Search the Community

Showing results for tags 'modding'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Location


Interests


Occupation


TeamViewer


Tox

Found 6 results

  1. TR DROPPER GEN : Don't remove File Version Info or Change Unique File Version Info ( Normally works) suspicious : add unique icon and remove 24 detected pic open your file with resource hacker and remove 24 and icon FUD Pic
  2. dEEpEst

    TRDropper Gen Baypass

    1 VERSIONINFO FILEVERSION 0,15,3,20 PRODUCTVERSION 0,15,3,20 FILEOS 0x40004 FILETYPE 0x1 { BLOCK "StringFileInfo" { BLOCK "000004b0" { VALUE "CompanyName", "jameszero" VALUE "FileDescription", "RuntimePack Lite x86/x64" VALUE "FileVersion", "15.3.20" VALUE "InternalName", "RuntimePack.exe" VALUE "LegalCopyright", "© jameszero 2015" VALUE "OriginalFilename", "RuntimePack.exe" VALUE "PrivateBuild", "20.03.2015" VALUE "ProductName", "RuntimePack x86/x64" VALUE "ProductVersion", "15.3.20" VALUE "Comments", "RuntimePack x86/x64" VALUE "LegalTrademarks", "© jameszero 2015" VALUE "SpecialBuild", "Welcome to me - jameszero.net" } } BLOCK "VarFileInfo" { VALUE "Translation", 0x0000 0x04B0 } }
  3. Bueno amigos aqui os dejo un pequeño tip para unos avs como MS Security Essentials, norton antiviruz bitdefender y como ya deven de saber g-Data etc el tip es cencillo y es para los que tienen flojera de instalarse esos avs! aqui la imagen :drinking: el 06 por un 90 o 00 ai buscaran sus combinaciones!XD el offset es: 210 en la cabecera variara dependiendo que encrypten!
  4. The antivirus software uses two methods to protect our PC: 1 - Analyze the files comparing them with the database of malicious software (Signatures) would be like a police reconnaissance wheel or when trying to identify a criminal with a photo: The antivirus compares each file on the hard drive with a "dictionary" of known viruses. If any piece of code (signatures) in a file on the hard drive matches the virus known in the dictionary, the antivirus software comes into play and 2 the constant monitoring of the behavior of files that may be infected. For example Seeing it from Binary, let's suppose that for Avast this code is a virus signature "12 55 40 05" when analyzing the binary and find this: Automatically Skip as a virus Av Fucker Method With this method we will look for the signature and we will change its code so that Avast or any antivirus does not recognize it anymore Code detected as virus Modified code indented It's simple right? the issue is that when we modify one of those numbers (offset) it has to be functional Let's see it Step by step Step 1 tools Undetectable offset locator 2.6 (is that I use but can be any locator) Hex Workshop This Crypter: LVL23 Crypter I used this little ball: LVL23 Ball Step 2 We grab the crypter and encrypt a small ball Step 3 We open in offset locator and in "file" we choose the ball and in "directory" the folder where we will create the offsets (Create a new folder and call it offsets) in initial bytes we put "100" and fill in the number "90" It would have to stay more or less ASi We start and wait for it to finish creating the offset ... When finished we scan the offset folder with Avast and delete the detected ones Step 4 Let's show offset and we double click on the range that appears 2370 - 2410 now the locator will stay like this
  5. .:Anony:.

    Modding Undetect Tool / By Mr. Morfey

    [Hidden Content] az: File Clean analysed by bxlcity name : Modding Undetect Tool.exe MD5 : 5fd6177bb56fa1401e08efeb05325477