Jump to content
YOUR-AD-HERE
HOSTING
TOOLS
SERVICE

Search the Community

Showing results for tags 'exe'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Categories

  • Files
  • Online Book
  • Services

Categories

  • Hacking

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

Found 16 results

  1. Lo que hace este Sorter es dejar solo las carpetas que tienen los archivos que nosotros necesitamos como por ejemplo Pueden añadir o quitar carpetas solo hay que modificar el main.py El exe solo selecciona las capetas con Steam", "Discord", "Wallets", "Cookies [hide][Hidden Content]]
  2. Password Protect Any Software & EXE File Stop Viruses that Modify Your Software Does Not Make Any Changes to EXE Lock With Secure Cryptographic Algorithms Eay to Use & Support Command Line What Does Gilisoft EXE Lock Do? Most applications don’t come with user restrictions and this becomes a security flaw when two or more people are using the same computer (There are some applications on my computer that I don't want people to use, and I can't put a password on Windows due to certain reasons.). Password protecting the executable files is just another way you can heightened security in a shared environment. What I need is a software that works like AppLock on Android or something, which is basically asking you for password every time you open it. Is such an application available? GiliSoft Exe Lock can lock any programs on your local computer, a person can not run the password locked programs without a password. For example, if you do don't want other persons to use your tax preparation software, personal finance or other programs you like, you simply need to run this application. [Hidden Content] [hide][Hidden Content]]
  3. Advanced BAT to EXE Converter is the best choice to compile your batch files to .EXE for distributing commercially. Advanced BAT to EXE Converter creates an actual native Windows .EXE program and encrypts your batch file code. These batch file .EXE do not require any pre-installed software to function and can be digitally signed unlike regular batch files. [hide][Hidden Content]]
  4. Password Protect Any Software & EXE File Stop Viruses that Modify Your Software Does Not Make Any Changes to EXE Lock With Secure Cryptographic Algorithms Eay to Use & Support Command Line What Does Gilisoft EXE Lock Do? Most applications don’t come with user restrictions and this becomes a security flaw when two or more people are using the same computer (There are some applications on my computer that I don't want people to use, and I can't put a password on Windows due to certain reasons.). Password protecting the executable files is just another way you can heightened security in a shared environment. What I need is a software that works like AppLock on Android or something, which is basically asking you for password every time you open it. Is such an application available? GiliSoft Exe Lock can lock any programs on your local computer, a person can not run the password locked programs without a password. For example, if you do don't want other persons to use your tax preparation software, personal finance or other programs you like, you simply need to run this application. [Hidden Content] [hide][Hidden Content]]
  5. Password Protect Any Software & EXE File Stop Viruses that Modify Your Software Does Not Make Any Changes to EXE Lock With Secure Cryptographic Algorithms Eay to Use & Support Command Line What Does Gilisoft EXE Lock Do? Most applications don’t come with user restrictions and this becomes a security flaw when two or more people are using the same computer (There are some applications on my computer that I don't want people to use, and I can't put a password on Windows due to certain reasons.). Password protecting the executable files is just another way you can heightened security in a shared environment. What I need is a software that works like AppLock on Android or something, which is basically asking you for password every time you open it. Is such an application available? GiliSoft Exe Lock can lock any programs on your local computer, a person can not run the password locked programs without a password. For example, if you do don't want other persons to use your tax preparation software, personal finance or other programs you like, you simply need to run this application. [Hidden Content] [hide][Hidden Content]]
  6. In this video we are gonna talk about how to extract the code from python executables. [Hidden Content]
  7. Description This application is based on MiTeC Portable Executable Reader. It reads and displays executable file properties and structure. It is compatible with PE32 (Portable Executable), PE32+ (64bit), NE (Windows 3.x New Executable) and VxD (Windows 9x Virtual Device Driver) file types. .NET executables are supported too. It enumerates introduced classes, used units and forms for files compiled by Borland compilers. It contains powerfull Resource Viewer that is able to abalyze and display al basic resouce types and some extra ones as JPEG, PNG, GIF, AVI, REGISTRY. It contains excellent Type Library viewer that enumerates all objects and creates import interface unit in Object Pascal language. Every type of resource can be saved to file. EXE Explorer produces text report with all important information about selected file. Searching capability is also available. It searches all resources that can be interpreted as text. Here are enumerated structures that are evaluated: DOS, File, Optional, Rich and CLR headers CLR Metadata streams Sections Directories Imports Exports Resources ASCII and Unicode Strings .NET Metadata Load Config Debug Thread Local Storage Exceptions Units Forms Packages Classes Certificates Package Flags Version Info Hexadecimal File Content View TypeLib Viewer Form Preview VirusTotal scan report Compiler and installer/packer/protector identification [HIDE][Hidden Content]]
  8. VBS-Crypter v0.2 || Convert Exe To Vbs || BYPASS WD VBS-Crypter v0.2 [Hidden Content]
  9. This tool will convert any .net exe to vbs [HIDE][Hidden Content]] [Hidden Content]
  10. Description This application is based on MiTeC Portable Executable Reader. It reads and displays executable file properties and structure. It is compatible with PE32 (Portable Executable), PE32+ (64bit), NE (Windows 3.x New Executable) and VxD (Windows 9x Virtual Device Driver) file types. .NET executables are supported too. It enumerates introduced classes, used units and forms for files compiled by Borland compilers. It contains powerfull Resource Viewer that is able to abalyze and display al basic resouce types and some extra ones as JPEG, PNG, GIF, AVI, REGISTRY. It contains excellent Type Library viewer that enumerates all objects and creates import interface unit in Object Pascal language. Every type of resource can be saved to file. EXE Explorer produces text report with all important information about selected file. Searching capability is also available. It searches all resources that can be interpreted as text. Here are enumerated structures that are evaluated: DOS, File, Optional, Rich and CLR headers CLR Metadata streams Sections Directories Imports Exports Resources ASCII and Unicode Strings .NET Metadata Load Config Debug Thread Local Storage Exceptions Units Forms Packages Classes Certificates Package Flags Version Info Hexadecimal File Content View TypeLib Viewer Form Preview VirusTotal scan report Compiler and installer/packer/protector identification [HIDE][Hidden Content]]
  11. Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  12. Only tested it with Native exe files. I don't know about .Net - Don't compress ur file before uploading as it will automatically compress it. - Crypted file takes time to execute as it brute-force a key. so execution depends on ur PC specs. - I made this for free. using free tools. so don't be a jerk to try to profit from it. too much abuse and i'll take it down. - No, I'm not trying to infect anyone nor collect any samples. I made this as a lil side fun project. - Might improve in future and add parameters and Clay Davis but I'm too busy and lazy todo it or learn how. - I set a crontab job to delete all crypted files within 10 minutes. (if you're trying to download and failed then it prolly was deleted while crontab job was running) - Max file upload size: 15mb. - Only .exe files allowed ( no double dotted file names ). [HIDE][Hidden Content]] File Name: notepad-crypted-1569859836846.exe Scan Date: 30/09/2019 18:12 MD5: 9184051d109981b8990bbb68fe840476 Filesize: 273.12 KB Detection: 0 / 24 Link: [Hidden Content] Scanned with CyberScan.org (No distribute scanner) Ad-Aware Antivirus - Clean Arcabit Antivirus - Clean Avast Internet Security - Clean AVG Internet Security - Clean Avira Anti-Malware - Clean BitDefender Antivirus - Clean BullGuard Antivirus - Clean ClamAv Antivirus - Clean Comodo Essentials - Clean Cyren Antivirus - Clean Windows Defender - Clean eScan Antivirus - Clean Eset Internet Security - Clean F-Prot Security - Clean F-Secure Antivirus - Clean Emisoft Anti-Malware - Clean Immunet Antivirus - Clean Kaspersky Endpoint- Clean Nano Antivirus - Clean Ikarus Antivirus - Clean Sophos Antivirus - Clean Xvirus Anti-Malware- Clean Zillya Antivirus - Clean ZoneAlarm Antivirus - Clean
  13. Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  14. Características Aplicaciones visibles e invisibles Ejecutables con privilegios de administrador Inclusión de archivos, carpetas, icono e información de versión Creación de archivos EXE de 32-Bit y 64-Bit Interfaz de líneas de comandos Portable Encriptado Soporte multilenguaje Libre para uso comercial y no comercial [Hidden Content]
  15. In this first release i include a virus free example build in Microsoft Visual C++ 5.0 that can be fully editable with Resource Hacker. This is a cool exe for those of you who do not know how to code and want to build a simple warning message. This exe example contains 3 elements. A image (BMP), a Text and a button. This elements can be editable with Resource Hacker and the only thing that it will do is execute any exe that is in the same folder named setup.exe. The name for the file to execute can be editable with a disassembler. To start editing, open the file "Virus Remover by Hacxx.exe" with Resource Hacker Replace Bitmap with any that you want Replace Icon with any that you want Edit Dialog to whatever you want. The Bitmap, text and button are editable here Download [Hidden Content] Virustotal Not scanned to avoid the file been reviewed by malware experts.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.