Jump to content
YOUR-AD-HERE
HOSTING
TOOLS
SERVICE

Search the Community

Showing results for tags 'runtime'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Categories

  • Files
  • Online Book
  • Services

Categories

  • Hacking

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

Found 25 results

  1. Scan: Download: [Hidden Content] Password: [Hidden Content]
  2. Protect your android app/game against reverse engineering with native .so library. [hide][Hidden Content]]
  3. Crypter dEEpEst v27 (11/40) - [C++ RunTime Update 11/06/2021] Scan Result: [Hidden Content] Download: [Hidden Content] Password: Free for users PRIV8
  4. Crypter dEEpEst v26 (11/40) - [C++ RunTime Update 28/03/2021] Scan Result: [Hidden Content] Download: [Hidden Content] Password: Only for Users PRIV8 for private message
  5. Crypter dEEpEst v25 (6/26) - [C++ RunTime Update 11/02/2021] Download: [hide][Hidden Content]] Password: Only for Users PRIV8 for private message
  6. Crypter dEEpEst v24 (9/21) - [C++ RunTime Update 28/01/2021] Despues de perder todo el disco y todo el trabajo me a sido dificil retomar este crypter, en las proximas actualizaciones intentare bajar las detecciones. Download: [Hidden Content] Password: Only Users PRIV8
  7. Crypter dEEpEst v23 (6/36) - [C++ RunTime Update 13/11/2020] Scan result: This file was detected by 6 / 40 engines File name: Stub.exe File size: 117 KB Analysis date: 2020-11-12 | 12:16:07 CRC32: 70c707cf MD5: fb87b0ac3b55c0413facb18ff9ccb4cf SHA-1: 0c9a16dce1c6b7bbf3a01cac7ab22500ddd6b425 SHA-2: af8ea924c7bb40c07630825e8602ea14fac0069f5e9a5fe069c4a61d1d233ff6 SSDEEP: 1536:be1Tl71RPU38azdZKPigH5C0Om1IphBhEHH:b0lRVazdZVdm1IphBhS [Hidden Content] AdAware Undetected Amiti Undetected Arcabit Undetected Avast Undetected AVG Undetected Avira HEUR/AGEN.1127758 Bitdefender Undetected Bullguard Undetected ClamAV Undetected Comodo Undetected Comodo Linux Undetected DrWeb Trojan.PWS.Maria.3 Emsisoft Undetected eScan Undetected F-Prot Undetected F-Secure Heuristic.HEUR/AGEN.1127758 G Data Undetected IKARUS Undetected Immunet Undetected Kaspersky Undetected Max Secure Undetected McAfee Undetected Microsoft Defender Undetected NANO Undetected NOD32 Win32/Injector.AVKS trojan Norman Undetected Preventon Undetected Quick Heal Undetected SecureAge APEX Malicious Seqrite Undetected Sophos Undetected Symantec Undetected TrendMicro Undetected Vba32 BScope.Trojan.Inject VirITExplorer Undetected VirusFighter Undetected Xvirus Undetected Zillya Undetected ZoneAlarm Undetected Zoner Undetected DOWNLOAD: [Hidden Content] PASSWORD: Only for Users PRIV8 ,send PM
  8. Scan result: This file was detected by 5 engines File name: Stub.exe File size: 117 KB Analysis date: 2020-08-30 | 07:16:53 CRC32: 53daccb2 MD5: 5e90f98703963d2d49235dd3041ede91 SHA-1: 7b2eaf5de37e51d5c116d9b39c963108f1971459 SHA-2: 0bda1c6efe76de55a77f0e2de369bc97efb86162e94fba849e529b015a222c18 AdAware Undetected Amiti Undetected Arcabit Undetected Avast Undetected AVG Undetected Avira HEUR/AGEN.1127758 Bitdefender Undetected Bullguard Timeout ClamAV Undetected DrWeb Undetected Emsisoft Scanning results incomplete eScan Timeout F-Prot Undetected F-Secure Undetected G Data Timeout IKARUS Scanning results incomplete Immunet Undetected Kaspersky Undetected Max Secure Undetected McAfee GenericRXKH-YF!5E90F9870396 trojan !!! Microsoft Defender Undetected NANO Undetected NOD32 Win32/Injector.AVKS trojan Norman Undetected Quick Heal Undetected SecureAge APEX Malicious Seqrite Undetected Sophos Scanning results incomplete Symantec Undetected TrendMicro Undetected Vba32 BScope.Trojan.Inject VirusFighter Undetected Xvirus Undetected Zillya Scanning results incomplete ZoneAlarm Undetected Zoner Undetected Download: [Hidden Content] Password: Password by private message Only for Users PRIV8
  9. Runtime Mobile Security v1.4 - manipulate Android Java Classes and Methods at Runtime Runtime Mobile Security (RMS), powered by FRIDA, is a powerful web interface that helps you to manipulate Android Java Classes and Methods at Runtime. You can easily dump all the loaded classes and relative methods, hook everything on the fly, trace methods args and return value, load custom scripts, and much other useful stuff. General Info Runtime Mobile Security (RMS) is currently supporting Android devices only. It has been tested on MacOS and with the following devices: AVD emulator Genymotion emulator Amazon Fire Stick 4K It should also work well on Windows and Linux but some minor adjustments may be needed. Changelog v1.4 All the most important features of RMS have been ported to iOS devices [hide][Hidden Content]]
  10. Result Scanner: File Name: Stub.exe Scan Date: 2020-05-24 12:35 MD5: 417c73d81f6493bc35294b5cefad589f Filesize: 117.05 KB Detection: 3 / 26 Link: [Hidden Content] Scanned with CyberScan.org (No distribute scanner) Ad-Aware Antivirus - Clean Arcabit Antivirus - Clean Avast Internet Security - Clean AVG Internet Security - Clean Avira Anti-Malware - HEUR/AGEN.1127758 BitDefender Antivirus - Clean BullGuard Antivirus - Clean ClamAv Antivirus - Clean Comodo Essentials - Clean Cyren Antivirus - Clean Windows Defender - Clean eScan Antivirus - Clean Eset Internet Security - Win32/Injector.AVKS trojan F-Prot Security - Clean F-Secure Antivirus - Clean Emisoft Anti-Malware - Clean Immunet Antivirus - Clean Kaspersky Endpoint- HEUR:Trojan.Win32.Inject.vho Nano Antivirus - Clean Norman Antivirus - Clean Ikarus Antivirus - Clean Sophos Antivirus - Clean Xvirus Anti-Malware - Clean VirusFighter Antivirus - Clean Zillya Antivirus - Clean ZoneAlarm Antivirus - Clean Download: [HIDE][Hidden Content]] Password: Password by private message Only for Users PRIV8
  11. Scan Result: [Hidden Content] Download: [HIDE][Hidden Content]] Password: Password by private message Only for Users PRIV8
  12. Download: [HIDE][Hidden Content]] Password: For PM Only Users PRIV8
  13. File Name: Stub.exe Scan Date: 28/03/2020 18:14 MD5: 13e42b6467bec56d56210b91faec0780 Filesize: 117.05 KB Detection: 2 / 24 Link: [Hidden Content] Scanned with CyberScan.org (No distribute scanner) Ad-Aware Antivirus - Clean Arcabit Antivirus - Clean Avast Internet Security - Clean AVG Internet Security - Clean Avira Anti-Malware - HEUR/AGEN.1036224 BitDefender Antivirus - Clean BullGuard Antivirus - Clean ClamAv Antivirus - Clean Comodo Essentials - Clean Cyren Antivirus - Clean Windows Defender - Clean eScan Antivirus - Clean Eset Internet Security - Win32/Injector.AVKS trojan F-Prot Security - Clean F-Secure Antivirus - Clean Emisoft Anti-Malware - Clean Immunet Antivirus - Clean Kaspersky Endpoint- Clean Nano Antivirus - Clean Ikarus Antivirus - Clean Sophos Antivirus - Clean Xvirus Anti-Malware- Clean Zillya Antivirus - Clean ZoneAlarm Antivirus - Clean Download: [Hidden Content] Password: Only for users PRIV8 by PM
  14. File Name: Stub.exe Scan Date: 02/04/2020 17:41 MD5: a2dd18c38f0a337fbf393c46e631af3f Filesize: 117.05 KB Detection: 3 / 24 Link: [Hidden Content] Scanned with CyberScan.org (No distribute scanner) Ad-Aware Antivirus - Clean Arcabit Antivirus - Clean Avast Internet Security - Clean AVG Internet Security - Clean Avira Anti-Malware - HEUR/AGEN.1036224 BitDefender Antivirus - Clean BullGuard Antivirus - Clean ClamAv Antivirus - Comodo Essentials - Clean Cyren Antivirus - Clean Windows Defender - Clean eScan Antivirus - Clean Eset Internet Security - Win32/Injector.AVKS trojan F-Prot Security - Clean F-Secure Antivirus - Clean Emisoft Anti-Malware - Clean Immunet Antivirus - Kaspersky Endpoint- HEUR:Trojan.Win32.Inject.vho Nano Antivirus - Clean Ikarus Antivirus - Clean Sophos Antivirus - Clean Xvirus Anti-Malware- Clean Zillya Antivirus - Clean ZoneAlarm Antivirus - Clean Download: [HIDE][Hidden Content]] Pass: Only for users PRIV8 by PM
  15. File Name: Stub.exe Scan Date: 22/03/2020 21:17 MD5: b15ca6c3fea87e7b481ef0c95a08a5ec Filesize: 117.05 KB Detection: 3 / 24 Link: [Hidden Content] Scanned with CyberScan.org (No distribute scanner) Ad-Aware Antivirus - Clean Arcabit Antivirus - Clean Avast Internet Security - Clean AVG Internet Security - Clean Avira Anti-Malware - HEUR/AGEN.1036224 BitDefender Antivirus - Clean BullGuard Antivirus - Clean ClamAv Antivirus - Clean Comodo Essentials - Clean Cyren Antivirus - Clean Windows Defender - Clean eScan Antivirus - Clean Eset Internet Security - Win32/Injector.AVKS trojan F-Prot Security - Clean F-Secure Antivirus - Clean Emisoft Anti-Malware - Clean Immunet Antivirus - Clean Kaspersky Endpoint- HEUR:Trojan.Win32.Inject.vho Nano Antivirus - Clean Ikarus Antivirus - Clean Sophos Antivirus - Clean Xvirus Anti-Malware- Clean Zillya Antivirus - Clean ZoneAlarm Antivirus - Clean Download: [Hidden Content] Password: Only for users PRIV8 by PM
  16. File Name: Stub.exe Scan Date: 20/01/2020 01:20 MD5: beb2f7019cbcfe37eda92dc55d078264 Filesize: 217.10 KB Detection: 4 / 24 Link: [Hidden Content] Scanned with CyberScan.org (No distribute scanner) Ad-Aware Antivirus - Clean Arcabit Antivirus - Clean Avast Internet Security - Clean AVG Internet Security - Clean Avira Anti-Malware - HEUR/AGEN.1036224 BitDefender Antivirus - Clean BullGuard Antivirus - Clean ClamAv Antivirus - Clean Comodo Essentials - Clean Cyren Antivirus - Clean Windows Defender - Clean eScan Antivirus - Clean Eset Internet Security - Win32/Injector.AVKS trojan F-Prot Security - Clean F-Secure Antivirus - Clean Emisoft Anti-Malware - Clean Immunet Antivirus - Clean Kaspersky Endpoint- HEUR:Trojan.Win32.Generic Nano Antivirus - Clean Ikarus Antivirus - Clean Sophos Antivirus - Clean Xvirus Anti-Malware- Clean Zillya Antivirus - Trojan.Injector.Win32.677386 ZoneAlarm Antivirus - Clean Download: [Hidden Content]
  17. Leak my last crypt: Video: [Hidden Content] Scan: [HIDE]Download: [Hidden Content]] End:
  18. A heap corruption was observed in Oracle Java Runtime Environment version 8u202 (latest at the time of this writing) while fuzz-testing the processing of TrueType fonts. View the full article
  19. A heap corruption was observed in Oracle Java Runtime Environment version 8u202 (latest at the time of this writing) while fuzz-testing the processing of TrueType, implemented in a proprietary t2k library. View the full article
  20. A heap-based out-of-bounds read was observed in Oracle Java Runtime Environment version 8u202 while fuzz-testing the processing of TrueType fonts rendering in AlternateSubstitutionSubtable::process. View the full article
  21. A heap-based out-of-bounds read was observed in Oracle Java Runtime Environment version 8u202 while fuzz-testing the processing of TrueType fonts rendering in ExtractBitMap_blocClass. View the full article
  22. A heap-based out-of-bounds read was observed in Oracle Java Runtime Environment version 8u202 while fuzz-testing the processing of TrueType fonts rendering in OpenTypeLayoutEngine::adjustGlyphPositions. View the full article
  23. A heap-based out-of-bounds read was observed in Oracle Java Runtime Environment version 8u202 while fuzz-testing the processing of OpenType fonts. View the full article
  24. [HIDE][Hidden Content]] introduction objection is a runtime mobile exploration toolkit, powered by Frida. It was built with the aim of helping assess mobile applications and their security posture without the need for a jailbroken or rooted mobile device. The project's name quite literally explains the approach as well, whereby runtime specific objects are injected into a running process and executed using Frida. Note: This is not some form of jailbreak / root bypass. By using objection, you are still limited by all of the restrictions imposed by the applicable sandbox you are facing. features Supporting both iOS and Android and having new features and improvements added regularly as the tool is used in real world scenarios, the following is a short list of only a few key features: For all supported platforms, objection allows you to: Patch iOS and Android applications, embedding a Frida gadget that can be used with objection or just Frida itself. Interact with the filesystem, listing entries as well as upload & download files where permitted. Perform various memory related tasks, such as listing loaded modules and their respective exports. Attempt to bypass and simulate jailbroken or rooted environments. Discover loaded classes and list their respective methods. Perform common SSL pinning bypasses. Dynamically dump arguments from methods called as you use the target application. Interact with SQLite databases inline without the need to download the targeted database and use an external tool. Execute custom Frida scripts. iOS specific features in objection include the ability to: Dump the iOS keychain, and export it to a file. Dump data from common storage such as NSUserDefaults and the shared NSHTTPCookieStorage. Dump various formats of information in human readable forms. Bypass certain forms of TouchID restrictions. Watch for method executions by targeting all methods in a class, or just a single method. Monitor the iOS pasteboard. Dump encoded .plist files in a human readable format without relying on external parsers. Android specific features in objection include the ability to: List the applications Activities, Services and Broadcast receivers. Start arbitrary Activities available in the target application. Watch a class method, reporting execution as it happens. screenshots The following screenshots show the main objection repl, connected to a test application on both an iPad running iOS 10.2.1, and Samsung Galaxy S5 running Android 6. A file system listing of the iOS applications main bundle A file system listing of the Android applications bundle iOS Keychain dumped for the current application, and later written to a file called keychain.json Inline SQLite query tool SSL Pinning bypass running for an iOS application SSL Pinning bypass running for an Android application sample usage A sample session, where objection version 0.1 is used to explore the applications environment. Newer versions have the REPL prompt set to the current applications name, however usage has remained the same:
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.