529d9ca343bc4b8657db89122883e35bca035
Hyperion is a runtime encrypter for 32-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter".
c66e6ff1b37e64fba12f60f561cdd9e8055b39f03c9995e6b21f14088f779c52
This paper reveals the theoretical aspects behind run-time crypters and describes a reference implementation for Portable Executables.
151b5b88ae878e07f3f061bd79b9e8bdd14d125d1e574f3e6cedd6317fb54d52
This is an AES-128, AES-192 and AES-256 implementation for FASM. It uses the x86 32-bit instruction set and operates completely on the stack. No additional data segments are necessary which makes it easy to integrate the AES functions in any existing project. The implementation is not optimized for speed but for easy maintainability.
cc0cf8acced2ff663cde433a3b46fe8c8b9f9998d39d248c5e164872917db1a6