Jump to content
LeVeL23HackTools

Search the Community

Showing results for tags '.net'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Location


Interests


Occupation


TeamViewer


Tox

Found 29 results

  1. Look inside any .NET code Debug your application Follow bugs through your application to see where the problem is – your own code, third-party libraries, or components used by your application. Understand how applications work Inherited an application with no documentation and no comments? Use .NET Reflector to understand how the code runs and avoid bugs. Look inside APIs, SharePoint, and other third-party platforms Third-party platforms aren't always well-documented. Use .NET Reflector to look inside their assemblies, and see how they work and which APIs you can call. Try it now, choose your version later. Every developer needs this tool. The ability to step into third–party code, including Microsoft SharePoint Server assemblies, opens up new possibilities and lets you understand what Microsoft's APIs are doing. You can step right into their code and see what is happening, all from Visual Studio. This knowledge lets you build better applications and provides insight into undocumented APIs.” [Hidden Content] [HIDE][Hidden Content]]
  2. using Megadumper to decrypt .net malware in a VM [Hidden Content] Source code:
  3. Link is a social network used to improve the collaboration, and communication between a groups of people. It allows them to interact, socialize, share and consume information, thoughts and ideas. In addition, it combines individuals into specific groups like a neighborhood subdivision. Link provides an opportunity for the community such as high school, universities, institutions, governments, non-government institution and others to engage. It also contains many features used to facilitate user interaction and collaboration. Some of these features include: posting, comment on the post, real-time chat session, voting, user profile, and focusing groups. Demo: [Hidden Content] [HIDE][Hidden Content]]
  4. Console Checker - for create your own checkers [HIDE][Hidden Content]]
  5. itsMe

    .NET Reflector 10.1.5.1419 VSPRO

    Find and fix bugs fast Decompile, understand, and fix any .NET code, even if you don't have the source Look inside any .NET code Debug your application Follow bugs through your application to see where the problem is – your own code, third-party libraries, or components used by your application. Understand how applications work Inherited an application with no documentation and no comments? Use .NET Reflector to understand how the code runs and avoid bugs. Look inside APIs, SharePoint, and other third-party platforms Third-party platforms aren't always well-documented. Use .NET Reflector to look inside their assemblies, and see how they work and which APIs you can call. Try it now, choose your version later. [Hidden Content] reflectoraddins [Hidden Content] [Hidden Content]
  6. [Hidden Content] Description Nevron Vision for .NET is a component that lets you visualize the various aspects of data performance graphically. With this component, you will be able to see all your data on different charts and charts. The components in the Nevron Vision for .NET package allow you to display your information in two-dimensional and three-dimensional form and provide users with graphical visuals. In addition, the toolkit will allow you to display the information according to your desire. With this component, you can display your charts in WinForms , WPF, ASP.NET, and MVC. With this component, you can create business, scientific, financial, or presentation integrated Dashboards or Business Intelligence solutions. Features of Nevron Vision for .NET Using an API to develop applications for Web and Desktop Excellent hardware performance in 2D and 3D charts and directories. a series full of all kinds of graphs 2D and 3D ( supports 170 types of charts ). A complete set of Gauges and KPIs. graph model -driven – class linear, logarithmic , time and television time line advanced. Pre-built financial and statistical functions. lack of overlap Daddah Ha and Brچsabhaی axis. Ability to change the chart size and support of the docking , anchoring , and so on. Connect data Stereoscopic data, information, panning, centering, scrolling tooltips. The Nevron Vision for .NET suite of new features and features are visible from here Nevron Vision for .NET Tips Once installed, use the available serial to license it. Be sure to get the version of your Visual Studio. Required system Visual Studio 2005 Visual Studio 2008 Visual Studio 2010 Visual Studio 2012 Visual Studio 2013 Visual Studio 2015 Visual Studio 2017
  7. What is Agile.Net Obfuscator ? Agile.NET is a Powerful Code Protection, Obfuscation, and Licensing Solution for your .NET Apps Agile.NET obfuscator goes beyond traditional obfuscation methods. In addition to renaming your metadata entities, it also supports advanced obfuscation methods that will harden your overall protection scheme and foil reverse engineering altogether. See more details below. Obfuscates every aspect of your code, including class and method names, managed resources, user strings, methods implementation, system and library calls. Agile.net Protects more of your application than any other obfuscator because it knows what is safe to change and what needs to be left alone. Nevertheless, it gives you full control of the obfuscation process. [Hidden Content]
  8. .NET Reflector 10.1 release notes Last updated 02 April 2019, viewed 1162 times 10.1.4 - April 2nd, 2019 Minor changes .NET Reflector now requires .NET Framework 4.6.1 or later (was previously 3.5 or later). Information pane about new decompilation engine was removed. New decompilation engine is used by default, unless changed by the option on a toolbar. [HIDE][Hidden Content]] Pass: level23hacktools.com
  9. HanYazilim Paper Submission System .NET version 1.0 suffers from a remote shell upload vulnerability. View the full article
  10. Application Protection Learn about the technologies that make up obfuscation and application self protection. Obfuscation Explained Harden Mobile Applications Secure mobile apps to resist reverse engineering, running in a debugger or on a compromised device. Why Obfuscate Mobile Apps Comprehensive Risk Mitigation Hackers are increasingly targeting apps as attack vectors. Protect your apps - before, during and after the hack. How to Protect Apps from Hackers Application Hardening Application Hardening: Do you need it and if so, which approach is right? Learn More... Trade Secrets and Software Why secure development practices can protect your intellectual property. Learn more... Five Evil Things a Hacker Does to Your App Read about the ways hackers go about their dirty deeds and how to achieve a balanced perspective on app risk and risk management [Hidden Content] [Hidden Content] Pass: level23hacktools.com
  11. itsMe

    Eziriz .NET Reactor 5.9.8.0

    .NET Code Encryption Resource Encryption & Compression Cross Assembly Obfuscation Native EXE File Generation Pre-JIT Support Control Flow Obfuscation String Encryption IL Code Removing Constant Field Removing Anti-Reflection & Decompiler Protection Anti-Tampering Protection Advanced Licensing System Embed or Merge Assemblies into one Single EXE or DLL Visual Studio, MSBuild & ClickOnce Integration Command Line and Intuitive GUI (Graphical User Interface) .NET 1.1, 2.0, 3.x, 4.0 - 4.7.x .NET Standard, .NET Core, UWP, PCL, Compact Framework Support for ASP.NET, Silverlight, WPF, Mono Support for WinRT/Metro and Windows Phone 7/8/8.1/10 Support for Xamarin Mac, Xamarin Android and iOS More Features Create Trial Versions of Your Software (EXE/DLL) Turn Trial Versions into Licensed Versions using License Files License Assemblies Without Adding Code Extend/Create Trials or Create Time Limited Full Versions SDK To Check License Status, Examine License Files... Protection Features (Code/String/Resource Encryption, Obfuscation...) Store Custom Information Inside License Files Floating License / Concurrent User Support Hardware Lock Licenses To Specific Hardware IDs Runtime/Design-Time Licensing Support Management System for Customers/Products/Sales Various e-Commerce IPN Handlers for ASP.NET Embed or Merge Assemblies into a Single EXE or DLL Visual Studio, MSBuild & ClickOnce Integration Command Line and Intuitive GUI (Graphical User Interface) Embed License at Build Time into Applications (Component Libraries) Portable Assembly Support .NET 1.1, 2.0, 3.0, 3.5, 4.0 - 4.7.x .NET Compact Framework 1.0, 2.0 & 3.5 Support for ASP.NET, Silverlight, WPF, Mono More Features [Hidden Content] [Hidden Content] Pass: level23hacktools.com
  12. 0x1

    .NET Reactor 5.9.8

    .NET Reactor [5.9.8.0] 01-Dec-2018 Added Universal Windows (UWP) protection support and added corresponding protection presets Added ASP.NET Core protection support Added .NET Core 2.2 protection support Added public type internalization exclusion editor (2. Protection Settings -> Public Types Internalization -> Exclusions) Added options to exclude compiler generated types and properties from obfuscation (Obfuscation -> Exclusions -> Compiler Generated Types) Added license generation support (LicenseGenNetStandard.dll) for the .NET Standard/Core environment Improved protection support for NET Standard and Core libraries Fixed issue where WPF applications sometimes not correctly detected as desktop application Fixed project file loading problem Fixed compiled XAML (BAML) reading issue Fixed mixed mode (C++/CLI) obfuscation issue Fixed Visual Studio 2017 Add-in issue Fixed dynamic encryption issue Fixed minor bugs Download [hide][Hidden Content]] Pass : level23hacktools.com
  13. Supported Applications: All 32-bit, 64-bit and “Any CPU” apps, including Console, GUI, Windows Forms (WinForms), WPF and ASP.Net apps, libraries, components, controls, VSTO based Word/Excel/Outlook/etc Office Add-Ins, Windows Services & WCF Services. Obfuscated apps are FIPS compliant. Supported Tools: All editions of Visual Studio 2013, Visual Studio 2012, Visual Studio 2010, Visual Studio 2008, Visual Studio 2005, Visual Studio 2003, Visual Studio 2002. Supported .Net Frameworks: All from .Net Framework 1.0 to .Net Framework 4.5. Supported Languages: All managed languages including C#, Visual Basic.Net (VB.Net), Managed C++, J# and many others. .Net Compact Framework: 1.1, 2.0, 3.5 & 4.0. Silverlight: 2.0, 3.0, 4.0 and 5.0 including Silverlight for Windows Phone 7.0/7.5/8.0 and above. Metro Framework: Supports Windows 8 Metro/WinRT apps. XNA Framework: 2.0, 3.0 & 4.0 .Net Micro Framework: 3.0 & 4.0 Additional Frameworks Supported: Mono Assemblies and Mono-Android Assemblies and Unity3D assemblies. Supported OS: 32-bit (x86) and 64-bit (x64) versions of: Windows 8, Windows 7, Windows Vista, Windows XP, Windows 2008, Windows 2003, Windows 2000, Windows Me, Windows 98, Windows NT [Hidden Content] [HIDE][Hidden Content]] Pass: level23hacktools.com
  14. itsMe

    Free .NET obfuscator

    Free .NET obfuscator is an online obfuscation tool that helps protect .NET exes and dlls against reverse-engineering by making it difficult for a third-party to access your source code. [HIDE][Hidden Content]]
  15. install Bunifu: [Hidden Content] Features: [Hidden Content] [HIDE][Hidden Content]] Pass: level23hacktools.com
  16. Shed is an application that allow to inspect the .NET runtime of a program in order to extract useful information. It can be used to inspect malicious applications in order to have a first general overview of which information are stored once that the malware is executed. Shed is able to: Inject a .NET Assembly in a remote process (both managed and un-managed) Extract all objects stored in the managed heap Print strings stored in memory Save the snapshot of the heap in a JSON format for post-processing Dump all modules that are loaded in memory [HIDE][Hidden Content]]
  17. [HIDE][Hidden Content]] The project logo cames from Legendora Icon by Teekatas Suwannakrua. Maintained and supported by LeXtudio. Project Description Obfuscar is an open source .NET obfuscator released under MIT license. It provides basic obfuscation features that help secure secrets in a .NET assembly. Simple Configuration Hide everything private, while keep everything public. You can achieve such simply via default settings. Name Obfuscation Hide class/method/property/event names that you don't want to expose. This is irreversible. String Compression String contents can be compressed so that end users won't easily learn them. However, this is reversible by certain tools.
  18. Development is increasingly dependent on 3rd party technologies - using available frameworks and libraries is a great way to get stuff done fast without re-inventing the wheel. But the problem with using code you didn't write is that you're dependent on the documentation, and it's hard to debug. Documentation is often missing or incomplete, and debugging stops where your own code stops. This gets even worse with a legacy code base. .NET Reflector saves time and simplifies development by letting you see and debug into the source of all the .NET code you work with. Look inside any .NET code Debug your application Follow bugs through your application to see where the problem is - your own code, third-party libraries, or components used by your application. Understand how applications work Inherited an application with no documentation and no comments? Use .NET Reflector to understand how the code runs and avoid bugs. Look inside APIs, SharePoint, and other third-party platforms Third-party platforms aren't always well-documented. Use .NET Reflector to look inside their assemblies, and see how they work and which APIs you can call. Features: Debug and decompile inside Visual Studio (VSPro edition) Use the Visual Studio debugger Use your regular debugging techniques on any decompiled assemblies as if they were your own, using the Visual Studio debugger. Debug third-party assemblies Generate .pdb files for decompiled assemblies and save them so you only need to enable debugging once for each assembly. Dynamic decompilation Assemblies decompile seamlessly in Visual Studio so source code is always available for your libraries. Use VS shortcuts Use F12 to "Go To Definition", F9 to "Set Breakpoints", and F11 to "Step Into" any decompiled code. C#6 decompilation .NET Reflector supports C#6 and .NET 4.6. Browse assemblies .NET Reflector VSPro adds the Reflector Object Browser into Visual Studio. Use the tree view to navigate through code. Editions: Standard, VS, VSPro. Homepage: [Hidden Content] Name: ReflectorInstaller_10.0.4.406 Size: 8.13 MB ----------------------------------------------------- INFOS Before you install the application (or run the Reflector), make sure you have been added these 2 lines in C:\Windows\System32\Drivers\etc\hosts file: Then install the application. Run the keygen (old lz0 keygen still works) to activate it offline. [HIDE][Hidden Content]] Pass: > level23hacktools.com
  19. .NET Reactor is a powerful code protection and software licensing system for software written for the .NET Framework, and supports all languages that generate .NET assemblies. Its' main features are : Intellectual property protection NecroBit Protection Native Code generation Obfuscation Control Flow Obfuscation String Encryption Anti Tampering Resource Encryption and Compression Dependency Merging Protects full applications and libraries (dlls) Powerful licensing system Software development kit Integrate license checking into you assembly and extend licensing fuctionality Extend licensing functions with bespoke extensions. Why you need to protect your intellectual property. When you compile a program written for the Microsoft .NET framework, the program you provide to your users is not compiled into a native executable program, but instead is translated into something called the Common Intermediate Language instructions (CIL). CIL is half way between source code and native code, and is interpreted by the .NET framework when your program is run, rather than executed directly as machine code. Because of this, the source code of your application or library can be easily reproduced. Tools such as .NET Reflector (www.red-gate.com/products/reflector/ ([Hidden Content])) can reproduce source code from a compiled .NET assemblies in seconds, and in the .NET language of your choice! Clearly, commercial software distributed to end users without some form of protection is wide open to piracy and intellectual property theft. The traditional solution to intellectual property protection in .NET is to use 'obfuscation', indeed Microsoft make an obfuscation utility available to Visual Studio users. So why is obsfucation not enough? Obfuscation is the process of making your source code more difficult (but not impossible) for humans to understand. Obfuscation works by replacing the meaningful names you assign to classes, methods, properties and variables with meaningless ones. For example, it may replace a variable name of "counter" with "A4DF3CV89G" - to humans these obfuscated names are confusing and difficult to remember, but have no effect on the NET Framework interpreter. Note that obfuscation does nothing to the source code within your methods, so it is not protected at all by obfuscation. .NET Reactor does everything an obfuscator does, but then wraps your intellectual property in several more layers of protection, denying access to your source code to even those who are determined to steal your hard work. .NET Reactor's protection has never been cracked, something which cannot be said about obfuscators. Industry Leading .NET Reactor Source Protection .NET Reactor prevents decompilation by a variety of methods which convert your .NET assemblies into processes which no existing tool can decompile ( and which are also very likely to prevent decompilation by any future tool). .NET Reactor builds a native code wall between potential hackers and your .NET assemblies by producing a file which cannot be understood directly as CIL. Because the CIL in your assembly is emitted intact only at run time or design time (in a form in which the source is completely inaccessible), no tool is capable of decompiling .NET Reactor protected assemblies. The native code wall created by .NET Reactor between the hacker and your source includes industry leading NecroBit technology, which is exclusive to .NET Reactor. .NET Reactor's protection has never been broken since the first release in 2004. These technologies make reconstruction of your source code more difficult by so many orders of magnitude that NecroBit is by far the most effective protection you can use for .NET assemblies. In addition to industry leading intellectual property protection, .NET Reactor provides powerful options for securing you revenue stream by enforcing licensing terms with a rich variety of trialversion and full version locks. .NET Reactor offers you an easy and reliable way to: Secure your .NET applications and .NET libraries Replace CIL code with native code Perform additional layers of protection, including obfuscation Merge assemblies, and Protect your revenue by enforcing trial version restrictions and full version licensing [HIDE][Hidden Content]] Pass: > level23hacktools.com
  20. Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  21. [HIDE][Hidden Content]] dotPeek can decompile any .NET assemblies into equivalent C# code and optionally show the underlying IL code. Libraries, executables and more dotPeek can work with a variety of formats, such as libraries (.dll), executables (.exe), and metadata files (.winmd). dotPeek can also decompile .baml files, enabling you to reconstruct XAML UI definitions. In addition to traditional assemblies and executables, you can have dotPeek open archives (.zip, .vsix, or .nupkg) and folders. You can also find and load NuGet packages (and their dependencies) from any online package source, or load packages listed in a packages.config file in your Visual Studio project. What′s New in dotPeek This page outlines what has changed in recent versions of dotPeek. Highlights include support for Portable PDB files and SourceLink, a metadata viewer, an assembly dependency diagram and navigation improvements.
  22. 0x1

    .Net Reactor v5.9.2

    Eziriz .Net Reactor v5.9.2.0 Cracked by [yoza] Change Log [5.9.2.0] - 12-Sep-2018 : Download : [Hidden Content] Password : level23hacktools.com
  23. This whitepaper analyzes a privilege escalation vulnerability in the Microsoft .NET framework as noted in MS15-118. View the full article
  24. dEEpEst

    Pack Sources .NET

  25. dEEpEst

    Shield .Net by 3v1L

    Filename: gwmXEKZVK.exe Detection Rate: 1/21 File Size: 126,5 KB File MD5: 26b363e16e1c508b3bb70ab761dbddae Date: 2018-07-11 17:53:39 Link: ScanMyBin - Scantime Results ArcaVir Antivirus: Clean Ad-Aware Antivirus: Clean Avast Antivirus: Clean AVG Antivirus: Clean Avira Internet Security: TR/Dropper.Gen BitDefender Total Security: Clean BullGuard Internet Security: Clean Clam AntiVirus: Clean DrWeb Antivirus: Clean Emsisoft Internet Security: Clean McAfee VirusScan Enterprise: Clean ESET NOD32 Antivirus: Clean eScan Anti-Virus: Clean F-Secure Anti-Virus: Clean G Data Internet Security: Clean IKARUS anti.virus: Clean Kaspersky Antivirus: Clean Sophos Anti-Virus: Clean TrustPort Antivirus Sphere: Clean VBA32 Anti-Virus: Clean Windows Defender: Clean Scan by ScanMyBin.net Download: [hide][Hidden Content]] Password: level23hacktools.com
×

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.