Search the Community

Showing results for tags 'microsoft'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Location


Interests


Occupation


TeamViewer


Tox

Found 94 results

  1. Microsoft Windows task scheduler .job import arbitrary DACL write proof of concept exploit. View the full article
  2. The Microsoft Windows kernel's Registry Virtualization does not safely open the real key for a virtualization location leading to enumerating arbitrary keys resulting in privilege escalation. View the full article
  3. dEEpEst

    Microsoft recommended block rules

    [Hidden Content]
  4. Description The Microsoft Visual Studio suite is the Integrated Development Environment (IDE) and, in fact, Microsoft’s development suite, which is used to design and manufacture a variety of Windows software, websites and web applications. The main focus of this suite is the software design under the framework of the .NET Framework. That technology incorporates various programming languages. The initial release of the series was released in 1995 and its first official release in 1997 as Microsoft Visual Studio 97; until 2002, the collection did not support the .NET Framework, and released the release, named Visual Studio .NET 2002; NET Framework support. done. This suite includes several programming languages, including C #, C ++, C, VB.NET, as well as web programming languages like XML / XSLT, HTML / XHTML, CSS, ASP. Features of the Microsoft Visual Studio suite Writing and developing a variety of Windows software under the .NET Framework. Design dynamic web pages using languages like ASP.NET Generate mobile devices such as smartphones, PocketPCs designed with Windows infrastructure. Code analysis and performance testing and loading Creating communication between languages and the ability to use each other’s capabilities Has different sections of the code editor, design and troubleshooting Full management of databases Microsoft Visual Studio package tips The downloaded version is the original and complete version of Microsoft that was not tested and downloaded from its site and also without the slightest manipulation. This collection is usually presented in four main versions, which we provide the most complete version – Enterprise (which was available in 2013 and earlier versions of Ultimate). Required system Supported Operating Systems Visual Studio 2017 will install and run on the following operating systems Windows 10 version 1507 or higher: Home, Professional, Education, and Enterprise (LTSC and S are not supported) Windows Server 2016: Standard and Datacenter Windows 8.1 (with Update 2919355): Core, Professional, and Enterprise Windows Server 2012 R2 (with Update 2919355): Essentials, Standard, Datacenter Windows 7 SP1 (with latest Windows Updates): Home Premium, Professional, Enterprise, Ultimate Hardware 1.8 GHz or faster processor. Dual-core or better recommended 2 GB of RAM; 4 GB of RAM recommended (2.5 GB minimum if running on a virtual machine) Hard disk space: up to 130 GB of available space, depending on features installed; typical installations require 20-50 GB of free space. Hard disk speed: to improve performance, install Windows and Visual Studio on a solid state drive (SSD). Video card that supports a minimum display resolution of 720p (1280 by 720); Visual Studio will work best at a resolution of WXGA (1366 by 768) or higher. Supported Languages Visual Studio is available in English, Chinese (Simplified), Chinese (Traditional), Czech, French, German, Italian, Japanese, Korean, Polish, Portuguese (Brazil), Russian, Spanish, and Turkish. You can select the language of Visual Studio during installation. The Visual Studio Installer is available in the same fourteen languages, and will match the language of Windows, if available. Note: Visual Studio Team Foundation Server Office Integration 2017 is available in the ten languages supported by Visual Studio Team Foundation Server 2017. Additional Requirements Administrator rights are required to install Visual Studio. .NET Framework 4.5 is required to install Visual Studio. Visual Studio requires .NET Framework 4.6.1, which will be installed during setup. Windows 10 Enterprise LTSC edition and Windows 10 S are not supported for development. You may use Visual Studio 2017 to build apps that run on Windows 10 LTSC and Windows 10 S. Internet Explorer 11 or Edge is required for internet-related scenarios. Some features might not work unless these, or a later version, are installed. For emulator support, Windows 8.1 Pro or Enterprise (x64) editions are required. A processor that supports Client Hyper-V and Second Level Address Translation (SLAT) is also required. Universal Windows app development, including designing, editing, and debugging, requires Windows 10. Windows Server 2016 and Windows Server 2012 R2 may be used to build Universal Windows apps from the command line. The Server Core and Minimal Server Interface options are not supported when running Windows Server. Windows containers are not supported, except for Visual Studio 2017 Build Tools. Team Foundation Server 2017 Office Integration requires Office 2016, Office 2013, or Office 2010. Xamarin.Android requires a 64-bit edition of Windows and the 64-bit Java Development Kit (JDK). PowerShell 3.0 or higher is required on Windows 7 SP1 to install the Mobile Development with C++, JavaScript, or .NET workloads. ----------------------------- Installation guide [Hidden Content]
  5. On Microsoft Windows, the LUAFV driver has a race condition in the LuafvPostReadWrite callback if delay virtualization has occurred during a read leading to the SECTION_OBJECT_POINTERS value being reset to the underlying file resulting in elevation of privilege. View the full article
  6. On Microsoft Windows, the LUAFV driver can confuse the cache and memory manager to replace the contents of privileged file leading to elevation of privilege. View the full article
  7. On Microsoft Windows, the NtSetCachedSigningLevel system call can be tricked by the operation of LUAFV to apply a cached signature to an arbitrary file leading to a bypass of code signing enforcement under UMCI with Device Guard. View the full article
  8. On Microsoft Windows, the LUAFV driver bypasses security checks to copy short names during file virtualization which can be tricked into writing an arbitrary short name leading to elevation of privilege. View the full article
  9. On Microsoft Windows, the LUAFV driver doesn't take into account a virtualized handle being duplicated to a more privileged process resulting in elevation of privilege. View the full article
  10. On Microsoft Windows, the LUAFV driver reuses the file's create request DesiredAccess parameter, which can include MAXIMUM_ACCESS, when virtualizing a file resulting in elevation of privilege. View the full article
  11. On Microsoft Windows, the SxS manifest cache in CSRSS uses a weak key allowing an attacker to fill a cache entry for a system binary leading to elevation of privilege. View the full article
  12. This Metasploit module allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The flaw is due to processing of contact files. View the full article
  13. Microsoft Internet Explorer 11 suffers from an XML external entity injection vulnerability. View the full article
  14. Microsoft Windows AppX deployment service privilege escalation exploit. View the full article
  15. Microsoft Visio 2016 version 16.0.4738.1000 suffers from a denial of service vulnerability. View the full article
  16. Microsoft Windows Win32k local privilege escalation proof of concept exploit. View the full article
  17. Microsoft Edge suffers from a Flash click2play bypass with CObjectElement::FinalCreateObject. View the full article
  18. MSHTML only checks for the CLSID associated with VBScript when blocking in the Internet Zone, but doesn't check other VBScript CLSIDs which allow a web page to bypass the security zone policy. View the full article
  19. The Microsoft Windows MSHTML Engine is prone to a vulnerability that allows attackers to execute arbitrary code on vulnerable systems because of improper validation of specially crafted web documents (html, xhtml, etc). View the full article
  20. The Windows registry editor allows specially crafted .reg filenames to spoof the default registry dialog warning box presented to an end user. This can potentially trick unsavvy users into choosing the wrong selection shown on the dialog box. Furthermore, we can deny the registry editor its ability to show the default secondary status dialog box (Win 10), thereby hiding the fact that our attack was successful. View the full article
  21. Microsoft Edge Chakra version 1.11.4 read permission via type confusion proof of concept exploit. View the full article
  22. [Hidden Content]
  23. This Metasploit module generates a download and execute Powershell command to be placed in an .SLK Excel spreadsheet. When executed, it will retrieve a payload via HTTP from a web server. When the file is opened, the user will be prompted to "Enable Content." Once this is pressed, the payload will execute. View the full article