Search the Community

Showing results for tags 'windows'.

The search index is currently processing. Current results may not be complete.


More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Premium Accounts
  • Modders Section
  • PRIV8-Section
  • Cracking Zone PRIV8
  • Carding Zone PRIV8

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 160 results

  1. Windows KMS Activator Ultimate 2019 4.9 it is latest edition for windows Activation that helps you to activate the all Windows and all Office Products with more reliable way. You have best chance to avail this latest offer by Microsoft windows. It has powerful capability to activate the Windows 10, Vista, 8, 8.1, 7, as well as Office 2016/2013/2010 Preview. Windows KMS Activator Windows 10 is very safe and easy Activation program without any harmful effects to the system files. Its Activation limit is 180 days but you can renew it when it expires. If you are using any previous program for windows activation, stop it and install this latest 3.0 version. Features of Microsoft Windows KMS Activator Ultimate 2019 4.9 Windows 10, all versions Windows 8.1, all versions Windows 8.1, Preview all versions Windows 8, all versions Windows 7 Professional Windows 7 Enterprise Windows Vista Business Windows Vista Enterprise Windows Server 12, all versions Windows Server 08, all versions [HIDE][Hidden Content]]
  2. bluesea

    Windows keys

    Windows Server 2019 RTM Server Standard Retail online key [Hidden Content] Windows Server 2019 RTM Server Datacenter Retail online key [Hidden Content] Windows 10 RTM EducationN Retail online key [Hidden Content] Windows Server Essentials 2019 RTM Server Solution Retail online key [Hidden Content]
  3. BlueKeep CVE-2019-0708 is a critical Remote Code Execution vulnerability in Microsoft’s RDP service. This only targets Windows 2008 R2 and Windows 7 SP1. [Hidden Content]
  4. Using Old Windows Symbols with Ghidra in Linux Recently, while developing course material for a reverse engineering course I was making, I needed to get the symbols for the venerable sol.exe. Unfortunately the world’s greatest solitaire program is no longer shipped with windows, and subsequently Microsoft’s symbol servers have stopped providing debug information for it. The last complication was Ghidra’s support for PDB is limited to Windows only systems. This guide will walk through how I got the symbols for an unsupported OS (XP) working inside of the Ghidra Linux client. [Hidden Content]
  5. Microsoft Windows Server 2012 suffers from a Group Policy security feature bypass vulnerability. View the full article
  6. Microsoft Windows Server 2012 suffers from a Group Policy remote code execution vulnerability. View the full article
  7. Microsoft Windows suffers from an insecure CSharedStream object privilege escalation vulnerability. View the full article
  8. Adobe Acrobat Reader DC for Windows suffers from a heap-based buffer overflow vulnerability that can be leveraged via malformed JP2 streams. View the full article
  9. The Microsoft Windows kernel suffers from an out-of-bounds read vulnerability in nt!MiRelocateImage while parsing a malformed PE file. View the full article
  10. The Microsoft Windows kernel suffers from an out-of-bounds read vulnerability in CI!HashKComputeFirstPageHash while parsing a malformed PE file. View the full article
  11. The Microsoft Windows kernel suffers from an out-of-bounds read in nt!MiParseImageLoadConfig while parsing a malformed PE file. View the full article
  12. The Microsoft Windows kernel suffers from an out-of-bounds read vulnerability in CI!CipFixImageType while parsing a malformed PE file. View the full article
  13. The Microsoft Windows kernel suffers from a null pointer dereference vulnerability in nt!MiOffsetToProtos while parsing a malformed PE file. View the full article
  14. Microsoft Windows Kernel suffers from a TTF font processing win32k!ulClearTypeFilter pool corruption vulnerability in win32k.sys. View the full article
  15. WindowsSpyBlocker is an application written in Go and delivered as a single executable to block spying and tracking on Windows systems. The initial approach of this application is to capture and analyze network traffic based on a set of tools. It is open for everyone and if you want to contribute or need help, take a look at the Wiki. Telemetry and data collection To capture and analyze network traffic for the telemetry option, QEMU virtual machines are used on the server virtualization management platform Proxmox VE based on : Windows 10 Pro 64bits with automatic updates enabled. Windows 8.1 Pro 64bits with automatic updates enabled. Windows 7 SP1 Pro 64bits with automatic updates enabled. Traffic dumps are clean every day and compared with the current rules to add/remove some hosts or firewall rules. Changelog v4.24.1 Update hosts for extra rules Update IPs for extra, spy and update rules [Hidden Content]
  16. Is a project that will help you without tedious search and registration to download Windows operating systems, Office applications, language packs, and virtual machines directly from Microsoft servers. Download [hide][Hidden Content]]
  17. This Metasploit module uploads a payload and declares that it is the debug process to launch when a specified process exits. View the full article
  18. dEEpEst

    Windows 10 keys

    [Hidden Content]
  19. Windows 10 LPE (UAC Bypass) in Windows Store (WSReset.exe) Metasploit Module [Hidden Content] Powershell Code [Hidden Content] Code in C [hide][Hidden Content]]
  20. The RDP termdd.sys driver improperly handles binds to internal-only channel MS_T120, allowing a malformed Disconnect Provider Indication message to cause a use-after-free. With a controllable data/size remote nonpaged pool spray, an indirect call gadget of the freed channel is used to achieve arbitrary code execution. View the full article