Search the Community

Showing results for tags '.net'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 67 results

  1. TRY ON VM ONLY. Ryuk .Net Ransomware overwrites all files on the computer (It means nobody can ever return files back) and makes it at least 2 times faster than other ransomwares.It drops read_it.txt for startup folder and all folders which files has been encrypted. This project depends on your donation. Please donete if you want to see next releases in the future This ransomware can change file extension randomized or you can type your own extension. Write your own message and victim will see only that note. readme.txt wil be dropped on every folder which files has been encrypted Encrypted File seems like this [Hidden Content]
  2. Zoople HTML Editor .NET for Winforms – The program is for Visual Basic (VB) and C# is a fully customisable HTML editor for your .NET framework or .NET Core WinForms or WPF project. Allow even the most non-technical of users to create rich text in pure HTML format from your Winforms and WPF applications. Simple to use, Easy to implement, highly Extensible, and with a very familiar word-processing styled GUI making for a straight-forward learning experience for your end users. The HTML Editor .NET for Winforms allows end-users to create HTML snippets for pages, email templates, and any other application that requires the editing of HTML content. Features • Data bindable to any datasource • Language customisable • Customizable user interface • Source code view with coloured formatting and indentation • Apply Cascading Style Sheets • Insert Symbols and other HTML character entities (e.g. Ø, ‰, §) • CSS applicator for indiviual elements • Optional property grid to define element specific properties • Optional muti-lingual “inline” spell checking, error highlighting as you type, and correction (additional license required) • Supports HTML5 and CSS3 • Multi-level undo / redo • Visual and mouse driven table grid size selector for inserting tables manage user interaction with HTML documents using the userinteraction and cancallableuserinteraction events [Hidden Content] [hide][Hidden Content]]
  3. itsMe

    Eziriz .NET Reactor v6.5.0.0

    .NET Reactor Unmatched .NET code protection system which completely stops any decompiling. Protect your software in a safe and simple way without worrying how to protect your intellectual property. What is .NET Reactor? .NET Reactor is a powerful code protection and software licensing system for software written for the .NET Framework, and supports all languages that generate .NET assemblies. Its' main features are : Intellectual property protection NecroBit Protection Native Code generation Code Virtualization Obfuscation Control Flow Obfuscation Hide Method Calls (dynamic proxy) String Encryption Anti Tampering Anti Debugging Resource Encryption and Compression Dependency Merging Protects full applications and libraries (dlls) Powerful licensing system Create trial versions of your software Set an expiration date Limit use to a fixed number of days after installation Limit by number of uses Limit to use for no more than a set number of minutes each invocation Limit trial version functionality Easily turn your trial version into a fully licensed version License your software Permanently (non expiring license) By time period (i.e rent your software) By number of uses (i.e software as a service) Software development kit Integrate license checking into you assembly and extend licensing fuctionality Extend licensing functions with bespoke extensions. Deployment Create .NET Core single file application bundles [Hidden Content] [hide][Hidden Content]]
  4. Bruto Crypt Oldschool-style crypter with flashy graphics. Used to run a .NET executable in memory through a C++ stub. Tested with Quasar-Rat and works fine. Notes Doesn't actually encrypt your .NET executable yet, just puts it raw in native resources of the stub. Usage Compile the C++ stub Compile the C# Crypter Copy InstallUtil.exe (stub) to a folder with the crypter bin called Stub/InstallUtil.exe Start the crypter Crypt any .NET executable ??????? [email protected] [Hidden Content]
  5. Load/Inject .NET assemblies by; reusing the host (spawnto) process loaded CLR AppDomainManager, Stomping Loader/.NET assembly PE DOS headers, Unlinking .NET related modules, bypassing ETW+AMSI, avoiding EDR hooks via NT static syscalls (x64) and hiding imports by dynamically resolving APIs (hash). [hide][Hidden Content]]
  6. itsMe

    Lists of .NET Deobfuscator

    Lists of .NET Deobfuscator and Unpacker (Open Source) [hide][Hidden Content]]
  7. English | 2020 | ISBN: 1484261798 | 379 Pages | PDF, EPUB | 3.31 MB Implement design patterns in .NET Core 3 using the latest versions of the C# and F# languages. This book provides a comprehensive overview of the field of design patterns as they are used in today’s developer toolbox. This new edition introduces topics such as Functional Builder, Asynchronous Factory Method, Generic Value Adapter, and new Composite Proxies, including one that attempts to solve the SoA/AoS problem. [Hidden Content] [hide][Hidden Content]]
  8. Analyze and view assembly dependencies on the .NET platform. NET Regular Expression Designer Integrated Help Syntax Highlighting Formatted Results The .NET Regular Expression Designer is a free download that helps you learn, develop and test regular expressions. .NET Dependency Walker Assembly Dependencies Native Calls Imported Types The .NET Dependency Walker is a powerful developer tool that allows you to analyze and view .NET assembly dependencies. 23 Dec, 2020 .NET Dependency Walker 1.9 New update to our dependency walker tool fixing known bugs, security and performance issues. [Hidden Content] [hide][Hidden Content]]
  9. Description Dotfuscator software Another powerful NET Obfuscation tool. It is intended to obscure and thereby protect the source code of software written with .NET by preventing their reverse engineering and unauthorized copying. This software is Microsoft approved and fully compatible with various versions of Visual Studio. Features Easy and fast software operation Modify names, methods, variables, etc. to obscure and misunderstand them without affecting program performance and speed. String Encryption Advanced String and Encryption Creating a variety of time constraints in software Ability to combine different inputs into a single output Remove unnecessary data and code to reduce the volume and speed up software installation The set of changes made to Dotfuscator Professional is visible here. Dotfuscator Professional Program Tips The contracted version is cracked and installed and tested by us. New versions of this software are rarely cracked or made public for a long time. This program comes in three editions, the most complete version being Professional, the version provided, see the comparison of different editing options here. [Hidden Content] [hide][Hidden Content]]
  10. itsMe

    .Net file cryptor

    Crypter For Malware [hide][Hidden Content]]
  11. Introduction dnSpy is a tool to reverse engineer .NET assemblies, including .NET debugger, a decompiler and an assembly editor. This tool can be easily extended by writing custom and your own plugin. It uses dnlib to read and write assemblies so it can handle obfuscated assemblies without crashing. dnSpy: .NET debugger, decompiler & assembly editor This amazing tool is open source, forever free and has very modern and intuitive design, kinda similar to Visual Studio. It uses many open source libraries: ILSpy decompiler engine: C# and Visual Basic decompilers Roslyn: C# and Visual Basic compilers dnlib: .NET metadata reader/writer which can also read obfuscated assemblies VS MEF: Faster MEF equals faster startup ClrMD: Access to lower level debugging info not provided by the CorDebug API Features Debug .NET Framework, .NET Core and Unity game assemblies, no source code required Edit assemblies in C# or Visual Basic or IL, and edit all metadata High DPI support (per-monitor DPI aware) Extensible, write your own extension BAML decompiler Blue, light and dark themes (and a dark high contrast theme) Bookmarks C# Interactive window can be used to script dnSpy Search assemblies for classes, methods, strings etc Analyze class and method usage, find callers etc Multiple tabs and tab groups References are highlighted, use Tab / Shift+Tab to move to next reference Go to entry point and module initializer commands Go to metadata token or metadata row commands Code tooltips (C# and Visual Basic) Export to project Debugger Debug .NET Framework, .NET Core and Unity game assemblies, no source code required Set breakpoints and step into any assembly Locals, watch, autos windows Variables windows supports saving variables (eg. decrypted byte arrays) to disk or view them in the hex editor (memory window) Object IDs Multiple processes can be debugged at the same time Break on module load Tracepoints and conditional breakpoints Export/import breakpoints and tracepoints Call stack, threads, modules, processes windows Break on thrown exceptions (1st chance) Variables windows support evaluating C# / Visual Basic expressions Dynamic modules can be debugged (but not dynamic methods due to CLR limitations) Output window logs various debugging events, and it shows timestamps by default Assemblies that decrypt themselves at runtime can be debugged, dnSpy will use the in-memory image. You can also force dnSpy to always use in-memory images instead of disk files. Public API, you can write an extension or use the C# Interactive window to control the debugger [hide][Hidden Content]]
  12. Obfuscar is a basic obfuscator for .NET assemblies. It uses massive overloading to rename metadata in .NET assemblies (including the names of methods, properties, events, fields, types, and namespaces) to a minimal set, distinguishable in most cases only by signature. For example, if a class contains only methods that accept different parameters, they can all be renamed ‘A’. If another method is added to the class that accepts the same parameters as an existing method, it could be named ‘a’. It makes the decompiled code very difficult to follow. Basically, Obfuscar scrambles the metadata in a set of assemblies. It renames everything to the minimal set of names that can be used to identify them, given signatures and type information. Since these new names are shorter than the old ones, it also dramatically shrinks the executable size. Feature Simple Configuration Hide everything private, while keeping everything public. You can achieve such simply via default settings. Name Obfuscation Hide class/method/property/event names that you don’t want to expose. This is irreversible. String Compression String contents can be compressed so that end-users won’t easily learn them. However, this is reversible by certain tools. Changelog v2.2.29 Bumped dependencies Fixed #82 Merged #300 Fixed a minor issue on SuppressIldasmAttribute. [hide][Hidden Content]]
  13. Features Small Stub 15kb Support Multiple Files [hide][Hidden Content]]
  14. itsMe

    RedGate .NET Reflector 10.3.1.1956

    Find and fix bugs fast Decompile, understand, and fix any .NET code, even if you don't have the source Look inside any .NET code Debug your application Follow bugs through your application to see where the problem is – your own code, third-party libraries, or components used by your application. Understand how applications work Inherited an application with no documentation and no comments? Use .NET Reflector to understand how the code runs and avoid bugs. Look inside APIs, SharePoint, and other third-party platforms Third-party platforms aren't always well-documented. Use .NET Reflector to look inside their assemblies, and see how they work and which APIs you can call. Try it now, choose your version later. [Hidden Content] [hide][Hidden Content]]
  15. itsMe

    Themida Unpacker for .NET

    what is Themida Unpacker for .NET? Themida Unpacker for .NET is a tool developed to quickly and easily unpack packed .NET files. Support all version! (Tested in 1.x, 2.x, 3.x) How to use? goto SuspendProcess/bin/Release/ folder Just drag .NET file and select pd.exe! (32bit to 32bit, 64bit to 64bit) pd.exe will dump file! if not, just manual dump with SCYLLA!!!!! you have to install vbruntime and .NET runtime etc.... JUST INSTALL VISUAL STUDIO .NET, C++, Universal Windows Platform!!!!!! :) [hide][Hidden Content]]
  16. Crypto Obfuscator For .Net (v2020) Powerful Obfuscation & Code Protection For .Net That Actually Works! .Net Assembly Code Protection & Obfuscation Automatic Exception Reporting Optimization & Performance Improvement Smaller & Simplified Deployment Do You Want Your Obfuscator To... Use Advanced Obfuscation Techniques to ensure best protection for your code & intellectual property Avoid Common Obfuscation Problems using intelligent rules and automatic exclusions. Have A Simple UI - no complex settings required. Integrate Seamlessly in your build process. Perform Super Fast obfuscation. Cross Assembly Obfuscation Symbol Renaming Advanced Overload Renaming String Encryption Constant Value/Array Encryption Control Flow Obfuscation Code Pattern Masking ILDASM Protection Anti-Reflection Protection Anti-Decompiler Protection Features In Detail.. Method Encryption (Hide And Virtualize MSIL Code In Methods) Method Call Hiding Advanced Tamper Detection Advanced Anti-Debug & Anti-Tracer Protection Resource Encryption & Compression Assembly Embedding, Encryption & Compression Digital Watermarking For License Tracking Metadata Reduction Remove Constant Field Values Runtime Performance Optimizations [Hidden Content] [hide][Hidden Content]]
  17. Find and fix bugs fast Decompile, understand, and fix any .NET code, even if you don't have the source [Hidden Content] Look inside any .NET code Debug your application Follow bugs through your application to see where the problem is – your own code, third-party libraries, or components used by your application. Understand how applications work Inherited an application with no documentation and no comments? Use .NET Reflector to understand how the code runs and avoid bugs. Look inside APIs, SharePoint, and other third-party platforms Third-party platforms aren't always well-documented. Use .NET Reflector to look inside their assemblies, and see how they work and which APIs you can call. Try it now, choose your version later. [hide][Hidden Content]]
  18. itsMe

    RedGate .NET Reflector 10.2.6

    Find and fix bugs fast Decompile, understand, and fix any .NET code, even if you don't have the source Look inside any .NET code Debug your application Follow bugs through your application to see where the problem is – your own code, third-party libraries, or components used by your application. Understand how applications work Inherited an application with no documentation and no comments? Use .NET Reflector to understand how the code runs and avoid bugs. Look inside APIs, SharePoint, and other third-party platforms Third-party platforms aren't always well-documented. Use .NET Reflector to look inside their assemblies, and see how they work and which APIs you can call. Try it now, choose your version later. [Hidden Content] [hide][Hidden Content]]
  19. itsMe

    RedGate .NET Reflector 10.2.5

    Find and fix bugs fast Decompile, understand, and fix any .NET code, even if you don't have the source Look inside any .NET code Debug your application Follow bugs through your application to see where the problem is – your own code, third-party libraries, or components used by your application. Understand how applications work Inherited an application with no documentation and no comments? Use .NET Reflector to understand how the code runs and avoid bugs. Look inside APIs, SharePoint, and other third-party platforms Third-party platforms aren't always well-documented. Use .NET Reflector to look inside their assemblies, and see how they work and which APIs you can call. Try it now, choose your version later. [Hidden Content] [hide][Hidden Content]]
  20. dnSpy is a tool to reverse engineer .NET assemblies. It includes a decompiler, a debugger and an assembly editor (and more) and can be easily extended by writing your own extension. It uses dnlib to read and write assemblies so it can handle obfuscated assemblies (eg. malware) without crashing. Features Open Source (GPLv3) and Free Forever (:TM:) Assembly Editor Use C# or Visual Basic to edit any method, property and event Code editor has IntelliSense (code completion, signature help, quick info) Whole classes can be added to assemblies by adding C# and Visual Basic code Edit all metadata of types (classes), methods, properties, events, fields Add, remove, rename any type (class), method, property, event, field Edit, add, remove .NET resources and save them to disk The IL editor allows editing method bodies at the IL level: IL instructions, locals, exception handlers Debugger Debug any .NET assembly, no source code required Set breakpoints in any assembly, including framework assemblies, assemblies in the GAC and assemblies existing only in memory Memory window Output window Attach to process Locals window raw contents of locals (eg. decrypted byte arrays) can be saved to disk Call Stack window Threads window Modules window Modules (eg. decrypted in-memory modules) can be saved to disk Exception Settings Can debug dynamic assemblies Debugging CoreCLR assemblies is supported Decompile to C#, Visual Basic, IL Themes: blue, dark, light (and high contrast) Supports smaller screens (eg. laptops) Line height can be optimized for smaller screens Blank and non-alphanumeric lines are 75% the normal height No extra spacing between lines (saves 1 vertical pixel per line) Menu and toolbar share the same line Full screen mode (Shift+Alt+Enter) saves some vertical pixels High DPI support and per-monitor DPI-aware Translated to several languages Highly extensible Write your own extensions and add your own features All major features are already extensions (assembly editor, debugger, decompiler) Multiple tabs and tab groups Your screen is too big? Don’t cut it in half, add another vertical tab group and read two classes at once! The tabs and positions within the text editors are saved when you close dnSpy and restored at startup so you can continue where you left off Search assemblies Search for types (classes), methods, properties, events, fields Search for strings or numbers in code Assembly analyzer Find usages of types (classes), methods, properties, events, fields BAML to XAML decompiler Fast Highlighted references, keywords References under the caret are highlighted to make it easier to see all uses of the reference in the code Tab, Shift+Tab, Ctrl+Shift+Up, Ctrl+Shift+Down moves to the next or previous reference Alt+Down and Alt+Up moves to the next or previous definition (type (class), method, property, event, field) Structure visualizer Vertical guide lines shown between start and end of code blocks Different colors are used for different blocks, eg. loop, conditional, method, etc dnlib is used to read and write assemblies so it can handle obfuscated code (eg. malware) without crashing Go to commands: Entry point Assembly static initialization method (<Module>..cctor) Any metadata token Any metadata row Syntax highlighted tooltips with XML doc comments when hovering over a type (class), method, property, event, field Methods, properties and events are decompiled in source code order or a custom user-defined order Source code order means that related methods are usually next to each other, just like the programmer wanted Background images can be shown in the text editor Export to project decompiles all selected assemblies and creates a Visual Studio solution Multiple assemblies can be exported at the same time Creates a Visual Studio solution (supports VS2005 – VS-latest) and project files Supports WinForms and WPF classes (creates a code-behind .cs/.vb file and a WinForms .resx / WPF .xaml file) Converts .NET resources to .resx files Open from GAC Command line decompiler Supports Windows, Linux and Mac Syntax highlights output to the screen Scripting with C# REPL Call public dnSpy methods from scripts Script the debugger and other extensions Hex editor Method tokens and addresses are shown in comments and can be clicked to go to the raw metadata or IL bytes Metadata editor Collapse Assembly Explorer nodes command to quickly collapse unused nodes And more… [hide][Hidden Content]]
  21. Obfuscar is a basic obfuscator for .NET assemblies. It uses massive overloading to rename metadata in .NET assemblies (including the names of methods, properties, events, fields, types, and namespaces) to a minimal set, distinguishable in most cases only by signature. For example, if a class contains only methods that accept different parameters, they can all be renamed ‘A’. If another method is added to the class that accepts the same parameters as an existing method, it could be named ‘a’. It makes the decompiled code very difficult to follow. Basically, Obfuscar scrambles the metadata in a set of assemblies. It renames everything to the minimal set of names that can be used to identify them, given signatures and type information. Since these new names are shorter than the old ones, it also dramatically shrinks the executable size. Feature Simple Configuration Hide everything private, while keeping everything public. You can achieve such simply via default settings. Name Obfuscation Hide class/method/property/event names that you don’t want to expose. This is irreversible. String Compression String contents can be compressed so that end users won’t easily learn them. However, this is reversible by certain tools. Changelog v2.2.27 Updated global tool project to target multiple platforms. [hide][Hidden Content]]
  22. English | 2020 | ASIN: B08FMWJRT4 | 475 Pages | AZW3, PDF, EPUB | 14.63 MB In chapter one, you will learn to know the properties and events of each control in a Windows Visual C# applications. You need to learn and know in order to be more familiar when applying them to some desktop applications in this book. In chapter two, you will build Throwing Fire program. This program can be played by two human players or human player versus computer. In chapter three, you will build Roasted Duck Delivery simulation. In this simulation, a number of decisions are needed. The basic idea is to read the order by incoming telephone and tell the delivery scooter to go to the location of the order. You also need to make sure that you always provide a roasted duck ready to be transported by the delivery scooter. The delivery area is a 20 by 20 square grid. The more roasted duck is sold, the more profit it gets. The panel control on the left side of the form contains the delivery grid. On the upper right are group boxes with two label controls to display the time or hour and sale results. In chapter four, you will build a Drone Simulation. In this simulation, you control both vertical and horizontal thrusters to maneuver the ride to the landing pad. You will adjust the landing speed so that it is slow enough so that no accident occurs. You build the form in two stages, the first stage creates two option group boxes, and then the second stage uses both those group boxes as landing controls. Two control panels are placed on the left side of the form: one panel for drawing and another panel for the edge. On the right side of the form, place the two group control boxes. In the first group box, five radio buttons and a check box are added. In the second group box, two radio buttons are placed. In the below section of the form, three buttons are added. Finally, one timer control is added. Then in the form, a group box is added overlap panel. Then, 11 label controls are added to the group box. After that, a progress bar is added. Under the bar, two control panels are added, one high panel and one short panel. In the second (short) panel control, two small label controls are added. Underneath, three button controls are placed. Under these three buttons, a label control is added. For each label control, set the AutoSize property to False to be resized and set (temporarily) the BorderStyle property to FixedSingle so that you can see the edges to facilitate the layout process. In chapter five, you will build Jumper game. In this game, you will move the jumper across the busy road, avoid the tiger, and cross the river with the changing current to get to house safely. You will place four label controls on the top part of the form (set the AutoSize property to False so that it can be resized and the BorderStyle property temporarily becomes FixedSingle so you can see the edges). Then, you use five panel controls below the labels. These panels will be a place for image graphics. Each panel has a width of 16 jumpers or 640 pixels, because one jumper will be given a width of 40 pixels. The first panel will be the jumper house, which will be given a height of 80 pixels. The next panel will become a river, with a height of 120 pixels. The next panel will be a place for tiger, 40 pixels high. Under the snake panel, there is a road panel. This panel will contain three boat lanes. Each boat has a height of 40 pixels, but you will give it a height of 140 pixels (not 120 pixels) to make room for lane markers. The fifth panel is the place where the jumper will begin its journey or leap. This panel will be given a height of 40 pixels. Add the last control panel below the form with three button controls. Then, finally, add four timer controls. Adjust the size of the form so that the panel controls can occupy according to the width of the form. [hide][Hidden Content]]
  23. itsMe

    Red Gate NET Reflector 10.2.4.1860

    Find and fix bugs fast Decompile, understand, and fix any .NET code, even if you don't have the source Look inside any .NET code Debug your application Follow bugs through your application to see where the problem is – your own code, third-party libraries, or components used by your application. Understand how applications work Inherited an application with no documentation and no comments? Use .NET Reflector to understand how the code runs and avoid bugs. Look inside APIs, SharePoint, and other third-party platforms Third-party platforms aren't always well-documented. Use .NET Reflector to look inside their assemblies, and see how they work and which APIs you can call. Try it now, choose your version later. [Hidden Content] [hide][Hidden Content]]
  24. Find and fix bugs fast Decompile, understand, and fix any .NET code, even if you don't have the source Look inside any .NET code Debug your application Follow bugs through your application to see where the problem is – your own code, third-party libraries, or components used by your application. Understand how applications work Inherited an application with no documentation and no comments? Use .NET Reflector to understand how the code runs and avoid bugs. Look inside APIs, SharePoint, and other third-party platforms Third-party platforms aren't always well-documented. Use .NET Reflector to look inside their assemblies, and see how they work and which APIs you can call. [Hidden Content] Latest version 10.2.3.1841 Released 6/17/2020 [hide][Hidden Content]]
  25. Tested Gray Keylogger v3 capture all keystrokes and screenshot and send it via provided gmail. Features Easy Graphical User Interface Auto Startup as system starts Low size + Low memory/CPU consompsion Added Stealth mode (hides after running) Run only when any keyboard key is pressed Whats new added ? Capture keystrokes in memory Window title also added with keystrokes Sends JPEG screenshot in specified quality as attachment Stub in multple languages (VB,C#) Multiple Compilation Modes (Winexe,Console,Library) ErrorReporting (Helpfull for developers or Turn off if not needed) Added Icon support [HIDE][Hidden Content]] Server Scan [Hidden Content]