Search the Community

Showing results for tags 'for'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin
  • Null3D's Nulled Group


There are no results to display.

There are no results to display.

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start



About Me










Found 766 results

  1. Students of computer and electrical engineering may often take a course that educates them about computer networks and OSI levels. What you’ll learn The Seven OSI Layers in Computer Networks: Detailed Functionalities The networking equipment consists of hubs, switches, routers, etc. The Foundational Ideas of Switching and Routing The OSI/TCP-IP model’s application layer positions The OSI/TCP-IP model’s presentation layer position tasks at the session layer in the OSI/TCP-IP paradigm. The OSI/TCP-IP model’s transport layer position The OSI/TCP-IP model’s network layer position Jobs in the OSI/TCP-IP model’s MAC/DLL layer Jobs at the physical layer of the OSI/TCP-IP paradigm Requirements Who has a genuine interest in learning about computer networks? Basic understanding of computer systems. No prior knowledge of coding or programming is necessary. To achieve your objectives more quickly, show commitment and dedication. Description A Beginner’s Guide to Computer Networks An increasing trend is computer networks. The majority of the sites you visit on a regular basis, including your house, school, and workplace, have them. In this course, you will learn the fundamentals of computer networking. You should specifically reach the following benchmarks: Recognize the networks that are all around you. You will also comprehend a sizable portion of the IT world if you start recognizing networks all around you. You’ll discover many things, including how the Internet operates, how your Internet Service Provider (ISP) enables you to connect online, how data is shared without a connection to the Internet, and much more. Learning about computer networks is the first step in anything. Study Network Configuration. Setting up a network is a skill that is highly valuable nowadays, whether you are taking this course to better yourself, to earn a higher grade at school, or for a job. However, a lot of individuals lack the necessary skills. In a few minutes, you have the chance to learn it. Learn how to keep yourself safe while using a network, such as the Internet. Nobody wants their passwords, photos, papers, credit card information, or online activity to be shared without their consent. But as more people use computer networks, the concept of privacy is fading into obscurity. This training assists you in safeguarding your online identity as well as the network at your house or place of business. Who is this course for? Anyone who wants to learn the most important concepts of Computer Networks A person who just wants to learn how the Internet works Anyone who is studying for their Computer Network exam. What will you learn? You will study the key ideas in computer networking, as I said previously. The specific subjects are: various network types (size, topology). Computer networks use cables. TCP/IP structure Model ISO/OSI (addresses and routing) HTTP protocol How TCP & UDP Operate and What They Do management of TCP connections. What supplies do I require? You simply need an internet connection and a computer or smartphone to take this course. Additionally, you can always get in touch with me if you have questions or need assistance. I often reply within a day. You will get a certificate of completion at the conclusion of this course. Something you might include in your linked profile or CV. Who this course is for: Students of computer engineering Electrical engineering students Students of Telecommunication Engineering [Hidden Content] [hide][Hidden Content]]
  2. Description If you are completely new to Cutter and want to get up and running fast then this course is for you. In this course, we will cover how to use Cutter for Windows and Linux. Cutter is an an advanced, GUI-based, free and open-source reverse-engineering platform designed to take the pain out of radare2. It’s backend is running Rizin, a fork of the radare2 engine. Cutter is created by reverse engineers for reverse engineers. Cutter releases are fully integrated with native Ghidra decompiler. Not only can Cutter disassemble a binary file, but it can also decompile it to C language. It also has a linear disassembly view, fully featured graph view as well as mini-graph for fast navigation. Cutter also features the ability to reverse debug which other debugger lacks. This feature allows you to not only step forwards, but you can also step backwards! Cutter also has hexdumps and stack view which allows you to trace stack, register and inspect memory on the fly. In addition to that, you can also patch the binary, by reversing jumps, modifying instructions and bytes. This course will teach you all of the above and more. Designed with beginners in mind. Simple windows and Linux Crackme’s designed to learn reverse engineering legally Practical and hands-on Using free tools only Suitable for: Reverse Engineering and Malware Analysis Students Anyone interested to learn to use Cutter for Reverse Engineering Security researchers Prerequisite: Windows PC Basic Assembly and C/C++ language would be helpful but not mandatory Familiarity with basic Linux commands would be useful but not mandatory Everything you need to know is covered in the course Enroll now and I will see you inside! Who this course is for: Anyone interested to learn to use Cutter for Reverse Engineering Reverse engineering and malware analysis students Security researchers Requirements Basic Assembly Language , C Programming Windows PC Basic Linux commands [Hidden Content] [hide][Hidden Content]]
  3. SniperPhish is a phishing toolkit for pentester or security professionals to enhance user awareness by simulating real-world phishing attacks. SniperPhish helps to combine both phishing emails and phishing websites you created to centrally track user actions. The tool is designed in a view of performing professional phishing exercises and would be reminded to take prior permission from the targeted organization to avoid legal implications. Main Features Web tracker code generation – track your website visits and form submissions independently Create and schedule Phishing mail campaigns Combine your phishing site with an email campaign for centrally tracking An independent “Simple Tracker” module for quick tracking an email or web page visit Advance report generation – generate reports based on the tracking data you needed Custom tracker images and dynamic QR codes in messages Track phishing message replies Changelog v1.3.1 Bug fixes: Fixed UI update issue when a custom tracker is uploaded in email template Other minor bug fixes [hide][Hidden Content]]
  4. GEF – GDB Enhanced Features GEF is a kick-ass set of commands for X86, ARM, MIPS, PowerPC and SPARC to make GDB cool again for exploit dev. It is aimed to be used mostly by exploiters and reverse-engineers, to provide additional features to GDB using the Python API to assist during the process of dynamic analysis and exploit development. It has full support for both Python2 and Python3 indifferently (as more and more distros start pushing gdb compiled with Python3 support). Feature One single GDB script. Entirely OS Agnostic, NO dependencies: GEF is battery-included and is installable in 2 seconds (unlike PwnDBG). Fast limiting the number of dependencies and optimizing code to make the commands as fast as possible (unlike PwnDBG). Provides more than 50 commands to drastically change your experience in GDB. Easily extendable to create other commands by providing more comprehensible layout to GDB Python API. Works consistently on both Python2 and Python3. Built around an architecture abstraction layer, so all commands work in any GDB-supported architecture such as x86-32/64, ARMv5/6/7, AARCH64, SPARC, MIPS, PowerPC, etc. (unlike PEDA) Suited for real-life apps debugging, exploit development, just as much as CTF (unlike PEDA or PwnDBG) Changelog v2022.06 The unit testing structure has been re-designed to be more modular and flexible The documentation has been globally updated, moved from ReadTheDocs to GithubPages, and redesigned from mkdocs to mkdocs-material Countless (potential) errors were fixed thanks to more integration of type hinting Debugged file formats (such as ELF) now rely on a abstraction layer. This means GEF can transparently support more file formats including PE or MachO (see gef-extras/os) Remote support has been entirely rewritten and is now fully exposed via the gef.remote namespace. This includes the Qemu (user and system) support. Many commands, relying on external dependencies (such as cs-dis, asm or emulate) were transfered to GEF-Extras. Therefore, GEF now has absolutely no dependency whatsoever, not even optional ones. Refer to the deprecation page of the documentation for a complete overview of the changes. ida-interact has been totally removed and is now entirely of GEF-Extras only. It has also been rewritten to drop Python XMLRPC and relies on the much more advanced rpyc Python library. A new subcommand appeared, gef install which allows to install commands from gef-extras on the fly, if you cannot clone the repository or just need a one-time command. pcustom supports class factory allowing the structure(s) defined to collect information from the runtime Some improvements were added to the stack canary detection On a more personal note, this release marks the 10 years anniversary since the first lines of GEF were written!! [hide][Hidden Content]]
  5. Cutter is a Qt and C++ GUI for radare2. Its goal is making an advanced, customizable and FOSS reverse-engineering platform while keeping the user experience at mind. Cutter is created by reverse engineers for reverse engineers. Disclaimer Cutter is not aimed at existing radare2 users. It instead focuses on those whose are not yet radare2 users because of the learning curve, because they don’t like CLI applications or because of the difficulty/instability of radare2. Changelog v2.1 Additions Adds signatures widget for managing FLIRT signatures Supports and bundles SigDB, a library of FLIRT signatures for commonly found libraries Bundles the new Yara plugin to apply and create yara rules Bundles Apple Swift demangler Adds option to fill missing bytes with nops when editing an instruction Adds hexeditor option to write hex bytes Adds option to add comments directly from hexdump widget Uses RzAnnotatedCode with JSDec for colored output with semantic information Adds double click to seek to global variable in decompiler widget Adds report issue button in “About” Many internal rizin commands has been translated to their C equivalent Enables console redirection on Windows Bugfixes Adds missing Rizin headers in Python bindings Fixes gdbserver segfault [hide][Hidden Content]]
  6. Modular visual interface for GDB in Python. This comes as a standalone single-file .gdbinit which, among the other things, enables a configurable dashboard showing the most relevant information during the program execution. Its main goal is to reduce the number of GDB commands issued to inspect the current program status allowing the programmer to focus on the control flow instead. Features Single GDB init file. Write the dashboard to the main GDB console or to an external file/TTY. Interaction with GDB using the native Python API. Several default modules are included to address the most basic needs: source code, assembly, registers, etc.). User-defined modules can be easily developed by extending a Python class. Additional configuration files (both GDB and Python) are read from ~/.gdbinit.d/. Fully stylable user interface and dynamic command prompt. Optional syntax highlighting using the Pygments Python library. No GDB command has been redefined, instead, all the features are available as subcommands of the main dashboard command. [hide][Hidden Content]]
  7. Docker for Pentesters Docker containerization is the most powerful technology in the current market so I came up with the idea to develop Docker images for Pentesters. Nightingale contains all the required well-known tools that will be required for the Pentesters at the time of Penetration Testing. This docker image has the base support of Debian and it is completely platform Independent. You can either create a docker image in your localhost machine by modifying it according to your requirements or you can directly pull the docker image from the docker hub itself. Why? The Reason behind creating this Docker file is to make a platform-independent penetration toolkit. It includes all the useful tools that will be required for a penetration tester (You can refer to the tool list section for the same). Device Requirements Operating System: Windows, Mac, Linux Docker engine installed as per the Operating System Tools Category Operating System tools (Windows, Mac, Linux) Compression tools (7zip, tar, zip) Development Essentials (Git, GitLab, etc) Programming Languages support (Python, Ruby, Java, etc) Exploit Frameworks (Metasploit, Exploit-DB, etc) Port Scanning Tools (nmap, etc) Network tools (Tcpdump, etc) Forensic tools (exiftool,steghide, binwalk, foremost, etc) Red Team Tools (Metasploit, etc) Information Gathering tools [hide][Hidden Content]]
  8. You decide what Windows® 10 should know about you! More system control Configure security settings Protect your privacy Disable location services Prevent Windows® 10 from sending diagnostics and usage data Windows 10 offers many comfort features such as the virtual assistant Cortana that can make everyday life easier for you. To make this possible, Windows 10 has to collect huge amounts of data. It also analyzes user profiles to display user-tailored ads as Microsoft openly acknowledges. So by default, Windows 10 is set to collect more data than many users would allow. Even the recommended express installation later states that: If you don't want a particular setting you'll have to disable it yourself. [Hidden Content] [Hidden Content]
  9. itsMe

    Windows 11 for IT Professionals

    Description Microsoft recently launched Windows 11, which reimagines Windows to deliver new experiences that work and learn. The new operating system is poised to improve productivity and security. This course offers skills to learn more you need to know about Microsoft’s latest operating system in a few hours, this enables IT Professions to work faster and more productively. In Windows 11, the newly centered Start button uses the cloud and Microsoft 365 to show recent files, no matter what platform or device they were being viewed on previously, including an Android or iOS device. A new set of features to Microsoft Windows 11 will be the introduction of Snap Layouts, Snap Groups, and Desktops. These offer a “powerful way to multitask and stay on top of what you need to get done,”. With these Windows 11 features, users can organize windows and optimize screen real estate for a cleaner visual layout. Users can create and customize separate Desktops for each part of their life—like one for work and personal use. With these Windows 11 features, users can organize windows and optimize screen real estate for a cleaner visual layout. Users can create and customize separate Desktops for each part of their life—like one for work and personal use. This course focus on Windows 11 Training for the below topics Installing Microsoft Windows 11 Operating System Hardware requirements for Windows 11 Operating system Create a Test Virtual Machine for your practice Install Windows 11 on a Virtual Machine or Physical device Post Windows 11 Installation tasks Windows update feature how to use and advance configuration options Connecting your Google Android Phone with Windows 11 Joining Windows 11 device to Active Directory Domain Personalization for Device usage experience Customizing the Windows 11 Start Menu Move Windows 11 Start menu from Center to left Customization options for Windows 11 Interface Using Windows 11 Snap layouts Using Snap Groups Using Widgets Using Multiple desktops / Multiple Workspaces in Windows 11 Windows 11 Search options and advanced configuration Working with File Explorer Interface and customizing it Use Windows 11 on Touch devices Operate Windows 11 on keyboardless devices and enable the Touch keyboard Configure advance options for Windows 11 on-screen keyboard options and settings Windows 11 Configure Speech recognization and voice typing Work with Xbox gaming bar Work with HDR setting for better performance in Windows 11 Who this course is for: This course is aimed at IT pros and help desk professionals who may be tasked with helping users transition from Windows 10 to Windows 11. Students, who want to successfully start out with using Windows OS efficient & productive, like a professionell does. Any Windows User For IT Employees PC & Laptop Users Computer operators IT Professionals Students Microsoft Windows Operating system Learns Requirements Little to no experience needed. Turn on your Windows 11 system, press play on the tutorials and enjoy. This course is aimed at IT pros and help desk professionals who may be tasked with helping users transition from Windows 10 to Windows 11. Willingness to Learn A computer with Windows 11 installed to practice A basic understanding of Windows Operating system [Hidden Content] [hide][Hidden Content]]
  10. AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically. Features Fully automatic! (Use -y flag to enable) Detect network IP range without any user input. Vulnerability detection based on version. Get information about the vulnerability right from your terminal. Automatically download exploit related with vulnerability. Noise mode for creating a noise on the network. Evasion mode for being sneaky. Automatically decide which scan types to use based on privilege. Easy to read output. Function to output results to a file. Argument for passing custom nmap flags. Specify your arguments using a config file. [hide][Hidden Content]]
  11. An OSINT tool to search fast for accounts by username across 115 sites. The Lockheed SR-71 "Blackbird" is a long-range, high-altitude, Mach 3+ strategic reconnaissance aircraft developed and manufactured by the American aerospace company Lockheed Corporation. [hide][Hidden Content]]
  12. WordPress webshell plugin for RCE A webshell plugin and interactive shell for pentesting a WordPress website. Features Webshell plugin for WordPress. Execute system commands via an API with ?action=exec. Download files from the remote system to your attacking machine with ?action=download. [hide][Hidden Content]]
  13. A Hex Editor for Reverse Engineers, Programmers, and people that value their eyesight when working at 3 AM. Features Featureful hex view Byte patching Patch management Copy bytes as feature Bytes Hex string C, C++, C#, Rust, Python, Java & JavaScript array ASCII-Art hex view HTML self-contained div String and hex search Colorful highlighting Goto from start, end, and current cursor position Custom C++-like pattern language for parsing highlighting a file’s content Automatic loading based on MIME-type arrays, pointers, structs, unions, enums, bitfields, using declarations, litte and big-endian support Useful error messages, syntax highlighting, and error marking Data importing Base64 files IPS and IPS32 patches Data exporting IPS and IPS32 patches Data Exporting Data inspector allowing interpretation of data as many different types (little and big-endian) Huge file support with fast and efficient loading Strings search Copying of strings Copying of detangled strings File hashing support CRC16 and CRC32 with custom initial values and polynomials MD4, MD5 SHA-1, SHA-224, SHA-256, SHA-384, SHA-512 Disassembler supporting many different architectures ARM32 (ARM, Thumb, Cortex-M, aarch32) ARM64 MIPS (MIPS32, MIPS64, MIPS32R6, Micro) x86 (16 bit, 32 bit, 64 bit) PowerPC (32 bit, 64 bit) Sparc SystemZ XCore M68K TMS320C64X M680X Ethereum Bookmarks Region highlighting Comments Data Analyzer File magic-based file parser and MIME type database Byte distribution graph Entropy graph Highest and avarage entropy Encrypted / Compressed file detection Helpful tools Itanium and MSVC demangler ASCII table Regex replacer Mathematical expression evaluator (Calculator) Hexadecimal Color picker Built-in cheat sheet for pattern language and Math evaluator Doesn’t burn out your retinas when used in late-night sessions Changelog v1.18.2 Additions Added Brazilian Portuguese translation. Huge thanks to @dgsmiley18 Added IEEE 754 floating-point number experimenting tool Completely rewrote the Hash view It now supports displaying multiple different Hash types at the same time Configured hashes now also appear in the hex editor when selecting a region, hovering the cursor over it and holding down SHIFT Added tooltip to all Visualizer data processor nodes that display the visualization a lot bigger Improvements Improved contrast of the pattern language error popup text color in light mode Bug Fixes Fixed editing values in the hex editor Fixed another scroll issue in the hex editor Fixed pasting bytes in the hex editor view Fixed bookmarks automatically collapsing when editing their name Fixed a crash when the OS didn’t configure monitors correctly This mainly happens when using Windows Remote Desktop [hide][Hidden Content]]
  14. "Safely and easily explore Windows 11 hidden settings." Latest Version: 1.5.0 Supported OS: Windows 11 Improve Your Windows 11 Experience As a long time Windows user you might have heard about registry. The registry is a special file in your hard disk that hold most of Windows settings data. Wish to Windows taskbar to the top or change the taskbar size? No problem, those tasks can easily be done by simply editing the registry value. Unfortunately registry is not a friendly place for most people. Changing a wrong value in the registry may cause an unpredictable problem to your Windows. This is why novice users should not edit registry value directly using a registry editor by them self. In TweakNow WinSecret, we have gathered the most popular Windows 11 registry settings and provide them for you in an easy and safe user interface. Key features Move taskbar to the top Change taskbar size Use Windows 10 context menu style Change app switch behaviour Make taksbar transparent Use File Explorer old toolbar style Enable or disable personalised ads using advertising ID Show accent color on title bars and windows borders Change menu show delay value And much more ...... New in version 1.5: Enable or disable game mode features Change Taskbar Thumbnail Previews delay value Show folder name or full folder path on the File Explorer title bar [hide][Hidden Content]]
  15. GitGuardian Shield: protect your secrets with GitGuardian GitGuardian shield (ggshield) is a CLI application that runs in your local environment or in a CI environment to help you detect more than 300 types of secrets, as well as other potential security vulnerabilities or policy breaks. GitGuardian shield uses our public API through py-gitguardian to scan and detect potential secrets on files and other text content. Only metadata such as call time, request size, and scan mode is stored from scans using GitGuardian shield, therefore secrets and policy breaks incidents will not be displayed on your dashboard and your files and secrets won’t be stored. You’ll need an API Key from GitGuardian to use ggshield. Currently supported integrations Azure Pipelines Bitbucket Pipelines Circle CI Orbs Docker Drone GitHub Actions GitLab Jenkins Pre-commit hooks Pre-push hooks Pre-receive hooks Travis CI Changelog v1.4.2 Add dead link checker action by @RemakingEden in #303 Adjust link-check run & fix last broken link by @commjoen in #304 Challenge 18: New challenge – MD5 hashing by @RemakingEden in #298 Bump peter-evans/create-issue-from-file from 3 to 4 by @dependabot in #306 Challenge 18-pre-alpha fixes by @commjoen in #305 [hide][Hidden Content]]
  16. [Hidden Content]
  17. "Safely and easily explore Windows 11 hidden settings." Latest Version: 1.4.0 Supported OS: Windows 11 Improve Your Windows 11 Experience As a long time Windows user you might have heard about registry. The registry is a special file in your hard disk that hold most of Windows settings data. Wish to Windows taskbar to the top or change the taskbar size? No problem, those tasks can easily be done by simply editing the registry value. Unfortunately registry is not a friendly place for most people. Changing a wrong value in the registry may cause an unpredictable problem to your Windows. This is why novice users should not edit registry value directly using a registry editor by them self. In TweakNow WinSecret, we have gathered the most popular Windows 11 registry settings and provide them for you in an easy and safe user interface. Key features Move taskbar to the top Change taskbar size Use Windows 10 context menu style Change app switch behaviour Make taksbar transparent Use File Explorer old toolbar style Enable or disable personalised ads using advertising ID Show accent color on title bars and windows borders Change menu show delay value And much more ...... New in version 1.4: Enable a new boot screen animation Show file extension in File Explorer Show hidden files, folders and drives in File Explorer [hide][Hidden Content]]
  18. Powerful manager for Windows File Explorer context menu Overview Shell is a context menu extender that lets you handpick the items to integrate into Windows File Explorer context menu, create custom commands to access all your favorite web pages, files, and folders, and launch any application directly from the context menu. It also provides you a convenient solution to modify or remove any context menu item added by the system or third party software. Shell is a portable utility, so you don’t need to install anything on your PC. Features Lightweight, portable and relatively easy to use. Fully customize the appearance. Adding new custom items such as (sub-menu, menuitem and separator). Modify or remove items that already exist. Support all file system objects files, folders, desktop and taskbar. Support expressions syntax. with built-in functions and predefined variables. Support colors, glyphs, SVG, embedded icons, and image files such as .ico, .png or .bmp. Support search and filter. Support for complex nested menus. Support multiple column. Quickly and easily configure file in plain text. Minimal resource usage. No limitations. Requirements Microsoft Windows 7/8/10/11 [hide][Hidden Content]]
  19. 7 lessons to learn a new skill What you’ll learn Photoshop portrait drawing. Making illustrations in Photoshop On a computer, drawing with a mouse Photoshop software Requirements Photoshop is available. Description From the very beginning, learn a new portrait sketching talent in just seven courses. I’ll show you how to sketch with a mouse on a computer in this tutorial. You don’t need any drawing talents or Photoshop knowledge; all you need is a computer, a mouse, and Photoshop. You will study the following in seven lessons: Photoshop software How to sketch on a computer with a mouse The characteristics of the face’s construction How to Pick Colors The guidelines for lighting and shadow placement in the artwork What gives the portrait the appearance of a person in a photograph? Make your first portrait. How to bring a portrait to life by adding realistic eyes, blush, and hair There are several methods for producing portrait backgrounds. Make three more illustrations. Drawings will be possible for everyone! You will have various illustrations in your portfolio after completing the course. Drawing pictures for customers is a good way to start earning money. How to profit from it: Today, drawing portraits is a prominent ability. You will be able to earn up to 1500 € a month after completing the course by drawing: Blogger avatars, stickers, and table covers Professional logos Business cards, billboards, presentations, and information goods can all benefit from portraits. Invitations to weddings Newborn dimensions Gifts, souvenir portraits, and much more are all available. The possibilities for art portraits are endless. From 3-4 orders, you can refund the cost of the course! What exactly do you require? A computer, a mouse, and Photoshop are all you need. You will learn everything you need to know about Photoshop and drawing during the course. Who this course is for: Freelancers: Photoshop for Beginners, Drawing for Beginners [Hidden Content] [hide][Hidden Content]]
  20. HookCase is a tool for debugging and reverse engineering applications on macOS (aka OS X), and the operating system itself. It re-implements and extends Apple’s DYLD_INSERT_LIBRARIES functionality. It can be used to hook any method in any module (even non-exported ones, and even those that don’t have an entry in their own module’s symbol table). In a single operation, it can be applied to a parent process and all its child processes, whether or not the child processes inherit their parent’s environment. So HookCase is considerably more powerful than DYLD_INSERT_LIBRARIES. It also doesn’t have the restrictions Apple has placed on DYLD_INSERT_LIBRARIES. So, for example, HookCase can be used with applications that have entitlements. HookCase supports interpose hooks. But it also supports another, more powerful kind of hook that we call “patch hooks”. These can hook calls to a method named in its module’s symbol table, including ones that come from the same module. They can also hook calls to an unnamed method (one that isn’t in its module’s symbol table), by specifying the method’s address in its module. So they can be used with non-exported (aka private) methods (named and unnamed) — ones not intended for use by external modules. Patch hooks are so-called because we set them up by “patching” the beginning of an original method with a software interrupt instruction (int 0x30). HookCase’s kernel extension handles the interrupt to implement the hook. This is analogous to what a debugger does when it sets a breakpoint (though it uses int 3 instead of int 0x30). Software interrupts are mostly not used on BSD-style operating systems like macOS and OS X, so we have plenty to choose among. For now, we’re using those in the range 0x30-0x34. Whatever their disadvantages, interpose hooks are very performant. They’re implemented by changing a pointer, so they impose no performance penalty whatsoever (aside from the cost of whatever additional code runs inside the hook). Patch hooks can be substantially less performant — if we have to unset the breakpoint on every call to the hook, then reset it afterward (and protect these operations from race conditions). But this isn’t needed for methods that start with a standard C/C++ prologue in machine code (which is most of them). So most patch hooks run with only a very small performance penalty (that of a single software interrupt). HookCase is compatible with DYLD_INSERT_LIBRARIES and doesn’t stomp on any of the changes it may have been used to make. So a DYLD_INSERT_LIBRARIES hook will always override the “same” HookCase interpose hook. This is because Apple often uses DYLD_INSERT_LIBRARIES internally, in ways it doesn’t document. HookCase would likely break Apple functionality if it could override Apple’s hooks. But this doesn’t apply to patch hooks. Since Apple doesn’t use them, we don’t need to worry about overriding any that Apple may have set. If an interpose hook doesn’t seem to work, try a patch hook instead. (Unless you write them to do so, neither interpose hooks nor patch hooks inherently change the behavior of the methods they hook.) HookCase is compatible with lldb and gdb: Any process with HookCase’s interpose or patch hooks can run inside these debuggers. But you may encounter trouble if you set a breakpoint and a patch hook on the same method, or try to step through code that contains a patch hook. HookCase runs on OS X 10.9 (Mavericks) through macOS 10.15 (Catalina). Changelog v6.0.3 macOS 12.4 once again broke HookCase, by making changes that normally only happen in major releases. This time none of the breakage was caused by changes to internal kernel structures (though some of those used by HookCase did change). Instead it was caused by two changes in behavior. HookCase 6.0.3 works around them. For more information see Issue #34. [hide][Hidden Content]]
  21. itsMe

    Mica for Everyone v1.0.6.2

    Mica For Everyone is a tool to customize system backdrop on win32 apps using DwmSetWindowAttribute and other methods. It can apply Mica (or any other backdrop material) on non-client area (window frame) or background of supported apps and its behavior is customizable through a GUI and a config file. [hide][Hidden Content]]
  22. Description LEARN CYBER SECURITY FUNDAMENTALS FROM ONE OF UDEMY’S TOP IT INSTRUCTORS Are you looking to learn the basics of cyber security? Are you an aspiring IT professional that needs to better understand how cybersecurity works? If so, this is the perfect course for you! In this 4-hour course, I’ll show you step-by-step, the fundamentals of cyber security, teaching you essential cyber security core principles you need to know, as well as enlightening you about the various types of cyber threats we face. If you’re looking to advance or begin your career in Information Technology (IT), this course is a must! WHAT YOU’LL RECEIVE IN THIS COURSE 4 Hours of Lecture & Live Demonstration Videos 37-Page Course Companion Study Guide eBook 2 Real-Life Business Case Studies Edited Closed Caption Subtitles and Video Transcripts Downloadable Course Videos for Offline Viewing with Udemy Mobile App KEY COURSE TOPICS Introduction to Cybersecurity Understanding Hackers Networking 101 Malware Threats Additional Threats & Vulnerabilities Social Engineering & Email Based Threats Core Cyber Security Principles Fundamental Threat Countermeasures Cyber Security in the Workplace Once you complete this course, you’ll understand the core principles of cyber security to help you better protect your IT and business infrastructure! SO WHAT ARE YOU WAITING FOR ENROLL TODAY! PREVIEW OVER 30 MINUTES OF THIS COURSE THROUGH MY 12 FREE LECTURES, JUST SCROLL DOWN BELOW AND CLICK THE BLUE PREVIEW BUTTONS. Who this course is for: Non-Techies Wanting to Learn About Cyber Security Business & IT Managers Needing a Working Knowledge of Cyber Security Aspiring & Inexperienced IT Professionals Requirements A Desire to Learn A Basic Understanding of Computers [Hidden Content] [hide][Hidden Content]]
  23. A machine learning malware analysis framework for Android apps. DroidDetective is a Python tool for analysing Android applications (APKs) for potential malware related behaviour and configurations. When provided with a path to an application (APK file) Droid Detective will make a prediction (using it's ML model) of if the application is malicious. Features and qualities of Droid Detective include: Analysing which of ~330 permissions are specified in the application's AndroidManifest.xml file. Analysing the number of standard and proprietary permissions in use in the application's AndroidManifest.xml file. Using a RandomForest machine learning classifier, trained off the above data, from ~14 malware families and ~100 Google Play Store applications. [hide][Hidden Content]]
  24. An open source (GPLv3) deobfuscator for Eziriz .NET Reactor. May 07, 2022 (version 4.0) Latest Welcome to the May 07, 2022 release of .NETReactorSlayer. As always there are few bug fixes and improvements in this version, some of these changes are listed below: Changed: Improve & Fix Control Flow Deobfuscator. Improve & Fix Token Decrypter. Improve & Fix Cleaner. Fix Boolean Decrypter. New: Remove strong name removal protection. [hide][Hidden Content]]
  25. Docker Images for Penetration Testing & Security • docker pull kalilinux/kali-linux-docker official Kali Linux • docker pull owasp/zap2docker-stable - official OWASP ZAP • docker pull wpscanteam/wpscan - official WPScan • docker pull metasploitframework/metasploit-framework - Official Metasploit • docker pull citizenstig/dvwa - Damn Vulnerable Web Application (DVWA) • docker pull wpscanteam/vulnerablewordpress - Vulnerable WordPress Installation • docker pull hmlio/vaas-cve-2014-6271 - Vulnerability as a service: Shellshock • docker pull hmlio/vaas-cve-2014-0160 - Vulnerability as a service: Heartbleed • docker pull opendns/security-ninjas - Security Ninjas • docker pull noncetonic/archlinux-pentest-lxde - Arch Linux Penetration Tester • docker pull diogomonica/docker-bench-security - Docker Bench for Security • docker pull ismisepaul/securityshepherd - OWASP Security Shepherd • docker pull danmx/docker-owasp-webgoat - OWASP WebGoat Project docker image • docker pull vulnerables/web-owasp-nodegoat - OWASP NodeGoat • docker pull citizenstig/nowasp - OWASP Mutillidae II Web Pen-Test Practice Application • docker pull bkimminich/juice-shop - OWASP Juice Shop • docker pull phocean/msf - Docker Metasploit Make sure you installed docker in your pc