Jump to content
YOUR-AD-HERE
HOSTING
TOOLS
SERVICE

Search the Community

Showing results for tags 'c++' or ''.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

Found 19 results

  1. Cutter is a Qt and C++ GUI for radare2. Its goal is making an advanced, customizable and FOSS reverse-engineering platform while keeping the user experience at mind. Cutter is created by reverse engineers for reverse engineers. Disclaimer Cutter is not aimed at existing radare2 users. It instead focuses on those whose are not yet radare2 users because of the learning curve, because they don’t like CLI applications or because of the difficulty/instability of radare2. Changelog v2.1.2 Generate and deploy a real source tarball including submodule contents (Fix ) () Fix build on 32-bit systems. () Do not check “Built from source” in bug report template by default. Memory leak fix in basic block highlighter. Construct and destruct CutterCore singleton locally (Fix ) () Remove direct download from update check () Update rizin to stable v0.4.1 [hide][Hidden Content]]
  2. Cutter is a Qt and C++ GUI for radare2. Its goal is making an advanced, customizable and FOSS reverse-engineering platform while keeping the user experience at mind. Cutter is created by reverse engineers for reverse engineers. Disclaimer Cutter is not aimed at existing radare2 users. It instead focuses on those whose are not yet radare2 users because of the learning curve, because they don’t like CLI applications or because of the difficulty/instability of radare2. Changelog v2.1 Additions Adds signatures widget for managing FLIRT signatures Supports and bundles SigDB, a library of FLIRT signatures for commonly found libraries Bundles the new Yara plugin to apply and create yara rules Bundles Apple Swift demangler Adds option to fill missing bytes with nops when editing an instruction Adds hexeditor option to write hex bytes Adds option to add comments directly from hexdump widget Uses RzAnnotatedCode with JSDec for colored output with semantic information Adds double click to seek to global variable in decompiler widget Adds report issue button in “About” Many internal rizin commands has been translated to their C equivalent Enables console redirection on Windows Bugfixes Adds missing Rizin headers in Python bindings Fixes gdbserver segfault [hide][Hidden Content]]
  3. Visual C++ Redistributable Runtimes – This archive contains the latest version (Nov 2021) of all VCRedist Visual Studio C++ runtimes, installable with a single click by running the included batch file installer. To install, run the included install_all.bat with admin privileges (right click, “Run as administrator”) The download includes the VC_Redist runtime packages for Visual C++ 2005, 2008, 2010, 2012, 2013, 2015, 2017, 2019 and 2021. Both 32-bit and 64-bit are supported. The files included are the English language version. When doing a fresh Windows OS install, it’s recommended to always install all the various C++ runtimes, which is why this all-in-one pack was created. It helps to avoid problems with programs that cause error messages like “side-by-side configuration is incorrect”, or “Missing MSVCRT.DLL”, “VCRUNTIME140_1.dll”, or “MSVCP140.DLL”. This package is created by us here at TPU. All files are digitally signed by Microsoft, which guarantees they are unaltered. [Hidden Content] [hide][Hidden Content]]
  4. GDA(GJoy Dex Analysizer) Most reverse engineers mainly use Java decompiler, commercial Dalvik decompiler Jeb, and smali2java to analyze Android APPs. Java decompiler is based on Java bytecode, including JD, JD-GUI, jadx, and others. smali2java is a decompiler based on the Smali code. They have their own shortcomings, such as the Java decompiler depends on the conversion of dex2jar. For complex, obfuscated or packed apks, there is a problem of translation failure. smali2java decompiles Smali code which should be translated from DEX with apktool, so it increases the difficulty and error rate and decreases the speed of manual analysis. In addition, their interaction is poor, which increases the difficulty of manual analysis. Although the commercial Jeb has better interactivity, it is easy to death when analyzing a large-sized APP with the Multidex, and it is very expensive for me… Changelog v4.0 Fix the bug that all nodes were deleted when searching the class tree Fix the bug that inheritance methods or members cannot cross-reference #91 Fix the problem that the parameters/return-value are not displayed during data flow analysis #91 Fix the problem about the python plug-in #92 The constant propagation algorithm is optimized to correct the error of code output #90 Optimize the expression output and correct several errors of code output #90 The variable declaration and expression are further optimized Fix some crash bugs. Add translation utility for strings (with Google and Youdao). [hide][Hidden Content]]
  5. New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools. RottenPotatoDLL This project generates a DLL and EXE file. The DLL contains all the code necessary to perform the RottenPotato attack and get a handle to a privileged token. The MSFRottenPotatoTestHarness project simply shows example usage for the DLL. For more examples, see [Hidden Content], specifically the SeAssignPrimaryTokenPrivilege.cpp and SeImpersonatePrivilege.cpp files. RottenPotatoEXE This project is identical to the above, except the code is all wrapped into a single project/binary. This may be more useful for some penetration testing scenarios. Modify the "main" method in MSFRottenPotato.cpp to change what command will be run. By default it just runs cmd.exe to pop a command shell. [hide][Hidden Content]]
  6. GDA(GJoy Dex Analysizer) Most reverse engineers mainly use Java decompiler, commercial Dalvik decompiler Jeb, and smali2java to analyze Android APPs. Java decompiler is based on Java bytecode, including JD, JD-GUI, jadx, and others. smali2java is a decompiler based on the Smali code. They have their own shortcomings, such as the Java decompiler depends on the convert of dex2jar. For complex, obfuscated or packed apks, there is a problem of translation failure. smali2java decompiles Smali code which should be translated from DEX with apktool, so it increases the difficulty and error rate, and decreases the speed of manual analysis. In addition, their interaction is poor, which increases the difficulty of manual analysis. Although the commercial Jeb has better interactivity, it is easy to death when analyzing a large-sized APP with the Multidex, and it is very expensive for me… Changelog v3.97 A lot of novel optimizations and some updates have been added, and A lot of bugs have been fixed. In particular, the loading and analysis speed has been increased 3+ times faster than the old one. Double-clicking an interface method in an interface class, all implementations of the interface method will be displayed The memory limit is broken through and some problems caused by it is fixed Resource parsing and decompilation of resource classes are added The associated function of the permission module is disabled by default and can be enabled through the menu > View > PermissionRef The loading and parsing algorithms of classes, methods in the file are greatly optimized. DX tool is integrated into GDA. Optimizing the color configuration manager. Optimizing the Deobfuscation(much faster than the old) and fixing several bugs Loading analysis timeout prompt is added. The conversion of 64-bit integer data among with hexadecimal, hexadecimal, octal, character is added, and fix the problem that negative numbers cannot be converted correctly. The traversal algorithms of AllStrings and AppStringsare optimized to greatly improve the parsing speed. Add native methods and interfaces traversal function(pro). Optimize the display of callgraph of classes and methods. Resource file sensitive information detection is added to SensitiveInfo(pro). Optimize the search speed of string cross-reference. [hide][Hidden Content]]
  7. cutter Cutter is a Qt and C++ GUI for radare2. Its goal is making an advanced, customizable and FOSS reverse-engineering platform while keeping the user experience at mind. Cutter is created by reverse engineers for reverse engineers. Disclaimer Cutter is not aimed at existing radare2 users. It instead focuses on those whose are not yet radare2 users because of the learning curve, because they don’t like CLI applications or because of the difficulty/instability of radare2. Changelog v2.0.3 Additions and Changes Debug: Heap viewer widget for glibc Rizin, rz-ghidra and jsdec updated to 0.3.0 with changes for compatibility. Various improvements for native macOS UI (#2776) Many internal changes switching from error-prone rizin commands to C API CI and Linux builds: use Ubuntu 18.04 as oldest supported build system (#2736) Bugfixes Fix Decompiler Copy Shortcut (Fix #2773, #2778) Fix Restoring “Show Disassembly as” in Preferences (Fix #2726, #2748) Complete Color Theme Lists (Fix #2672) (#2752) macOS: Fix Versions in Info.plist (Fix #2679) (#2740) Debug: Fix continue until main not being enabled in certain cases (#2727) Debug: Fix attaching to a process with no file opened (#2727) Fix a crash when printing disassembly arrows (#2688) Removals Type Link features removed due to unreliability, in light of global variables coming soon (#2775) [hide][Hidden Content]]
  8. GDA(GJoy Dex Analysizer) Most reverse engineers mainly use Java decompiler, commercial Dalvik decompiler Jeb, and smali2java to analyze Android APPs. Java decompiler is based on Java bytecode, including JD, JD-GUI, jadx, and others. smali2java is a decompiler based on the Smali code. They have their own shortcomings, such as the Java decompiler depends on the convert of dex2jar. For complex, obfuscated or packed apks, there is a problem of translation failure. smali2java decompiles Smali code which should be translated from DEX with apktool, so it increases the difficulty and error rate, and decreases the speed of manual analysis. In addition, their interaction is poor, which increases the difficulty of manual analysis. Although the commercial Jeb has better interactivity, it is easy to death when analyzing a large-sized APP with the Multidex, and it is very expensive for me… Changelog v3.96 Fix the memory call problem for Frida. Fix missing parentheses in multi-conditional expressions. #60 Fix the problem of inconsistent variable names caused by parent and child classes in different basic blocks. Add the saving of the js code for Frida when the device is not connected. The control flow analysis algorithm is further optimized. Implement the automatic propagation function of the overloaded method name renaming for the subclass of any class/interface. #65 [hide][Hidden Content]]
  9. GDA(GJoy Dex Analysizer) Most reverse engineers mainly use Java decompiler, commercial Dalvik decompiler Jeb, and smali2java to analyze Android APPs. Java decompiler is based on Java bytecode, including JD, JD-GUI, jadx, and others. smali2java is a decompiler based on the Smali code. They have their own shortcomings, such as the Java decompiler depends on the convert of dex2jar. For complex, obfuscated or packed apks, there is a problem of translation failure. smali2java decompiles Smali code which should be translated from DEX with apktool, so it increases the difficulty and error rate, and decreases the speed of manual analysis. In addition, their interaction is poor, which increases the difficulty of manual analysis. Although the commercial Jeb has better interactivity, it is easy to death when analyzing a large-sized APP with the Multidex, and it is very expensive for me… Changelog v3.95 Fixed syntax error when executing a method [hide][Hidden Content]]
  10. Unpack archive. Launch Warzone Cracked.exe Unpack archive. Launch Warzone Cracked.exe Port forwarding instructions: Step 1) Control Panel > Firewall and Network > Allow an App through Firewall > Select “WARZONE RAT 2.70.exe” Step 2) Control Panel > Windows Defender Firewall > Advanced Settings Step 3) a) Inbound Rules > New Rule > Port > TCP > Specific Port you want b) Inbound Rules > New Rule > Port > UDP > Specific Port you want c) Outbound Rules > New Rule > Port > TCP > Specific Port you want d) Outbound Rules > New Rule > Port > UDP > Specific Port you want Step 4) Build your server with your port and your VPS IP address or DNS. Download: [Hidden Content]
  11. Most reverse engineers mainly use Java decompiler, commercial Dalvik decompiler Jeb and smali2java to analyze Android APPs. Java decompiler is based on Java bytecode, including JD, JD-GUI, jadx, and others. smali2java is a decompiler based on the Smali code. They have their own shortcomings, such as the Java decompiler depends on the convert of dex2jar. For complex, obfuscated or packed apks, there is a problem of translation failure. smali2java decompiles Smali code which should be translated from DEX with apktool, so it increases the difficulty and error rate, and decreases the speed of manual analysis. In addition, their interaction is poor, which increases the difficulty of manual analysis. Although the commercial Jeb has better interactivity, it is easy to death when analyzing a large-sized APP with the Multidex, and it is very expensive for me… Interactive operation: 1.cross-references for strings, classes, methods and fields; 2.searching for strings, classes methods and fields; 3.comments for java code; 4.rename for methods,fields and classes; 5.save the analysis results in gda db file. … Utilities for Assisted Analysis: 1.extracting DEX from ODEX; 2.extracting DEX from OAT; 3.XML Decoder; 4.algorithm tool; 5.device memory dump; … New features: 1.Brand new dalvik decompiler in c++ with friendly GUI; 2.Support python script 3.packers Recognition; 4.Multi-DEX supporting; 5.making and loading signature of the method 6.Malicious Behavior Scanning by API chains; 7.taint analysis to preview the behavior of variables; 8.taint analysis to trace the path of variables; 9.de-obfuscate; 10.API view with x-ref; 11.Association of permissions with modules; Changelog v3.79 Fixed some problems. Decompile support for .jar files, class .files and .aar files. A rule-based static vulnerability scanner is added. Add the APK file forensics analysis tool. Fixed a bug in variable renaming. Dump tool adds custom dump. Further, optimize intelligent renaming. [hide][Hidden Content]]
  12. GDA(GJoy Dex Analysizer) Most reverse engineers mainly use Java decompiler, commercial Dalvik decompiler Jeb and smali2java to analyze Android APPs. Java decompiler is based on Java bytecode, including JD, JD-GUI, jadx, and others. smali2java is a decompiler based on the Smali code. They have their own shortcomings, such as the Java decompiler depends on the convert of dex2jar. For complex, obfuscated or packed apks, there is a problem of translation failure. smali2java decompiles Smali code which should be translated from DEX with apktool, so it increases the difficulty and error rate, and decreases the speed of manual analysis. In addition, their interaction is poor, which increases the difficulty of manual analysis. Although the commercial Jeb has better interactivity, it is easy to death when analyzing a large-sized APP with the Multidex, and it is very expensive for me… New features: 1.Brand new dalvik decompiler in c++ with friendly GUI; 2.Support python script 3.packers Recognition; 4.Multi-DEX supporting; 5.making and loading signature of the method 6.Malicious Behavior Scanning by API chains; 7.taint analysis to preview the behavior of variables; 8.taint analysis to trace the path of variables; 9.de-obfuscate; 10.API view with x-ref; 11.Association of permissions with modules; Changelog v3.78 A lot of bugs fixed, GDAE Professional Edition was released. Provide the option of method Merge mode and separation mode. Fix the problem that the memory module cannot be dump in 64-bit system. Implement the vulnerability detection based on rule expression. Fix the aspect ratio of the window . Change and optimize color management to support various topics. Optimize the GUI, adjust the internal layout of some windows, and repair some GUI problems, making the operation more comfortable. Add the search function (Ctrl + F) to the dump device. Merge the multi Dex in the tree box. The default combination mode on the class display can be switched to separate mode by right-clicking. Add line number, module tag, and jump tag (under SmalI). Right-click to switch. Strengthen the structured algorithm to make the code more readable. De-duplicate the results of malscan. Adapt to the widescreen. Add basic information to view. [Hidden Content]
  13. GDA(GJoy Dex Analysizer) Most reverse engineers mainly use Java decompiler, commercial Dalvik decompiler Jeb and smali2java to analyze Android APPs. Java decompiler is based on Java bytecode, including JD, JD-GUI, jadx, and others. smali2java is a decompiler based on the Smali code. They have their own shortcomings, such as the Java decompiler depends on the convert of dex2jar. For complex, obfuscated or packed apks, there is a problem of translation failure. smali2java decompiles Smali code which should be translated from DEX with apktool, so it increases the difficulty and error rate, and decreases the speed of manual analysis. In addition, their interaction is poor, which increases the difficulty of manual analysis. Although the commercial Jeb has better interactivity, it is easy to death when analyzing a large-sized APP with the Multidex, and it is very expensive for me… Here, a new decompiler based on Dalvik bytecode, GDA(this project started in 2013 and released its first version 1.0 in 2015 at www.gda.com: 9090) , is proposed and implemented in C++ language to provide more sophisticated, fast and convenient decompilation support. GDA is completely self-independent. It supports APK, DEX, ODEX, oat files, and run without installation and Java VM support. GDA only takes up 2M of your disk space, and you can use it in any newly installed windows system and virtual machine system. In addition, GDA has more features as follows: Changelog v3.73 fix some crash and bug. change the main page. move Permissions to “DexFile->AccessPermission(click to view permissions)” [HIDE][Hidden Content]]
  14. hello please, Who have valid link for Ratatouille Downloader, Dynamic API Loading, UD, C++ download source code ? thx u in advanced
  15. Crypter C++ LVL23N14 (3/22) / injected into memory / Tutorial: The folder contains these files We open Builder.exe and it will ask us for the name of the file in encrypter, in my case it is server.exe, so we drag our server.exe to the window of our Builder.exe (ATTENTION: the file path cannot be very long, with what I recommend having everything on the desktop) We have the route loaded, press ENTER to continue. Now we will ask the name that we will give to the new file that will generate encrypted, in my case svchost.exe and press ENTER to continue. He asks us if we want to continue with the encryption process, 1 = No, 2 = Yes, in my case 2 The process begins, encrypts the data, injects into memory. The encryption ended successfully, we pressed a key to exit. scanner result [Hidden Content] Download: [Hidden Content]
  16. Scan Result: [Hidden Content] Download: [HIDE][Hidden Content]] Password: Password by private message
  17. Learn Ethical Hacking with ease as it is fully Practical Course. Get ready to Fight against Hackers and Protect yourself. Learn the Tools used by Hackers. Start Improving your Coding Skills by writing and executing C, C++, Python Programs on Android Device. More importantly if you learn ethical hacking, you can take part in Bug Bounty Programs. [Hidden Content]
  18. LeVeL23HT C++ Crypter LVL23N12 Scaner: [Hidden Content] Download: [HIDE][Hidden Content]] Password: Password by private message
  19. Learn how to make cross platform games using the immensely successful game engine Cocos2d-x. A step by step process is used to show everything from project setup to essential game design technique Gain a good understanding of the following concepts: C++ Game Programming Video Game Logic Cocos2d-x Game Programming Game Mechanics Game development Game design Mobile development Mobile design Cross platform development Cocos2d-x is one of the easiest game frameworks in the world and will provide you with a solid foundation for your game development journey. The gaming industry is bigger than Hollywood and is constantly growing, start your journey now. You will be provided with the full source code to aid in development during and after this course. The source code and artwork is free to use in as many projects as you wish. Cocos2d-x is a free open source game engine used by indie developers and companies such as Bandai Namco and Zynga. Over 205,000 students have enrolled on my courses and all of them are extremely satisfied. You will also be satisfied with this course. If you do not like the course, remember that within 30 days you can request a full refund. I guarantee you satisfaction. If you have any questions regarding the topics covered in this course, please feel free to ask. I'm always happy to help those who want to learn. To summarise this is what you get: • Lifetime access to HD quality videos. No monthly subscription. Learn at your own pace, whenever you want. • All videos are downloadable. Learn wherever you want, even without an internet connection! • Downloadable starter code and final code for each section. • Free helpful support in the course Q&A when you have questions or get stuck. • Multiple coding challenges to practice your new skills (solutions included). Sounds great? Then start this adventure today by clicking the “Take this course" button, and join me in the only course that you will need! Who is this course for? For new users For users with basic C++ experience People looking for a refresher for Cocos2d-x People who want to create game [Hidden Content]
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.