Search the Community

Showing results for tags 'windows'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 221 results

  1. Windows 10 is known as a telemetry hog for a reason. Telemetry data helps Windows get to know you and your habits better and allows Microsoft to adapt both comfort features and ads to your preferences–unless you put a stop to it! Other programs from Google or search engines like Bing track your every move and collect massive amounts of data for the creation of complex user profiles. Ashampoo® AntiSpy Pro prevents the sending of telemetry data in over 100 places with just one click! Regain control and protect your privacy on Windows 10, Windows 8 and even Windows 7 PCs! 1-click immunization against tracking Maximum privacy and protection against unwanted usage reports Silence over 100 programs and services Disable Windows 10 telemetry as far as possible Prevent user tracking by Google, Office, Bing, hardware manufacturers and many more Auto-launch with Windows for permanent data privacy Easily undo changes instantly Relentless against unwanted user profiles [Hidden Content] [hide][Hidden Content]]
  2. WindowsSpyBlocker is an application written in Go and delivered as a single executable to block spying and tracking on Windows systems. The initial approach of this application is to capture and analyze network traffic based on a set of tools. It is open for everyone and if you want to contribute or need help, take a look at the Wiki. Changelog v4.36 Update hosts for extra, spy and update rules Update IPs for extra, spy and update rules Bump github.com/go-ole/go-ole to 1.2.5 Bump github.com/miekg/dns from 1.1.40 to 1.1.42 (#331 #340) Deploy docs on workflow dispatch or tag Fix typo in doc [hide][Hidden Content]]
  3. RemotePotato0 Just another “Won’t Fix” Windows Privilege Escalation from User to Domain Admin. RemotePotato0 is an exploit that allows you to escalate your privileges from a generic User to Domain Admin. Briefly: It abuses the DCOM activation service and triggers an NTLM authentication of the user currently logged on in the target machine. It is required you have a shell in session 0 (e.g. WinRm shell or SSH shell) and that a privileged user is logged on in session 1 (e.g. a Domain Admin user). Once the NTLM type1 is triggered we set up a cross-protocol relay server that receives the privileged type1 message and relays it to a third resource by unpacking the RPC protocol and packing the authentication over HTTP. On the receiving end, you can set up a further relay node (eg. ntlmrelayx) or relay directly to a privileged resource. [hide][Hidden Content]]
  4. Windows and Office Genuine ISO Verifier – is a lightweight piece of software that enables you to determine whether you have a genuine copy of Windows or Office with minimal effort. It can help you determine if you have the genuine copies of the software solutions. Since the application comes in a portable package, the setup is a quick matter of decompressing the archive in the desired location on your hard disk. However, in case you are having a hard time accessing the file, then you should consider Unblocking the tool from Properties in the context menu. Features • Straightforward installation and intuitive interface • It supports numerous versions and languages of Office and Windows • A useful app that can spare you legal complications What's new in Windows and Office Genuine ISO Verifier 9.9.19.21:(April 20nd, 2021) Windows 10 (business editions), version 1809 (Updated Apr 2021) Windows 10 (business editions), version 1909 (Updated Apr 2021) Windows 10 (consumer editions), version 1909 (Updated Apr 2021) Windows 10 (business editions), version 2004 (Updated Apr 2021) Windows 10 (consumer editions), version 2004 (Updated Apr 2021) Windows 10 (business editions), version 20H2 (Updated Apr 2021) Windows 10 (consumer editions), version 20H2 (Updated Apr 2021) Windows Server, version 20H2 (Updated Apr 2021) Windows Server, version 2019 (Updated Apr 2021) [hide][Hidden Content]]
  5. Please read This project was made to demonstrate how easy ransomware are easy to make and how it work. The script works on Windows, Linux and MacOS. It is recommended to compile payload.py to EXE format to make it more portable. I do work on security awareness trainings and test the IT security and safety for other companies and you guessed it; this was made for the demo section of my presentation, NOT TO EARN MONEY OR BRICK PEOPLES COMPUTERS. This script does not get detected by any anti-virusses. Self made scripts go undetected 99% of the time. It's easy to write something nasty like ransomware, adware, malware, you name it. Again, this script was for research only. Not ment to be used in the open world. I am not responsible for any damage you may cause with this knowledge. I recommend using a VPN that allows port forwarding (For example; PIA VPN) when using this outside your network, or better, a cloud computer hosted elsewhere, like Amazon AWS. The conclusion of this project is that it is easy to brick a system and earn money doing it. This script doesn't use any exploits to achieve its goal, but can easily be coded into it as a nice feature. Features Generate a ransomware payload With or without GUI payload FUD (Fully Undetectable by Anti-Virus) Works on Windows, MacOS and Linux Super fast encryption with PyCrypto Compile to EXE, APP or Unix/Linux executable Custom icon for your EXE payload Receive keys of victims Decrypt files Demo mode (payload won't encrypt anything) Fullscreen mode (Warning takes over the screen) Custom warning message for your victim Custom image in your payload Ghost mode (Rename by adding .DEMON extention instead of encrypting the files) Multiple encryption methods Select file extentions to target Decide if payload should self-destruct (Console mode feature only) Decide wich drive to target for encryption (working directory) Verified server access through port forwarding VPN Encode payload as Morse code [hide][Hidden Content]]
  6. ConPtyShell is a Fully Interactive Reverse Shell for Windows systems. The introduction of the Pseudo Console (ConPty) in Windows has improved so much the way Windows handles terminals. ConPtyShell uses this feature to literally transform your bash in a remote powershell. Briefly, it creates a Pseudo Console and attaches 2 pipes. Then it creates the shell process (default powershell.exe) attaching the Pseudo Console with redirected input/output. Then starts 2 Threads for Async I/O: – one thread for reading from the socket and writing to Pseudo Console input pipe; – the second thread for reading from the Pseudo Console output pipe and writing to the socket. ConPtyShell isn’t an “Upgrade to fully interactive” method for your reverse shell, just use it as your reverse shell If you want to know further information regarding ConPty you can find a great article [1] in the references section. NOTE: ConPtyShell uses the function CreatePseudoConsole(). This function is available since Windows 10 / Windows Server 2019 version 1809 (build 10.0.17763). Changelog v1.3 Added Added a magic flag “upgrade” that allows to upgrade the current shell in a fully interactive shell. It uses Socket Hijacking technique to catch the socket used by the shell enhancing it with the ConPty. Changes Changed the usage of the sockets, going from C# sockets to native Winsock [hide][Hidden Content]]
  7. Ninjutsu-OS is a dedicated Windows 10 OS (Build 1909) that contains more than 800 cybersecurity testing tools. Kali Linux, just from the Windows world. The release is quite fresh, took place on 18.04.2020. The INSTALLATION of the OS itself is no different from the standard Win 10 installation, except that it is noticeably longer. After the OS itself is launched, it will take about 10 minutes to install and customize everything. After all the manipulations we are met with a slightly overloaded (in my opinion) and a very colorful desktop. Now let's see what's inside. In total, more than 800 utilities were included in the assembly. Some of them the author had to adapt to start running under Windows. At the top is a separate bar, which contains all the utilities by category for speed access. The utility categorization is done with an emphasis on OSCP methodology with an eye to categorization in Kali Linux: "Mr.Robot tools kit are the most commonly used utilities and other additional materials, according to the author of the assembly. Personal top, so to speak; " Red Teaming is the most commonly used tool for category testing. In fact, these are all top utilities with all the categories below under one tab; Information Gathering - gathering information; "Exploitation Tools is an exploiting vulnerability Malware analysis Mobile Security Tools - Mobile Testing Network Attack - Network Attacks Password Attacks - password hacking Proxy and Privacy Tools - proxing and anonymizers; - Reverse Engineering is a reverse engineering; Stress Testing - Stress Testing (DDoS); Vulnerability Analysis - Finding vulnerabilities Web Application Attack , web pentest; Wireless Attacks - Wireless Attacks Fuzzing and payloads - phasing and workloads; Remote Control Tools - Remote Control - Utility Tools - other auxiliary utilities (Winrar, MyS'L, etc.); The full list of available utilities can be found on the project's website. The OS is perfect for both pure pentest and people who are engaged in reverse engineering, OSINT or malware analysis. In a few days of work on the OS, I didn't catch any critical bugs or software failures. Tested on machines with Hack the Box plus turned up an additional project on OSINT. [Hidden Content]
  8. PE-Packer PE-Packer is a simple packer for Windows PE files. The new PE file after packing can obstruct the process of reverse engineering. It will do the following things when packing a PE file: Transforming the original import table. Encrypting sections. Clearing section names. Installing the shell-entry. When running a packed PE file, the shell-entry will decrypt and load the original program as follows: Decrypting sections. Initializing the original import table. Relocation. Before packing, using some disassembly tools can disassemble the executable file to analyze the code, such as IDA Pro. [hide][Hidden Content]]
  9. Brutus is a Botnet, written entirely in Python targeting Windows machines. It gives the attacker control over the victim's machine and enables him to: Stream images over the victim's webcam Stream audio over the victim's microphone Take screenshots of the victim's desktop Run batch commands & receive the output of those Automatically create a backdoor after execution Get the victim's location through the IPv4 address The Command Line Interface / CLI of Brutus had to be developed manually because in Python the "input()" - function disables the script from printing output to the regular CLI when awaiting user input. The PYQT Framework is used for the creation of the GUI. Asynchronous TCP-Socket connections are used to transfer data. It's efficient and enables the script to receive output from infected devices and send input/commands to those devices at the same time. Connected users are given an individual ID-Number over which they can be adressed in the CLI. [hide][Hidden Content]]
  10. W10 Digital License Activation ———————————————— Activate the Windows 10 permanently with digital License. [hide][Hidden Content]]
  11. WinObjEx64 is an advanced utility that lets you explore the Windows Object Manager namespace. For certain object types, you can double-click on it or use the “Properties…” toolbar button to get more information, such as description, attributes, resource usage etc. It let you view and edit object-related security information if you have required access rights. System Requirements WinObjEx64 does not require administrative privileges. However administrative privilege is required to view much of the namespace and to edit object-related security information. It works only on the following x64 Windows: Windows 7, Windows 8, Windows 8.1 and Windows 10 (TH1, TH2, RS1, RS2), including Server variants. WinObjEx64 does not work on Windows XP, Windows Vista is partially supported and has no plans for their full support. In order to use all program features Windows must be booted in the DEBUG mode. Changelog v1.8.8 internal rearrange view security for ALPC ports (most of them) security descriptor view dialog (object SID, DACL & SACL) fix #24 (SCM services list query) fix #25 (jump to file may fail under certain conditions) various minor UI changes 21h1 compatibility improvements [hide][Hidden Content]]
  12. KratosKnife is a Advanced BOTNET Written in python 3 for Windows OS. Comes With Lot of Advanced Features such as Persistence & VM Detection Methods, Built-in Binder, etc Generator Features Encrypt Source Code Using AES 256 Bit Encryption Encrypt Source Code Using Base64 Encryption Packing Evil Exe Using UPX Packer Interactive Mode [Generator Ask Required Parameter] Debug Mode [Can Be Used In Debugging Payload] Persistence Payload 3 Powerfull Methods to Detect/Bypass VM (such as VirtualBox, VMware, Sandboxie) Built-in File Binder Useful Icons Inside icon Folder Virtual Machine Bypass Methods Includes Registry Check Processes and Files Check MAC Adderess Check Disclaimer This project was created only for good purposes and personal use. THIS SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. YOU MAY USE THIS SOFTWARE AT YOUR OWN RISK. THE USE IS COMPLETE RESPONSIBILITY OF THE END-USER. THE DEVELOPERS ASSUME NO LIABILITY AND ARE NOT RESPONSIBLE FOR ANY MISUSE OR DAMAGE CAUSED BY THIS PROGRAM. [hide][Hidden Content]]
  13. What you'll learn How to use multiple methods to escalate privleges on modern versions of Windows 10 How to escalate privleges in CTFs such as HackTheBox, TryHackMe and more How to succeed in CTF style exams such as the OSCP, eCPPT and CEH How to level up your ethical hacking, penetration testing and red teaming skills to earn more money in your career Requirements A HackTheBox VIP Subscription is Required Basic knowledge of virtual machines Description New Launch for Spring 2021! This is a 100% hands on course as you will be using the same tradecraft and techniques Red Teamer's and advanced adversaries use to escalate privileges on Windows endpoints after they have gained initial access and established a foothold. This course is not "death by PowerPoint", in fact there is not a single Powerpoint slide in the course. This course is aimed for intermediate to advanced users who are hungry to know how to discover and exploit novel escalation paths on patched fully patched Windows 10 endpoints. Everything is carefully, explained - step-by-step. Additionally, although Metasploit is used in some attacks, we will be using less Metasploit and more manual walk-throughs because I wanted to take the time to carefully explain WHY each method works and detail how common misconfigurations happen in enterprise environments. Where Metasploit is used, everything is carefully explained and deconstructed so you can understand why and how it works. Exploits start easy and escalate in difficulty as you progress through the course. The Techniques You will quickly learn and execute the following escalation of privilege techniques across 5 vulnerable machines Windows Kernel Exploits Weak Registry Permissions Token Manipulation CVE Exploits DPAPI Abuse (Three New Lectures Just Added January 2021!) The Tools You will use msfvenom, BC Security PowerShell Empire, CrackMapExec, netcat, smbserver, wfuzz, gobuster, dirsearch, sqlmap, Mimikatz, Burp Suite (advanced features), Python 3, Powershell 7 on Linux and more. You will learn IIS 10 Server Administration, how to threat hunt for SQLi attacks in web logs and much much more. My dream for you By the end of this course you should be able to use these techniques in: Your day to day work OSCP preparation CTF hacking About the lab There are 10 vulnerable machines. No lab setup is required as the entire environment is already established in HackTheBox VIP labs I wanted to make this course as realistic as possible while removing as many barriers to entry as possible so I've partnered with HackTheBox VIP labs to make it as easy as possible to get started. Yes, HackTheBox is an additional charge but it offers hundreds of pre-configured vulnerable machines in a lab which is accessible via a VPN connection. This means you can get started right away and don't have to waste time fumbling with VirtualBox and VMWare settings on your local system. Most of the systems are also licensed which provides the best environment for realistic exploitation. Tip: I made these videos so all commands are zoomed in close so you can watch on a mobile phone if desired. I hate watching videos on my smartphone and squinting at the command prompt or terminal. Never again will that happen. Who this course is for: Students interested in how attackers escalate privileges on modern Windows endpoints Beginning and Intermediate cyber security students. Students looking for OCSP practice [Hidden Content] [hide][Hidden Content]]
  14. Defeat-Defender Powerfull Batch File To Disable Windows Defender,Firewall,Smartscreen And Execute the payload [hide][Hidden Content]]
  15. What you'll learn Ethical hacking and penetration testing skills Windows privilege escalation techniques Common privilege escalation tools and methodology Preparation for capture the flag style exams and events <script>alert('1')</script> Requirements Prior beginner hacking knowledge preferred Prior virtualization knowledge preferred A subscription to Hack the Box is required to complete the course. A subscription to TryHackMe is strongly recommended to complete the course. Description This course focuses on Windows Privilege Escalation tactics and techniques designed to help you improve your privilege escalation game. Students should take this course if they are interested in: Gaining a better understanding of privilege escalation techniques Improving Capture the Flag skillset Preparing for certifications such as the OSCP, eCPPT, CEH, etc. What will I learn? 1) How to enumerate Windows systems manually and with tools 2) A multitude of privilege escalation techniques, including: Kernel Exploits Password Hunting Impersonation Attacks Registry Attacks Executable Files Schedule Tasks Startup Applications DLL Hijacking Service Permissions Windows Subsystem for Linux CVE-2019-1388 3) Tons of hands-on experience, including: 13 vulnerable machines total Capstone challenge Custom lab with no installation required PLEASE NOTE Due to the cost of Windows licensing, this course is designed around Hack The Box and TryHackMe platforms, which are additional charges, but offer an incredible variety of vulnerable machines at a fraction of the cost of one Windows license. I do not receive any financial incentive from either platform for utilizing them in the course. Who this course is for: Students interested in ethical hacking and cybersecurity Students interested in improving privilege escalation skillset [Hidden Content] [Hidden Content]
  16. WSCC allows you to install, update, execute and organize the utilities from various system utility suites. WSCC can install and update the supported utilities automatically. Alternatively, WSCC can use the http protocol to download and run the programs. The portable edition doesn't require installation and can be run directly from a USB drive. WSCC supports the following major utility suites: Sysinternals Suite NirSoft Utilities 4.0.5.8 (January 4, 2021) [FIXED] minor fixes in the Update Manager [hide][Hidden Content]]
  17. Yamicsoft Windows 10 Manager – is a system utility that helps you optimize, tweak, repair and clean up Windows 10. It will increase your system speed, eliminate system fault, improve system security, and meet all of your expectations. This program is an all-in-one utility for Microsoft Windows 10 specially, it includes over forty different utilities to optimize, tweak, clean up, speed up and repair your Windows 10, helps make your system perform faster, eliminate system fault, increase stability and security, personalize your copy of Windows 10, it can meet all of your expectations. Features • Create system restore point manually • Tweaks your system to improve performance and increase speed • Gets detailed information about your system and hardware • Helps you find out the Microsoft product key • Manages and configures the Windows boot menu to your preference • Manages and optimizes system services and drivers to improve performance • Customizes system parameters according to your preferences • Tweaks system, components, UAC, Sign in settings, adjusts various settings • Optimizes and tweaks your internet connection and network settings • Creates scheduled tasks or the monitoring that trigger tasks • Splits a file into several smaller files or merges back to the original file • Super Copy is the powerful tool to copy files or backup automatically • Operates your Registry easily using the Registry Tools What is New 01/01/2021: Windows 10 Manager v3.4.0 released. Perfect some functions. Fix some bugs. Add the Croatian. Add the Window Finder in Process Manager. Now you can drag and drop the files or folders. Add the Croatian. [Hidden Content] [hide][Hidden Content]]
  18. Windows Spy Blocker – s a set of rules to block Windows spy / telemetry based on multiple tools to capture traffic. It is open for everyone and if you want to contribute, take a look at the Wiki. Most malicious content is delivered through the information superhighway nowadays, so it’s highly recommended to take your security measures seriously. An antivirus solution alone can barely keep up with everything going on, that’s why programs like WindowsSpyBlocker want to make things easier by blocking access to potentially harmful domains. [hide][Hidden Content]]
  19. itsMe

    Windows 10 Tricks And Tips

    Overview: Windows 10 is packed with brilliant features and apps that aim to make your computing experience as compelling as possible. But while Windows 10 is absolutely accessible to newcomers and veterans alike, some of its more powerful features may not be immediately apparent. That’s where Windows 10 Tips, Tricks & Apps comes in. We’ll talk you through how to get the most out of Microsoft’s built-in apps, how to tweak the OS to fit your needs, how to solve issues and which of the thousands of apps available from the Windows Store are really worth your time. [hide][Hidden Content]]
  20. Usage 1. change ip and port in backdoor.py and server.py 2. Run: python backdoor.py on target system 3. Run. python server.py in your local machine [hide][Hidden Content]]
  21. Git Client, done Sublime Line-by-line Staging. Commit Editing. Unmatched Performance. A faster way to work With a zippy cross-platform GUI toolkit, an unmatched syntax highlighting engine, and a custom high-performance Git reading library, Sublime Merge sets the bar for performance. Precise and Flexible Commit exactly what you want with line-by-line and hunk staging. Select one or more lines to split hunks into multiple changes. Sublime Highlighting With the power of Sublime Text syntax highlighting, you can understand exactly what's been changed in a commit. With over 40 supported languages out of the box, and automatic loading of installed third-party syntaxes, we've got you covered. [Hidden Content] [hide][Hidden Content]]
  22. Windows WebAct Plus – The program is one of the best activators for Windows 10 with a daily update of MAK keys With this tool you can permanently activate all versions of windows. In addition to it its easy to use and does not require experience to bring the activation keys to use when trying to activate the program. Windows WebAct Plus can Activate the Windows all permanently with digital License. You can activate windows with valid mak key. This activation is 100% GENUINE. Features • It can remove any previous activation • Can obtain MAK keys for Windows • Web Activation • Activate windows 10 permanently without confirming via skype or phone> This tool helps you get a confirmation code with a few clicks What’s New * Fixed Activation Bug. * Fixed For All Bugs. [Hidden Content] [hide][Hidden Content]]
  23. BlackNET Free advanced and modern Windows botnet with a nice and secure PHP panel developed using VB.NET. About BlackNET Free advanced and modern Windows botnet with a nice and secure PHP panel built using VB.NET. this botnet controller comes with a lot of features and the most secure panel for free Developed By: Black.Hacker What You Can Do Upload File From URL From Disk DDOS Attack [ TCP,UDP,ARME,Slowloris, HTTPGet, POSTHttp, Bandwidth Flood ] Start DDOS Stop DDOS Open Webpage Visible Hidden Show MessageBox Take Screenshot Steal Firefox Cookies Steal Saved Passwords Chrome Firefox NordVPN FileZilla Outlook Steal Chrome Cookies Steal Discord Token Steal Chrome History Steal Clipboard Data Execute Shell Commands CMD (Command Prompt) Powershell Send Spam Emails Run XMR Miner Seed a Torrent File From Disk From URL Keylogger Execute Scripts Execute Custom Plugins Computer Operations Restart Shutdown Logout Bitcoin Wallet Stealer Uninstall Client Move Client Blacklist Client Update Client Close Client Requirements PHP >= 7.3 NET Framework Stub >= 4.5 Builder >= 4.5 How to Install Pull the repo or Download the latest release Compress BlackNET panel folder and upload it to your hosting Create a database with any name you want Change the database information in config/config.php Change the "Panel URL" with your url in config/config.php Change all files and folders permission to 777 Make Sure that all DLLs are included in Plugins Folder FileSearcher.dll PasswordStealer.dll PluginExample.dll xmrig.exe Go to install.php fill-up the form and click install Create a cron job for ping.php and remove.php v3.7 Added more Charts and Stats Updated the stub .NET Framework to 4.5 Fixed a lot of HTTP Socket Issues and Stabilty More room for new features Fixed Discord Stealer Added PHPSpreadsheet Export Logs to Excel file insted of CSV Fixed "Stop DDoS" Bug Fixed "Take Screenshot" Bug Fixed "Delete Files" Bug Fixed "Installed Softwares" Bug Fixed Self Destruction Bug Added Code Documentation for Developers Added GPU and CPU information Added RAM Size Information Added DropBox Spread Added OneDrive Spread Added Downloader with Multiple Links Added XMR Miner Added Export Passwords to Excel Added Client Files Backup Function Added Torrent Seeder Added Disable Windows Defender Added Protect with Critical Process Added Modules Support Keylogger Start On Run [Optional] Modified File Binder Support Multiple Files Added "Client Information" Page Export Client Informtion to Excel Fixed 000webhost issue [ Tested ] Updated BlackNET Builder to .NET 4.5 Redesigned the Builder Modified the Password Stealer Doesn't require Newtonsoft.Json.dll Modified the File Searcher Doesn't require Ionic.zip.dll Modified the Icon Changer Modified "Schedule Task" Function Removed Chrome History Stealer Cleaner Code and File Structure Cleaner Database Structure Simple Template Engine to handle layouts The panel now depends on Composer Code Refactored with the standard PSR-12 Updated PHPMailer to 6.2.0 Updated BlackUpload to v1.5.2 Secrity Enhancement Small UI changes Small Installation Changes Improved Connection Speed Bug Fixes [Hidden Content]
  24. Microsoft PowerToys – is a set of utilities for power users to tune and streamline their Windows experience for greater productivity. Inspired by the Windows 95 era PowerToys project, this reboot provides power users with ways to squeeze more efficiency out of the Windows 10 shell and customize it for individual workflows. Microsoft revealed earlier this year that PowerToys were coming back to Windows 10. PowerToys used to be useful little utilities that would let you further customize Windows. Microsoft’s first PowerToys for Windows 10 are now available. Current PowerToy Utilities FancyZones • FancyZones is a window manager that makes it easy to create complex window layouts and quickly position windows into those layouts. File Explorer Add-ons (Preview Panes) • File Explorer add-ons right now are just limited to Preview Pane additions for File Explorer. Preview Pane is an existing feature in the File Explorer. To enable it, you just click the View tab in the ribbon and then click “Preview Pane”. PowerToys will now enable two types of files to be previewed: Markdown (.md) & SVG (.svg). Image Resizer • Image Resizer is a Windows Shell Extension for quickly resizing images. With a simple right click from File Explorer, resize one or many images instantly. Keyboard Manager • Keyboard Manager allows you to customize the keyboard to be more productive by remapping keys and creating your own keyboard shortcuts. This PowerToy requires Windows 10 Version 1903 (Build 18362) or newer. PowerRename • PowerRename is a Windows Shell Extension for advanced bulk renaming using search and replace or regular expressions. PowerRename allows simple search and replace or more advanced regular expression matching. While you type in the search and replace input fields, the preview area will show what the items will be renamed to. PowerRename then calls into the Windows Explorer file operations engine to perform the rename. This has the benefit of allowing the rename operation to be undone after PowerRename exits. PowerToys Run • PowerToys Run is a new toy in PowerToys that can help you search and launch your app instantly with a simple alt-space and start typing! It is open source and modular for additional plugins. Window Walker is now inside too! This PowerToy requires Windows 10 Version 1903 (Build 18362) or newer. Shortcut Guide • Windows key shortcut guide appears when a user holds the Windows key down for more than one second and shows the available shortcuts for the current state of the desktop. Release v0.27.1 This is patch release to fix a 5 items for 0.27 we deemed important for stability. FancyZones and Color Picker are the two that have the hot fixes. Our next major planned release is 0.29 at the end of December 2020. #8330 - FancyZones not waiting for me to release Shift. The primary bug is fixed. We discovered an edge case #8511that is not resolved in this larger fix. We felt the larger fix was worth getting out without the edge case being solved. #8378 - Memory leak in FancyZones. Our fix actually improved performance when showing the zones on high res and high DPI scaling screens #8339 - FZ editor is correctly handling multi monitor when the laptop built-in display is turned off. #8322 -Editor Crash on removing colors from the history where there is none #6594 - Color Picker hangs while holding activation keystroke [hide][Hidden Content]]
  25. Auslogics Windows Slimmer Pro – is a full-service option to clean up useless data, uninstall software including obsolete Windows versions.The goal here is to slim down non-essential data that is taking up precious space to help improve your machine’s performance and speed. Over time your PC accumulates items that are no longer needed (or ever needed) including some non-optimal settings, unused system apps, in the background data transmitting options, etc., these take up space that waste resources and are detrimental to the overall efficiency of your machine. You need to periodically perform a clean up of these junk items to allow your machine to operate at its best. Items such as old System Restore points, Windows Update files, outdated Windows libraries or disabled system components can take up a large amount of disk space over time and reduce performance. Windows Slimmer is designed to enable any user a simple option to remove unneeded Windows components, uninstall obsolete or unused apps and tweak your machine’s settings to reduce the footprint of your OS on your drive smaller, and also reduce the amount of memory and CPU power needed for privacy protection by blocking unnecessary data transmissions. You have a choice for the type of maintenance you wish to perform; one-time maintenance which allows you to target specific files and data like disabled components, the Windows.old folder. The other is regular maintenance which as the name implies is to clean up those areas that need constant attention like memory dump files, the recycle bin, temp and cache folders, etc. Lastly, you have the app list clean up where you can uninstall any app from your machine. This option also includes an app rating key providing you with an at-a-glance indicator to the trustworthiness of the app, but we are not sure exactly where the rating was compiled. That said, it is another nice option for cleaning out junk and providing some always needed space. [Hidden Content] [hide][Hidden Content]]