Jump to content
YOUR-AD-HERE
HOSTING
TOOLS
SERVICE

Search the Community

Showing results for tags 'explorer'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

  1. WiFi Explorer Pro 3 The leading Wi-Fi scanner for WLAN professionals. WiFi Explorer Pro 3 is a Wi-Fi scanner and analyzer for Mac built to assist WLAN and IT professionals in the design, validation and troubleshooting of wireless networks. Expert Features Get an expert overview of the Wi-Fi landscape to quickly assess and find common problems that might affect your Wi-Fi network’s performance or connectivity. Built For All Environments Filter and organize scan results by name, physical access point, or vendor to better visualize and troubleshoot networks in any environment. Additional Integrations Visualize information from other wireless and non-802.11 energy sources using available integrations to understand better the effects of interference and channel utilization on your wireless network. [Hidden Content] macOS 10.10+ [hide][Hidden Content]]
  2. WinObjEx64 is an advanced utility that lets you explore the Windows Object Manager namespace. For certain object types, you can double-click on it or use the “Properties…” toolbar button to get more information, such as description, attributes, resource usage etc. It let you view and edit object-related security information if you have required access rights. [hide][Hidden Content]]
  3. Powerful manager for Windows File Explorer context menu Overview Shell is a context menu extender that lets you handpick the items to integrate into Windows File Explorer context menu, create custom commands to access all your favorite web pages, files, and folders, and launch any application directly from the context menu. It also provides you a convenient solution to modify or remove any context menu item added by the system or third party software. Shell is a portable utility, so you don’t need to install anything on your PC. Features Lightweight, portable and relatively easy to use. Fully customize the appearance. Adding new custom items such as (sub-menu, menuitem and separator). Modify or remove items that already exist. Support all file system objects files, folders, desktop and taskbar. Support expressions syntax. with built-in functions and predefined variables. Support colors, glyphs, SVG, embedded icons, and image files such as .ico, .png or .bmp. Support search and filter. Support for complex nested menus. Support multiple column. Quickly and easily configure file in plain text. Minimal resource usage. No limitations. Requirements Microsoft Windows 7/8/10/11 [hide][Hidden Content]]
  4. WinObjEx64 is an advanced utility that lets you explore the Windows Object Manager namespace. For certain object types, you can double-click on it or use the “Properties…” toolbar button to get more information, such as description, attributes, resource usage etc. It let you view and edit object-related security information if you have required access rights. System Requirements WinObjEx64 does not require administrative privileges. However administrative privilege is required to view much of the namespace and to edit object-related security information. It works only on the following x64 Windows: Windows 7, Windows 8, Windows 8.1 and Windows 10 (TH1, TH2, RS1, RS2), including Server variants. WinObjEx64 does not work on Windows XP, Windows Vista is partially supported and has no plans for their full support. In order to use all program features Windows must be booted in the DEBUG mode. Changelog v1.9.3 updated SeCiCallbacks search for newest Windows versions added Windows Server 2022 support fix win32k ApiSet resolving for Win10 21H2 fix ObCallbacks enumeration issues support for various kernel driver helpers ported to msvc 2022 (with backward compatibility to 2019) bugfixes rtls updated [hide][Hidden Content]]
  5. This project aims to enhance the working environment on Windows. Feature summary Choose between Windows 11 or Windows 10 taskbar (with labels support, small icons and lots of customization). Disable Windows 11 context menu and command bar in File Explorer and more. Open Start to All apps by default, choose number of frequent apps to show, display on active monitor and more. Choose between the Windows 11, Windows 10 and Windows NT Alt-Tab window switcher with customization. Lots of quality of life improvements for the shell, like: Skin tray menus to match Windows style, make them behave like flyouts and center them relative to the icon. Choose action when left and/or right clicking the network icon. Revert to the Windows 7 search box in File Explorer, or disable Windows Search altogether. Disable immersive menus and use mitigations that help you run the real classic theme without glitches. Learn more about all the functionality offered by this program starting with this article in the wiki, here. Some features may not be available on Windows 10. [hide][Hidden Content]]
  6. Explorer Patcher for Windows 11 This project aims to bring back a productive working environment on Windows 11. Feature summary Choose between Windows 11 or Windows 10 taskbar (with labels support, small icons and lots of customization). Disable Windows 11 context menu and command bar in File Explorer and more. Open Start to All apps by default, choose number of frequent apps to show, display on active monitor and more. Choose between the Windows 11, Windows 10 and Windows NT Alt-Tab window switcher with customization. Lots of quality of life improvements for the shell, like: Skin tray menus to match Windows style, make them behave like flyouts and center them relative to the icon. Choose action when left and/or right clicking the network icon. Revert to the Windows 7 search box in File Explorer, or disable Windows Search altogether. Disable immersive menus and use mitigations that help you run the real classic theme without glitches. Learn more about all the functionality offered by this program starting with this article in the wiki, here. [hide][Hidden Content]]
  7. WinObjEx64 is an advanced utility that lets you explore the Windows Object Manager namespace. For certain object types, you can double-click on it or use the “Properties…” toolbar button to get more information, such as description, attributes, resource usage etc. It let you view and edit object-related security information if you have required access rights. System Requirements WinObjEx64 does not require administrative privileges. However administrative privilege is required to view much of the namespace and to edit object-related security information. It works only on the following x64 Windows: Windows 7, Windows 8, Windows 8.1 and Windows 10 (TH1, TH2, RS1, RS2), including Server variants. WinObjEx64 does not work on Windows XP, Windows Vista is partially supported and has no plans for their full support. In order to use all program features Windows must be booted in the DEBUG mode. Changelog v1.9.2 more Win10/11 21h2 compatibility changes added FLT_FILTER, FLT_OBJECT structured dump added authenticode hash calculation for loaded drivers (extras->Drivers, use popup menu on driver entry) added coalescing callbacks to callbacks list various minor UI changes fix misbehavior with recent wine staging 6.x internal rearrange rtls updated [hide][Hidden Content]]
  8. Tenet – A Trace Explorer for Reverse Engineers Tenet is an IDA Pro plugin for exploring execution traces. The goal of this plugin is to provide more natural, human controls for navigating execution traces against a given binary. The basis of this work stems from the desire to research new or innovative methods to examine and distill complex execution patterns in software. For more context about this project, please read the blogpost about its initial release. Changelog v0.2 + Features |- Overhauled Tenet’s breakpoint / selection / navigation model to be more explicit |- Tenet will now attempt to automatically resolve ASLR mappings with basic trace analysis |- Added a cell-based drawing mode that is used when zoomed in far enough on the tracebars |- Added !last command to the ‘timestamp shell’ to jump to the last ‘navigable’ trace address |- What The Fuzz ([Hidden Content]) added native support for Tenet traces + Minor Changes |- Tracebars now draw ‘un-navigable’ regions of the trace grey (such as library/external calls) |- Tenet will now stay on the last ‘navigable’ mapped address when stepping through unmapped regions |- Improved the selection behavior and interaction with ‘zooming’ on tracebars |- Improved the selection behavior in the memory dump view (stack still needs work…) |- Both ‘code’ and ‘memory’ breakpoints can be active at the same time now, not just one |- Added more fine-grained right-click controls for interacting with ‘region’ breakpoints |- Added various right-click ‘Clear … breakpoints’ to the mem, trace, and reg views |- Highlighting and double clicking a region of memory will now set a region access breakpoint |- Double clicking ’empty’ space in the mem / reg views can be used to automatically clear breakpoints |- Updated theme subsystem and colors a little bit to be more consistent |- A little bit of code and comment cleanup, but not a lot + Bugfixes |- Tenet now ensures a selected text trace will be parsed if a packed trace does not actually match it |- A bug could cause Tenet to show wrong register values towards the end of a trace segment |- Step-over / reverse step-over could fail near the start/end of the trace |- Fixed a bug that could cause the sample pin tracer to crash from uninitialized memory |- mrexodia fixed a bug that could cause the pin tracer to crash on the fxsave instruction |- Fixed / eliminated several misc UI / selection bugs through simple refactoring [hide][Hidden Content]]
  9. WinObjEx64 is an advanced utility that lets you explore the Windows Object Manager namespace. For certain object types, you can double-click on it or use the “Properties…” toolbar button to get more information, such as description, attributes, resource usage etc. It let you view and edit object-related security information if you have required access rights. System Requirements WinObjEx64 does not require administrative privileges. However administrative privilege is required to view much of the namespace and to edit object-related security information. It works only on the following x64 Windows: Windows 7, Windows 8, Windows 8.1 and Windows 10 (TH1, TH2, RS1, RS2), including Server variants. WinObjEx64 does not work on Windows XP, Windows Vista is partially supported and has no plans for their full support. In order to use all program features Windows must be booted in the DEBUG mode. Changelog v1.9.1 21h2 compatibility improvements rtls updated [hide][Hidden Content]]
  10. Overview Lighthouse is a powerful code coverage explorer for IDA Pro and Binary Ninja, providing software researchers with uniquely interactive controls to study execution maps for native applications without requiring symbols or source. This project placed 2nd in IDA's 2017 Plug-In Contest and was later nominated in the 2021 Pwnie Awards for its contributions to the security research industry. Special thanks to @0vercl0k for the inspiration. [hide][Hidden Content]]
  11. WinObjEx64 is an advanced utility that lets you explore the Windows Object Manager namespace. For certain object types, you can double-click on it or use the “Properties…” toolbar button to get more information, such as description, attributes, resource usage etc. It let you view and edit object-related security information if you have required access rights. Changelog v1.9 added Section object structured dump added ALPC port connections list (similar to !alpc /lpc windbg command) added MmUnloadedDrivers list added ExCreateCallback list to the callbacks list (PR #26) updated ApiSet plugin now support in place search filter internal rearrange [hide][Hidden Content]]
  12. Tenet is an IDA Pro plugin for exploring execution traces. The goal of this plugin is to provide more natural, human controls for navigating execution traces against a given binary. The basis of this work stems from the desire to research new or innovative methods to examine and distill complex execution patterns in software. For more context about this project, please read the blogpost about its initial release. [hide][Hidden Content]]
  13. WinObjEx64 is an advanced utility that lets you explore the Windows Object Manager namespace. For certain object types, you can double-click on it or use the “Properties…” toolbar button to get more information, such as description, attributes, resource usage etc. It let you view and edit object-related security information if you have required access rights. System Requirements WinObjEx64 does not require administrative privileges. However administrative privilege is required to view much of the namespace and to edit object-related security information. It works only on the following x64 Windows: Windows 7, Windows 8, Windows 8.1 and Windows 10 (TH1, TH2, RS1, RS2), including Server variants. WinObjEx64 does not work on Windows XP, Windows Vista is partially supported and has no plans for their full support. In order to use all program features Windows must be booted in the DEBUG mode. Changelog v1.8.8 internal rearrange view security for ALPC ports (most of them) security descriptor view dialog (object SID, DACL & SACL) fix #24 (SCM services list query) fix #25 (jump to file may fail under certain conditions) various minor UI changes 21h1 compatibility improvements [hide][Hidden Content]]
  14. WinObjEx64 is an advanced utility that lets you explore the Windows Object Manager namespace. For certain object types, you can double-click on it or use the “Properties…” toolbar button to get more information, such as description, attributes, resource usage etc. It let you view and edit object-related security information if you have required access rights. System Requirements WinObjEx64 does not require administrative privileges. However administrative privilege is required to view much of the namespace and to edit object-related security information. It works only on the following x64 Windows: Windows 7, Windows 8, Windows 8.1 and Windows 10 (TH1, TH2, RS1, RS2), including Server variants. WinObjEx64 does not work on Windows XP, Windows Vista is partially supported and has no plans for their full support. In order to use all program features Windows must be booted in the DEBUG mode. Changelog v1.8.7 01 August 2020 20h1/20h2/21h1 compatibility improvements added recognizing of shimmed drivers for drivers list (win10+) show process trust label for sections if it present plugins system extended and upgraded to support context plugins added imagescope plugin for section object types backed by imagefile added plugins viewer various minor changes treelist: fix tooltips flickering on Windows 7 [hide][Hidden Content]]
  15. Description This application is based on MiTeC Portable Executable Reader. It reads and displays executable file properties and structure. It is compatible with PE32 (Portable Executable), PE32+ (64bit), NE (Windows 3.x New Executable) and VxD (Windows 9x Virtual Device Driver) file types. .NET executables are supported too. It enumerates introduced classes, used units and forms for files compiled by Borland compilers. It contains powerfull Resource Viewer that is able to abalyze and display al basic resouce types and some extra ones as JPEG, PNG, GIF, AVI, REGISTRY. It contains excellent Type Library viewer that enumerates all objects and creates import interface unit in Object Pascal language. Every type of resource can be saved to file. EXE Explorer produces text report with all important information about selected file. Searching capability is also available. It searches all resources that can be interpreted as text. Here are enumerated structures that are evaluated: DOS, File, Optional, Rich and CLR headers CLR Metadata streams Sections Directories Imports Exports Resources ASCII and Unicode Strings .NET Metadata Load Config Debug Thread Local Storage Exceptions Units Forms Packages Classes Certificates Package Flags Version Info Hexadecimal File Content View TypeLib Viewer Form Preview VirusTotal scan report Compiler and installer/packer/protector identification [HIDE][Hidden Content]]
  16. Overview Lighthouse is a code coverage plugin for IDA Pro. The plugin leverages IDA as a platform to map, explore, and visualize externally collected code coverage data when symbols or source may not be available for a given binary. This plugin is labelled only as a prototype and IDA / Qt code example for the community. Changelog v0.9 + Features |- Added support for ‘module+offset’ style coverage files / traces |- Added a coverage cross-reference dialog, like git-blame for coverage hits |- Theme subsystem for custom user defined Lighthouse themes and colors |- Added a fallback ‘Module Selector’ dialog to pick which ‘binary’ to load coverage for |- Complete refactor for native Binary Ninja 2.0 support, multiple databases |- Updated to fully support IDA 7.0 -> 7.4 |- Python 2/3 compatible for all platforms & disassemblers |- Faster, more accurate database painting subsystem + Minor Changes |- Extensible coverage parser interface makes it easier to load custom coverage formats |- Added support for absolute address (bb, or instr.) style coverage files / traces |- Updated the drcov coverage parser to support newer revisions |- Batch loading no longer loads all files into memory before aggregating data |- Decompilation views in IDA will now refresh coverage paint automatically |- Lighthouse is now ‘accessible’ through the disassembler console, with lighthouse.get_context(…) |- Significantly improved the database painter performance and stability in IDA |- Improved the performance for caching database metadata |- Support ‘interleaved’ instruction coverage in capable disassemblers (Binary Ninja) |- ‘Forcefully’ clearing database paint will now block with a waitbox while running |- Double clicking a function in the coverage table will now jump to the ‘first’ block with coverage |- Added a simple check against GitHub to notify when a new version of Lighthouse is available |- Removed the ‘range’ syntax from the composition grammar — nobody used it anyway |- IDA should now close faster than it previously did after using Lighthouse |- Deprecated support for IDA 6.8 -> 6.95 |- Tons of other minor improvements and code cleanup + UI |- Lighthouse now ships with two default themes, one ‘Light’ and one ‘Dark’ |- Unless the user specifies a theme preference, Lighthouse will pick which one it thinks is best |- Reduced the font size of Lighthouse on macOS by 1pt, text should look a bit less comical |- The coverage overview will more consistently snap to the right-side of the disassembler on open |- Horizontal scrolling in the coverage table is now ‘per-pixel’ vs ‘per-column’ (less jumpy…) |- Changed column sizing for the coverage table, ‘Function Name’ will also stretch by default now |- Improved the coverage shell so that text selection (click+drag) actually works |- Improved overall consistency with opening / closing the coverage combobox |- Improved the combobox and coverage shell styling to look a bit sharper |- Lighthouse error messages should be less likely to look bungled on other platforms |- Continue to improve cross-platform & cross-disassembler UI consistency |- Added tooltips to the coverage overview table header + Bugfixes |- A partially executed basic block should no longer appear fully painted in graph views |- Fixed a bug that could prompt the user ‘several’ times for a coverage name when saving a composition |- Lighthouse will now attempt to rebase itself should the user ‘rebase’ their IDB (IDA only) |- Fixed a bug where the Aggregate set symbol ‘*’ was simply unusable in the coverage shell |- The drcov parser could fail to extract module filenames when parsing a log collected on a different OS |- Fixed some edge cases to improve the stability of metadata collection (caching) |- Fixed a bug where deleted / undefined functions would persist in the coverage table after refresh |- Using the shell to jump to sub_… function names did not work in Binary Ninja due to case sensitivity |- Fixed bug that caused ‘renamed’ functions to lose their navigability (click to jump) in the table + BINJA KNOWN ISSUES |- Highlighting the newly released Binary Ninja HLIL is not yet supported |- Lighthouse will not properly spin down its threads and resources after closing a bndb / bv |- Live rebasing of Lighthouse is *not* supported in Binja — rebase first, and then open Lighthouse [HIDE][Hidden Content]]
  17. Description This application is based on MiTeC Portable Executable Reader. It reads and displays executable file properties and structure. It is compatible with PE32 (Portable Executable), PE32+ (64bit), NE (Windows 3.x New Executable) and VxD (Windows 9x Virtual Device Driver) file types. .NET executables are supported too. It enumerates introduced classes, used units and forms for files compiled by Borland compilers. It contains powerfull Resource Viewer that is able to abalyze and display al basic resouce types and some extra ones as JPEG, PNG, GIF, AVI, REGISTRY. It contains excellent Type Library viewer that enumerates all objects and creates import interface unit in Object Pascal language. Every type of resource can be saved to file. EXE Explorer produces text report with all important information about selected file. Searching capability is also available. It searches all resources that can be interpreted as text. Here are enumerated structures that are evaluated: DOS, File, Optional, Rich and CLR headers CLR Metadata streams Sections Directories Imports Exports Resources ASCII and Unicode Strings .NET Metadata Load Config Debug Thread Local Storage Exceptions Units Forms Packages Classes Certificates Package Flags Version Info Hexadecimal File Content View TypeLib Viewer Form Preview VirusTotal scan report Compiler and installer/packer/protector identification [HIDE][Hidden Content]]
  18. CFF Explorer was designed to make PE editing as easy as possible, but without losing sight on the portable executable’s internal structure. This application includes a series of tools which might help not only reverse engineers but also programmers. It offers a multi-file environment and a switchable interface. Also, it’s the first PE editor with full support for the .NET file format. With this tool you can easily edit metadata’s fields and flags. If you’re programming something that has to do with .NET metadata, you will need this tool. The resource viewer supports .NET image formats like icons, bitmaps, pngs. You’ll be able to analyze .NET files without having to install the .NET framework, this tool has its own functions to access the .NET format. [HIDE][Hidden Content]]
  19. SpotIE Internet Explorer Password Recovery version 2.9.5 suffers from a denial of service vulnerability. View the full article
  20. Introduction Ever wondered which program has a particular file or directory open? Now you can find out. Process Explorer shows you information about which handles and DLLs processes have opened or loaded. The Process Explorer display consists of two sub-windows. The top window always shows a list of the currently active processes, including the names of their owning accounts, whereas the information displayed in the bottom window depends on the mode that Process Explorer is in: if it is in handle mode you'll see the handles that the process selected in the top window has opened; if Process Explorer is in DLL mode you'll see the DLLs and memory-mapped files that the process has loaded. Process Explorer also has a powerful search capability that will quickly show you which processes have particular handles opened or DLLs loaded. The unique capabilities of Process Explorer make it useful for tracking down DLL-version problems or handle leaks, and provide insight into the way Windows and applications work. Download: [HIDE][Hidden Content]]
  21. Microsoft Internet Explorer Windows 10 1809 17763.316 scripting engine memory corruption exploit. View the full article
  22. Internet Explorer 11 exploit that allows attackers to execute JavaScript with higher system access than is normally permitted by the browser sandbox. View the full article
  23. Microsoft Internet Explorer 11 suffers from an XML external entity injection vulnerability. View the full article
  24. Ericsson Active Library Explorer (ALEX) version 14.3 suffers from a cross site scripting vulnerability. View the full article
  25. Remote Process Explorer version 1.0.0.16 denial of service proof of concept exploit with SEH overwrite. View the full article
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.