Search the Community

Showing results for tags 'runtime'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 20 results

  1. Scan result: This file was detected by 5 engines File name: Stub.exe File size: 117 KB Analysis date: 2020-08-30 | 07:16:53 CRC32: 53daccb2 MD5: 5e90f98703963d2d49235dd3041ede91 SHA-1: 7b2eaf5de37e51d5c116d9b39c963108f1971459 SHA-2: 0bda1c6efe76de55a77f0e2de369bc97efb86162e94fba849e529b015a222c18 AdAware Undetected Amiti Undetected Arcabit Undetected Avast Undetected AVG Undetected Avira HEUR/AGEN.1127758 Bitdefender Undetected Bullguard Timeout ClamAV Undetected DrWeb Undetected Emsisoft Scanning results incomplete eScan Timeout F-Prot Undetected F-Secure Undetected G Data Timeout IKARUS Scanning results incomplete Immunet Undetected Kaspersky Undetected Max Secure Undetected McAfee GenericRXKH-YF!5E90F9870396 trojan !!! Microsoft Defender Undetected NANO Undetected NOD32 Win32/Injector.AVKS trojan Norman Undetected Quick Heal Undetected SecureAge APEX Malicious Seqrite Undetected Sophos Scanning results incomplete Symantec Undetected TrendMicro Undetected Vba32 BScope.Trojan.Inject VirusFighter Undetected Xvirus Undetected Zillya Scanning results incomplete ZoneAlarm Undetected Zoner Undetected Download: [Hidden Content] Password: Password by private message Only for Users PRIV8
  2. itsMe

    Runtime Mobile Security v1.4

    Runtime Mobile Security v1.4 - manipulate Android Java Classes and Methods at Runtime Runtime Mobile Security (RMS), powered by FRIDA, is a powerful web interface that helps you to manipulate Android Java Classes and Methods at Runtime. You can easily dump all the loaded classes and relative methods, hook everything on the fly, trace methods args and return value, load custom scripts, and much other useful stuff. General Info Runtime Mobile Security (RMS) is currently supporting Android devices only. It has been tested on MacOS and with the following devices: AVD emulator Genymotion emulator Amazon Fire Stick 4K It should also work well on Windows and Linux but some minor adjustments may be needed. Changelog v1.4 All the most important features of RMS have been ported to iOS devices [hide][Hidden Content]]
  3. Result Scanner: File Name: Stub.exe Scan Date: 2020-05-24 12:35 MD5: 417c73d81f6493bc35294b5cefad589f Filesize: 117.05 KB Detection: 3 / 26 Link: [Hidden Content] Scanned with CyberScan.org (No distribute scanner) Ad-Aware Antivirus - Clean Arcabit Antivirus - Clean Avast Internet Security - Clean AVG Internet Security - Clean Avira Anti-Malware - HEUR/AGEN.1127758 BitDefender Antivirus - Clean BullGuard Antivirus - Clean ClamAv Antivirus - Clean Comodo Essentials - Clean Cyren Antivirus - Clean Windows Defender - Clean eScan Antivirus - Clean Eset Internet Security - Win32/Injector.AVKS trojan F-Prot Security - Clean F-Secure Antivirus - Clean Emisoft Anti-Malware - Clean Immunet Antivirus - Clean Kaspersky Endpoint- HEUR:Trojan.Win32.Inject.vho Nano Antivirus - Clean Norman Antivirus - Clean Ikarus Antivirus - Clean Sophos Antivirus - Clean Xvirus Anti-Malware - Clean VirusFighter Antivirus - Clean Zillya Antivirus - Clean ZoneAlarm Antivirus - Clean Download: [HIDE][Hidden Content]] Password: Password by private message Only for Users PRIV8
  4. Scan Result: [Hidden Content] Download: [HIDE][Hidden Content]] Password: Password by private message Only for Users PRIV8
  5. Download: [HIDE][Hidden Content]] Password: For PM Only Users PRIV8
  6. File Name: Stub.exe Scan Date: 28/03/2020 18:14 MD5: 13e42b6467bec56d56210b91faec0780 Filesize: 117.05 KB Detection: 2 / 24 Link: [Hidden Content] Scanned with CyberScan.org (No distribute scanner) Ad-Aware Antivirus - Clean Arcabit Antivirus - Clean Avast Internet Security - Clean AVG Internet Security - Clean Avira Anti-Malware - HEUR/AGEN.1036224 BitDefender Antivirus - Clean BullGuard Antivirus - Clean ClamAv Antivirus - Clean Comodo Essentials - Clean Cyren Antivirus - Clean Windows Defender - Clean eScan Antivirus - Clean Eset Internet Security - Win32/Injector.AVKS trojan F-Prot Security - Clean F-Secure Antivirus - Clean Emisoft Anti-Malware - Clean Immunet Antivirus - Clean Kaspersky Endpoint- Clean Nano Antivirus - Clean Ikarus Antivirus - Clean Sophos Antivirus - Clean Xvirus Anti-Malware- Clean Zillya Antivirus - Clean ZoneAlarm Antivirus - Clean Download: [Hidden Content] Password: Only for users PRIV8 by PM
  7. File Name: Stub.exe Scan Date: 02/04/2020 17:41 MD5: a2dd18c38f0a337fbf393c46e631af3f Filesize: 117.05 KB Detection: 3 / 24 Link: [Hidden Content] Scanned with CyberScan.org (No distribute scanner) Ad-Aware Antivirus - Clean Arcabit Antivirus - Clean Avast Internet Security - Clean AVG Internet Security - Clean Avira Anti-Malware - HEUR/AGEN.1036224 BitDefender Antivirus - Clean BullGuard Antivirus - Clean ClamAv Antivirus - Comodo Essentials - Clean Cyren Antivirus - Clean Windows Defender - Clean eScan Antivirus - Clean Eset Internet Security - Win32/Injector.AVKS trojan F-Prot Security - Clean F-Secure Antivirus - Clean Emisoft Anti-Malware - Clean Immunet Antivirus - Kaspersky Endpoint- HEUR:Trojan.Win32.Inject.vho Nano Antivirus - Clean Ikarus Antivirus - Clean Sophos Antivirus - Clean Xvirus Anti-Malware- Clean Zillya Antivirus - Clean ZoneAlarm Antivirus - Clean Download: [HIDE][Hidden Content]] Pass: Only for users PRIV8 by PM
  8. File Name: Stub.exe Scan Date: 22/03/2020 21:17 MD5: b15ca6c3fea87e7b481ef0c95a08a5ec Filesize: 117.05 KB Detection: 3 / 24 Link: [Hidden Content] Scanned with CyberScan.org (No distribute scanner) Ad-Aware Antivirus - Clean Arcabit Antivirus - Clean Avast Internet Security - Clean AVG Internet Security - Clean Avira Anti-Malware - HEUR/AGEN.1036224 BitDefender Antivirus - Clean BullGuard Antivirus - Clean ClamAv Antivirus - Clean Comodo Essentials - Clean Cyren Antivirus - Clean Windows Defender - Clean eScan Antivirus - Clean Eset Internet Security - Win32/Injector.AVKS trojan F-Prot Security - Clean F-Secure Antivirus - Clean Emisoft Anti-Malware - Clean Immunet Antivirus - Clean Kaspersky Endpoint- HEUR:Trojan.Win32.Inject.vho Nano Antivirus - Clean Ikarus Antivirus - Clean Sophos Antivirus - Clean Xvirus Anti-Malware- Clean Zillya Antivirus - Clean ZoneAlarm Antivirus - Clean Download: [Hidden Content] Password: Only for users PRIV8 by PM
  9. File Name: Stub.exe Scan Date: 20/01/2020 01:20 MD5: beb2f7019cbcfe37eda92dc55d078264 Filesize: 217.10 KB Detection: 4 / 24 Link: [Hidden Content] Scanned with CyberScan.org (No distribute scanner) Ad-Aware Antivirus - Clean Arcabit Antivirus - Clean Avast Internet Security - Clean AVG Internet Security - Clean Avira Anti-Malware - HEUR/AGEN.1036224 BitDefender Antivirus - Clean BullGuard Antivirus - Clean ClamAv Antivirus - Clean Comodo Essentials - Clean Cyren Antivirus - Clean Windows Defender - Clean eScan Antivirus - Clean Eset Internet Security - Win32/Injector.AVKS trojan F-Prot Security - Clean F-Secure Antivirus - Clean Emisoft Anti-Malware - Clean Immunet Antivirus - Clean Kaspersky Endpoint- HEUR:Trojan.Win32.Generic Nano Antivirus - Clean Ikarus Antivirus - Clean Sophos Antivirus - Clean Xvirus Anti-Malware- Clean Zillya Antivirus - Trojan.Injector.Win32.677386 ZoneAlarm Antivirus - Clean Download: [Hidden Content]
  10. MCrypt V2 This project was made for educational purposes and not intended to be malicious. What it does MCrypt can bind multiple input files or take 1 input file into 1 file MCrypt can execute the output with a delay using the --delay-execute=15 switch. It should theoretically work on any OS including MAC and Linux (Not tested). The input files are encrypted, if the input is a .net executable then it will be executed using reflection, however if it is not a .net executable then the raw inputs will be dropped onto the temp file path and executed. Features Supports any file type (.doc, .exe, .pdf .... etc) Scan-time encryption Runtime on same process on .NET executable's which means no file dropping on the file system (Reflection) Output is fully self contained so no need to install any extra Microsoft dependencies to run the output executable file Delay startup to bypass AV smart scanners Requirements to run MCrypt (The user running the output does NOT NEED THIS) .NET Core 3 Runtime/SDK Download .NET Core 3.0 (Linux, macOS, and Windows) [HIDE][Hidden Content]]
  11. Leak my last crypt: Video: [Hidden Content] Scan: [HIDE]Download: [Hidden Content]] End:
  12. This is project for bypass AV's runtime with .net server crypter. 1- Open Folder Server Crypter 2- Open "Server Crypter.csproj" in Visual Studio 3- Build source with F5 or button on top 4- Select you'r server and press "Build" 5- Create new project 6- Past in program.cs the Build content and create Ressource files 7- Fix little error, add junk code, icon for FUD This is a project with .net server crypter for bypass AV's Runtime detection. [HIDE][Hidden Content]]
  13. A heap corruption was observed in Oracle Java Runtime Environment version 8u202 (latest at the time of this writing) while fuzz-testing the processing of TrueType fonts. View the full article
  14. A heap corruption was observed in Oracle Java Runtime Environment version 8u202 (latest at the time of this writing) while fuzz-testing the processing of TrueType, implemented in a proprietary t2k library. View the full article
  15. A heap-based out-of-bounds read was observed in Oracle Java Runtime Environment version 8u202 while fuzz-testing the processing of TrueType fonts rendering in AlternateSubstitutionSubtable::process. View the full article
  16. A heap-based out-of-bounds read was observed in Oracle Java Runtime Environment version 8u202 while fuzz-testing the processing of TrueType fonts rendering in ExtractBitMap_blocClass. View the full article
  17. A heap-based out-of-bounds read was observed in Oracle Java Runtime Environment version 8u202 while fuzz-testing the processing of TrueType fonts rendering in OpenTypeLayoutEngine::adjustGlyphPositions. View the full article
  18. A heap-based out-of-bounds read was observed in Oracle Java Runtime Environment version 8u202 while fuzz-testing the processing of OpenType fonts. View the full article
  19. [HIDE][Hidden Content]] introduction objection is a runtime mobile exploration toolkit, powered by Frida. It was built with the aim of helping assess mobile applications and their security posture without the need for a jailbroken or rooted mobile device. The project's name quite literally explains the approach as well, whereby runtime specific objects are injected into a running process and executed using Frida. Note: This is not some form of jailbreak / root bypass. By using objection, you are still limited by all of the restrictions imposed by the applicable sandbox you are facing. features Supporting both iOS and Android and having new features and improvements added regularly as the tool is used in real world scenarios, the following is a short list of only a few key features: For all supported platforms, objection allows you to: Patch iOS and Android applications, embedding a Frida gadget that can be used with objection or just Frida itself. Interact with the filesystem, listing entries as well as upload & download files where permitted. Perform various memory related tasks, such as listing loaded modules and their respective exports. Attempt to bypass and simulate jailbroken or rooted environments. Discover loaded classes and list their respective methods. Perform common SSL pinning bypasses. Dynamically dump arguments from methods called as you use the target application. Interact with SQLite databases inline without the need to download the targeted database and use an external tool. Execute custom Frida scripts. iOS specific features in objection include the ability to: Dump the iOS keychain, and export it to a file. Dump data from common storage such as NSUserDefaults and the shared NSHTTPCookieStorage. Dump various formats of information in human readable forms. Bypass certain forms of TouchID restrictions. Watch for method executions by targeting all methods in a class, or just a single method. Monitor the iOS pasteboard. Dump encoded .plist files in a human readable format without relying on external parsers. Android specific features in objection include the ability to: List the applications Activities, Services and Broadcast receivers. Start arbitrary Activities available in the target application. Watch a class method, reporting execution as it happens. screenshots The following screenshots show the main objection repl, connected to a test application on both an iPad running iOS 10.2.1, and Samsung Galaxy S5 running Android 6. A file system listing of the iOS applications main bundle A file system listing of the Android applications bundle iOS Keychain dumped for the current application, and later written to a file called keychain.json Inline SQLite query tool SSL Pinning bypass running for an iOS application SSL Pinning bypass running for an Android application sample usage A sample session, where objection version 0.1 is used to explore the applications environment. Newer versions have the REPL prompt set to the current applications name, however usage has remained the same:
  20. Shed is an application that allow to inspect the .NET runtime of a program in order to extract useful information. It can be used to inspect malicious applications in order to have a first general overview of which information are stored once that the malware is executed. Shed is able to: Inject a .NET Assembly in a remote process (both managed and un-managed) Extract all objects stored in the managed heap Print strings stored in memory Save the snapshot of the heap in a JSON format for post-processing Dump all modules that are loaded in memory [HIDE][Hidden Content]]