Search the Community

Showing results for tags '.net'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
    • Cracking Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
    • Windows Phone
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Premium Accounts
    • Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Cracking Zone PRIV8
    • Cracking Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Location


Interests


Occupation


TeamViewer


Tox

Found 22 results

  1. itsMe?

    RedGate .NET Reflector 10.1.4 VSPro

    .NET Reflector 10.1 release notes Last updated 02 April 2019, viewed 1162 times 10.1.4 - April 2nd, 2019 Minor changes .NET Reflector now requires .NET Framework 4.6.1 or later (was previously 3.5 or later). Information pane about new decompilation engine was removed. New decompilation engine is used by default, unless changed by the option on a toolbar. [HIDE][Hidden Content]] Pass: level23hacktools.com
  2. HanYazilim Paper Submission System .NET version 1.0 suffers from a remote shell upload vulnerability. View the full article
  3. Application Protection Learn about the technologies that make up obfuscation and application self protection. Obfuscation Explained Harden Mobile Applications Secure mobile apps to resist reverse engineering, running in a debugger or on a compromised device. Why Obfuscate Mobile Apps Comprehensive Risk Mitigation Hackers are increasingly targeting apps as attack vectors. Protect your apps - before, during and after the hack. How to Protect Apps from Hackers Application Hardening Application Hardening: Do you need it and if so, which approach is right? Learn More... Trade Secrets and Software Why secure development practices can protect your intellectual property. Learn more... Five Evil Things a Hacker Does to Your App Read about the ways hackers go about their dirty deeds and how to achieve a balanced perspective on app risk and risk management [Hidden Content] [Hidden Content] Pass: level23hacktools.com
  4. itsMe?

    Eziriz .NET Reactor 5.9.8.0

    .NET Code Encryption Resource Encryption & Compression Cross Assembly Obfuscation Native EXE File Generation Pre-JIT Support Control Flow Obfuscation String Encryption IL Code Removing Constant Field Removing Anti-Reflection & Decompiler Protection Anti-Tampering Protection Advanced Licensing System Embed or Merge Assemblies into one Single EXE or DLL Visual Studio, MSBuild & ClickOnce Integration Command Line and Intuitive GUI (Graphical User Interface) .NET 1.1, 2.0, 3.x, 4.0 - 4.7.x .NET Standard, .NET Core, UWP, PCL, Compact Framework Support for ASP.NET, Silverlight, WPF, Mono Support for WinRT/Metro and Windows Phone 7/8/8.1/10 Support for Xamarin Mac, Xamarin Android and iOS More Features Create Trial Versions of Your Software (EXE/DLL) Turn Trial Versions into Licensed Versions using License Files License Assemblies Without Adding Code Extend/Create Trials or Create Time Limited Full Versions SDK To Check License Status, Examine License Files... Protection Features (Code/String/Resource Encryption, Obfuscation...) Store Custom Information Inside License Files Floating License / Concurrent User Support Hardware Lock Licenses To Specific Hardware IDs Runtime/Design-Time Licensing Support Management System for Customers/Products/Sales Various e-Commerce IPN Handlers for ASP.NET Embed or Merge Assemblies into a Single EXE or DLL Visual Studio, MSBuild & ClickOnce Integration Command Line and Intuitive GUI (Graphical User Interface) Embed License at Build Time into Applications (Component Libraries) Portable Assembly Support .NET 1.1, 2.0, 3.0, 3.5, 4.0 - 4.7.x .NET Compact Framework 1.0, 2.0 & 3.5 Support for ASP.NET, Silverlight, WPF, Mono More Features [Hidden Content] [Hidden Content] Pass: level23hacktools.com
  5. 0x1

    .NET Reactor 5.9.8

    .NET Reactor [5.9.8.0] 01-Dec-2018 Added Universal Windows (UWP) protection support and added corresponding protection presets Added ASP.NET Core protection support Added .NET Core 2.2 protection support Added public type internalization exclusion editor (2. Protection Settings -> Public Types Internalization -> Exclusions) Added options to exclude compiler generated types and properties from obfuscation (Obfuscation -> Exclusions -> Compiler Generated Types) Added license generation support (LicenseGenNetStandard.dll) for the .NET Standard/Core environment Improved protection support for NET Standard and Core libraries Fixed issue where WPF applications sometimes not correctly detected as desktop application Fixed project file loading problem Fixed compiled XAML (BAML) reading issue Fixed mixed mode (C++/CLI) obfuscation issue Fixed Visual Studio 2017 Add-in issue Fixed dynamic encryption issue Fixed minor bugs Download [hide][Hidden Content]] Pass : level23hacktools.com
  6. Supported Applications: All 32-bit, 64-bit and “Any CPU” apps, including Console, GUI, Windows Forms (WinForms), WPF and ASP.Net apps, libraries, components, controls, VSTO based Word/Excel/Outlook/etc Office Add-Ins, Windows Services & WCF Services. Obfuscated apps are FIPS compliant. Supported Tools: All editions of Visual Studio 2013, Visual Studio 2012, Visual Studio 2010, Visual Studio 2008, Visual Studio 2005, Visual Studio 2003, Visual Studio 2002. Supported .Net Frameworks: All from .Net Framework 1.0 to .Net Framework 4.5. Supported Languages: All managed languages including C#, Visual Basic.Net (VB.Net), Managed C++, J# and many others. .Net Compact Framework: 1.1, 2.0, 3.5 & 4.0. Silverlight: 2.0, 3.0, 4.0 and 5.0 including Silverlight for Windows Phone 7.0/7.5/8.0 and above. Metro Framework: Supports Windows 8 Metro/WinRT apps. XNA Framework: 2.0, 3.0 & 4.0 .Net Micro Framework: 3.0 & 4.0 Additional Frameworks Supported: Mono Assemblies and Mono-Android Assemblies and Unity3D assemblies. Supported OS: 32-bit (x86) and 64-bit (x64) versions of: Windows 8, Windows 7, Windows Vista, Windows XP, Windows 2008, Windows 2003, Windows 2000, Windows Me, Windows 98, Windows NT [Hidden Content] [HIDE][Hidden Content]] Pass: level23hacktools.com
  7. itsMe?

    Free .NET obfuscator

    Free .NET obfuscator is an online obfuscation tool that helps protect .NET exes and dlls against reverse-engineering by making it difficult for a third-party to access your source code. [HIDE][Hidden Content]]
  8. install Bunifu: [Hidden Content] Features: [Hidden Content] [HIDE][Hidden Content]] Pass: level23hacktools.com
  9. Shed is an application that allow to inspect the .NET runtime of a program in order to extract useful information. It can be used to inspect malicious applications in order to have a first general overview of which information are stored once that the malware is executed. Shed is able to: Inject a .NET Assembly in a remote process (both managed and un-managed) Extract all objects stored in the managed heap Print strings stored in memory Save the snapshot of the heap in a JSON format for post-processing Dump all modules that are loaded in memory [HIDE][Hidden Content]]
  10. [HIDE][Hidden Content]] The project logo cames from Legendora Icon by Teekatas Suwannakrua. Maintained and supported by LeXtudio. Project Description Obfuscar is an open source .NET obfuscator released under MIT license. It provides basic obfuscation features that help secure secrets in a .NET assembly. Simple Configuration Hide everything private, while keep everything public. You can achieve such simply via default settings. Name Obfuscation Hide class/method/property/event names that you don't want to expose. This is irreversible. String Compression String contents can be compressed so that end users won't easily learn them. However, this is reversible by certain tools.
  11. Development is increasingly dependent on 3rd party technologies - using available frameworks and libraries is a great way to get stuff done fast without re-inventing the wheel. But the problem with using code you didn't write is that you're dependent on the documentation, and it's hard to debug. Documentation is often missing or incomplete, and debugging stops where your own code stops. This gets even worse with a legacy code base. .NET Reflector saves time and simplifies development by letting you see and debug into the source of all the .NET code you work with. Look inside any .NET code Debug your application Follow bugs through your application to see where the problem is - your own code, third-party libraries, or components used by your application. Understand how applications work Inherited an application with no documentation and no comments? Use .NET Reflector to understand how the code runs and avoid bugs. Look inside APIs, SharePoint, and other third-party platforms Third-party platforms aren't always well-documented. Use .NET Reflector to look inside their assemblies, and see how they work and which APIs you can call. Features: Debug and decompile inside Visual Studio (VSPro edition) Use the Visual Studio debugger Use your regular debugging techniques on any decompiled assemblies as if they were your own, using the Visual Studio debugger. Debug third-party assemblies Generate .pdb files for decompiled assemblies and save them so you only need to enable debugging once for each assembly. Dynamic decompilation Assemblies decompile seamlessly in Visual Studio so source code is always available for your libraries. Use VS shortcuts Use F12 to "Go To Definition", F9 to "Set Breakpoints", and F11 to "Step Into" any decompiled code. C#6 decompilation .NET Reflector supports C#6 and .NET 4.6. Browse assemblies .NET Reflector VSPro adds the Reflector Object Browser into Visual Studio. Use the tree view to navigate through code. Editions: Standard, VS, VSPro. Homepage: [Hidden Content] Name: ReflectorInstaller_10.0.4.406 Size: 8.13 MB ----------------------------------------------------- INFOS Before you install the application (or run the Reflector), make sure you have been added these 2 lines in C:\Windows\System32\Drivers\etc\hosts file: Then install the application. Run the keygen (old lz0 keygen still works) to activate it offline. [HIDE][Hidden Content]] Pass: > level23hacktools.com
  12. .NET Reactor is a powerful code protection and software licensing system for software written for the .NET Framework, and supports all languages that generate .NET assemblies. Its' main features are : Intellectual property protection NecroBit Protection Native Code generation Obfuscation Control Flow Obfuscation String Encryption Anti Tampering Resource Encryption and Compression Dependency Merging Protects full applications and libraries (dlls) Powerful licensing system Software development kit Integrate license checking into you assembly and extend licensing fuctionality Extend licensing functions with bespoke extensions. Why you need to protect your intellectual property. When you compile a program written for the Microsoft .NET framework, the program you provide to your users is not compiled into a native executable program, but instead is translated into something called the Common Intermediate Language instructions (CIL). CIL is half way between source code and native code, and is interpreted by the .NET framework when your program is run, rather than executed directly as machine code. Because of this, the source code of your application or library can be easily reproduced. Tools such as .NET Reflector (www.red-gate.com/products/reflector/ ([Hidden Content])) can reproduce source code from a compiled .NET assemblies in seconds, and in the .NET language of your choice! Clearly, commercial software distributed to end users without some form of protection is wide open to piracy and intellectual property theft. The traditional solution to intellectual property protection in .NET is to use 'obfuscation', indeed Microsoft make an obfuscation utility available to Visual Studio users. So why is obsfucation not enough? Obfuscation is the process of making your source code more difficult (but not impossible) for humans to understand. Obfuscation works by replacing the meaningful names you assign to classes, methods, properties and variables with meaningless ones. For example, it may replace a variable name of "counter" with "A4DF3CV89G" - to humans these obfuscated names are confusing and difficult to remember, but have no effect on the NET Framework interpreter. Note that obfuscation does nothing to the source code within your methods, so it is not protected at all by obfuscation. .NET Reactor does everything an obfuscator does, but then wraps your intellectual property in several more layers of protection, denying access to your source code to even those who are determined to steal your hard work. .NET Reactor's protection has never been cracked, something which cannot be said about obfuscators. Industry Leading .NET Reactor Source Protection .NET Reactor prevents decompilation by a variety of methods which convert your .NET assemblies into processes which no existing tool can decompile ( and which are also very likely to prevent decompilation by any future tool). .NET Reactor builds a native code wall between potential hackers and your .NET assemblies by producing a file which cannot be understood directly as CIL. Because the CIL in your assembly is emitted intact only at run time or design time (in a form in which the source is completely inaccessible), no tool is capable of decompiling .NET Reactor protected assemblies. The native code wall created by .NET Reactor between the hacker and your source includes industry leading NecroBit technology, which is exclusive to .NET Reactor. .NET Reactor's protection has never been broken since the first release in 2004. These technologies make reconstruction of your source code more difficult by so many orders of magnitude that NecroBit is by far the most effective protection you can use for .NET assemblies. In addition to industry leading intellectual property protection, .NET Reactor provides powerful options for securing you revenue stream by enforcing licensing terms with a rich variety of trialversion and full version locks. .NET Reactor offers you an easy and reliable way to: Secure your .NET applications and .NET libraries Replace CIL code with native code Perform additional layers of protection, including obfuscation Merge assemblies, and Protect your revenue by enforcing trial version restrictions and full version licensing [HIDE][Hidden Content]] Pass: > level23hacktools.com
  13. Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  14. [HIDE][Hidden Content]] dotPeek can decompile any .NET assemblies into equivalent C# code and optionally show the underlying IL code. Libraries, executables and more dotPeek can work with a variety of formats, such as libraries (.dll), executables (.exe), and metadata files (.winmd). dotPeek can also decompile .baml files, enabling you to reconstruct XAML UI definitions. In addition to traditional assemblies and executables, you can have dotPeek open archives (.zip, .vsix, or .nupkg) and folders. You can also find and load NuGet packages (and their dependencies) from any online package source, or load packages listed in a packages.config file in your Visual Studio project. What′s New in dotPeek This page outlines what has changed in recent versions of dotPeek. Highlights include support for Portable PDB files and SourceLink, a metadata viewer, an assembly dependency diagram and navigation improvements.
  15. 0x1

    .Net Reactor v5.9.2

    Eziriz .Net Reactor v5.9.2.0 Cracked by [yoza] Change Log [5.9.2.0] - 12-Sep-2018 : Download : [Hidden Content] Password : level23hacktools.com
  16. This whitepaper analyzes a privilege escalation vulnerability in the Microsoft .NET framework as noted in MS15-118. View the full article
  17. dEEpEst

    Pack Sources .NET

  18. dEEpEst

    crypter Shield .Net by 3v1L

    Filename: gwmXEKZVK.exe Detection Rate: 1/21 File Size: 126,5 KB File MD5: 26b363e16e1c508b3bb70ab761dbddae Date: 2018-07-11 17:53:39 Link: ScanMyBin - Scantime Results ArcaVir Antivirus: Clean Ad-Aware Antivirus: Clean Avast Antivirus: Clean AVG Antivirus: Clean Avira Internet Security: TR/Dropper.Gen BitDefender Total Security: Clean BullGuard Internet Security: Clean Clam AntiVirus: Clean DrWeb Antivirus: Clean Emsisoft Internet Security: Clean McAfee VirusScan Enterprise: Clean ESET NOD32 Antivirus: Clean eScan Anti-Virus: Clean F-Secure Anti-Virus: Clean G Data Internet Security: Clean IKARUS anti.virus: Clean Kaspersky Antivirus: Clean Sophos Anti-Virus: Clean TrustPort Antivirus Sphere: Clean VBA32 Anti-Virus: Clean Windows Defender: Clean Scan by ScanMyBin.net Download: [hide][Hidden Content]] Password: level23hacktools.com
  19. dEEpEst

    .net Protect Process

    VB.NET: Class ProcessElevation <DllImport("kernel32.dll")> _ Public Shared Function GetCurrentProcess() As IntPtr End Function <DllImport("advapi32.dll", SetLastError:=True)> _ Private Shared Function SetKernelObjectSecurity(ByVal Handle As IntPtr, ByVal securityInformation As Integer, <[In]()> ByVal pSecurityDescriptor As Byte()) As Boolean End Function <DllImport("advapi32.dll", SetLastError:=True)> _ Private Shared Function GetKernelObjectSecurity(ByVal Handle As IntPtr, ByVal securityInformation As Integer, <Out()> ByVal pSecurityDescriptor As Byte(), ByVal nLength As UInteger, ByRef lpnLengthNeeded As UInteger) As Boolean End Function <Flags()> _ Public Enum ProcessAccessRights PROCESS_CREATE_PROCESS = &H80 PROCESS_CREATE_THREAD = &H2 PROCESS_DUP_HANDLE = &H40 PROCESS_QUERY_INFORMATION = &H400 PROCESS_QUERY_LIMITED_INFORMATION = &H1000 PROCESS_SET_INFORMATION = &H200 PROCESS_SET_QUOTA = &H100 PROCESS_SUSPEND_RESUME = &H800 PROCESS_TERMINATE = &H1 PROCESS_VM_OPERATION = &H8 PROCESS_VM_READ = &H10 PROCESS_VM_WRITE = &H20 DELETE = &H10000 READ_CONTROL = &H20000 SYNCHRONIZE = &H100 WRITE_DAC = &H40000 ITE_OWNER = &H80000 STANDARD_RIGHTS_REQUIRED = &HF0000 PROCESS_ALL_ACCESS = (STANDARD_RIGHTS_REQUIRED Or SYNCHRONIZE Or &HFFF) End Enum Public Shared Sub Kanka() Dim hProcess As IntPtr = GetCurrentProcess() 'get the handle of the current process as this is the one we want to protect Dim dal = ParseProcDescriptor(hProcess) dal.DiscretionaryAcl.InsertAce(0, New CommonAce(AceFlags.None, AceQualifier.AccessDenied, CInt(ProcessAccessRights.PROCESS_ALL_ACCESS), New SecurityIdentifier(WellKnownSidType.WorldSid, Nothing), False, Nothing)) EditProcDescriptor(hProcess, dal) End Sub Public Shared Function ParseProcDescriptor(ByVal processHandle As IntPtr) As RawSecurityDescriptor Const dal_SECURITY_INFORMATION As Integer = &H4 Dim buff As Byte() = New Byte(-1) {} Dim setblock As UInteger GetKernelObjectSecurity(processHandle, dal_SECURITY_INFORMATION, buff, 0, setblock) If setblock < 0 OrElse setblock > Short.MaxValue Then Throw New Win32Exception() End If If Not GetKernelObjectSecurity(processHandle, dal_SECURITY_INFORMATION, InlineAssignHelper(buff, New Byte(setblock - 1) {}), setblock, setblock) Then Throw New Win32Exception() End If Return New RawSecurityDescriptor(buff, 0) End Function Public Shared Sub EditProcDescriptor(ByVal processHandle As IntPtr, ByVal dal As RawSecurityDescriptor) Const dal_SECURITY_INFORMATION As Integer = &H4 Dim rawsd As Byte() = New Byte(dal.BinaryLength - 1) {} dal.GetBinaryForm(rawsd, 0) If Not SetKernelObjectSecurity(processHandle, dal_SECURITY_INFORMATION, rawsd) Then Throw New Win32Exception() End If End Sub Private Shared Function InlineAssignHelper(Of T)(ByRef app As T, ByVal ret As T) As T app = ret Return ret End Function End Class C#: class ProcessElevation { [DllImport("kernel32.dll")] public static IntPtr GetCurrentProcess() { } [DllImport("advapi32.dll", SetLastError = true)] private static bool SetKernelObjectSecurity(IntPtr Handle, int securityInformation, [In()] byte[] pSecurityDescriptor) { } [DllImport("advapi32.dll", SetLastError = true)] private static bool GetKernelObjectSecurity(IntPtr Handle, int securityInformation, [Out()] byte[] pSecurityDescriptor, uint nLength, ref uint lpnLengthNeeded) { } [Flags()] public enum ProcessAccessRights { PROCESS_CREATE_PROCESS = 0x80, PROCESS_CREATE_THREAD = 0x2, PROCESS_DUP_HANDLE = 0x40, PROCESS_QUERY_INFORMATION = 0x400, PROCESS_QUERY_LIMITED_INFORMATION = 0x1000, PROCESS_SET_INFORMATION = 0x200, PROCESS_SET_QUOTA = 0x100, PROCESS_SUSPEND_RESUME = 0x800, PROCESS_TERMINATE = 0x1, PROCESS_VM_OPERATION = 0x8, PROCESS_VM_READ = 0x10, PROCESS_VM_WRITE = 0x20, DELETE = 0x10000, READ_CONTROL = 0x20000, SYNCHRONIZE = 0x100, WRITE_DAC = 0x40000, ITE_OWNER = 0x80000, STANDARD_RIGHTS_REQUIRED = 0xf0000, PROCESS_ALL_ACCESS = (STANDARD_RIGHTS_REQUIRED | SYNCHRONIZE | 0xfff) } public static void Kanka() { IntPtr hProcess = GetCurrentProcess(); object dal = ParseProcDescriptor(hProcess); dal.DiscretionaryAcl.InsertAce(0, new CommonAce(AceFlags.None, AceQualifier.AccessDenied, (int)ProcessAccessRights.PROCESS_ALL_ACCESS, new SecurityIdentifier(WellKnownSidType.WorldSid, null), false, null)); EditProcDescriptor(hProcess, dal); } public static RawSecurityDescriptor ParseProcDescriptor(IntPtr processHandle) { const int dal_SECURITY_INFORMATION = 0x4; byte[] buff = new byte[-1] { }; uint setblock; GetKernelObjectSecurity(processHandle, dal_SECURITY_INFORMATION, buff, 0, setblock); if (setblock < 0 || setblock > short.MaxValue) { throw new Win32Exception(); } if (!GetKernelObjectSecurity(processHandle, dal_SECURITY_INFORMATION, InlineAssignHelper(buff, new byte[setblock - 1] { }), setblock, setblock)) { throw new Win32Exception(); } return new RawSecurityDescriptor(buff, 0); } public static void EditProcDescriptor(IntPtr processHandle, RawSecurityDescriptor dal) { const int dal_SECURITY_INFORMATION = 0x4; byte[] rawsd = new byte[dal.BinaryLength - 1] { }; dal.GetBinaryForm(rawsd, 0); if (!SetKernelObjectSecurity(processHandle, dal_SECURITY_INFORMATION, rawsd)) { throw new Win32Exception(); } } private static T InlineAssignHelper<T>(ref T app, T ret) { app = ret; return ret; } }
  20. dEEpEst

    .net ScanMyBin API For .NET

    Download: [hide][Hidden Content]] Password: level23hacktools.com
  21. dEEpEst

    [C#] Crypter Source

    Credits: gr33d Download: [hide][Hidden Content]] Password: level23hacktools.com
  22. dEEpEst

    source Sikandar Crypter v7

    Downlaod: [hide][Hidden Content]] Password: level23hacktools.com