Search the Community

Showing results for tags 'windows'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 246 results

  1. WindowsSpyBlocker is an application written in Go and delivered as a single executable to block spying and tracking on Windows systems. The initial approach of this application is to capture and analyze network traffic based on a set of tools. It is open for everyone and if you want to contribute or need help, take a look at the Wiki. Telemetry and data collection To capture and analyze network traffic for the telemetry option, QEMU virtual machines are used on the server virtualization management platform Proxmox VE based on : Windows 10 Pro 64bits with automatic updates enabled. Windows 8.1 Pro 64bits with automatic updates enabled. Windows 7 SP1 Pro 64bits with automatic updates enabled. Traffic dumps are clean every day and compared with the current rules to add/remove some hosts or firewall rules. Tools used to capture traffic : qemu -net dump: capture Wireshark: capture + logs Sysmon: capture + logs Proxifier: logs All traffic events are available in the logs folder : *-hosts-count.csv: number of events per host *-unique.csv: the first trigger of an event per host/process/destination port The data folder contains the blocking rules based on domains or IPs detected during the capture process : data/<type>/winX/spy.txt : Block Windows Spy / Telemetry data/<type>/winX/update.txt : Block Windows Update data/<type>/winX/extra.txt : Block third-party applications Firewall and Hosts data are the main types. The others are generated from these as : DNSCrypt: a protocol for securing communications between a client and a DNS resolver. OpenWrt: an open-source project used on embedded devices to route network traffic. P2P: a plaintext IP data format from PeerGuardian. Proxifier: an advanced proxy client on Windows with a flexible rule system. simplewall: a simple tool to configure the Windows Filtering Platform (WFP). And about data collection, you can read the Telemetry collection page for more info. Changelog v4.37.1 Fix windows.WaitStatus handling (#379) [hide][Hidden Content]]
  2. SpoolSploit A collection of Windows print spooler exploits containerized with other utilities for practical exploitation. Summary SpoolSploit is a collection of Windows print spooler exploits containerized with other utilities for practical exploitation. A couple of highly effective methods would be relaying machine accoun [hide][Hidden Content]]
  3. Evil-WinRM This shell is the ultimate WinRM shell for hacking/pentesting. WinRM (Windows Remote Management) is the Microsoft implementation of the WS-Management Protocol. A standard SOAP-based protocol that allows hardware and operating systems from different vendors to interoperate. Microsoft included it in their Operating Systems in order to make life easier to system administrators. This program can be used on any Microsoft Windows Servers with this feature enabled (usually at port 5985), of course only if you have credentials and permissions to use it. So we can say that it could be used in a post-exploitation hacking/pentesting phase. The purpose of this program is to provide nice and easy-to-use features for hacking. It can be used with legitimate purposes by system administrators as well but most of its features are focused on hacking/pentesting stuff. Features Command History WinRM command completion Local files completion Upload and download files List remote machine services FullLanguage Powershell language mode Load Powershell scripts Load in memory dll files bypassing some AVs Load in memory C# (C Sharp) compiled exe files bypassing some AVs Colorization on output messages (can be disabled optionally) Changelog v3.3 Fixed missing output messages for Invoke-Binary Extracted AMSI bypass from the menu to avoid menu problems due to M$ AV signatures Dynamic AMSI bypass implemented to avoid AV signatures [hide][Hidden Content]]
  4. itsMe

    Windows Memory Cleaner v1.1

    This is a RAM cleaner. There are times when programs do not release the memory they used, making the machine slow, but you don’t want to restart the system to get the used memory back. This is where you use Windows Memory Cleaner to clean your memory, so you can carry on working without wasting time restarting your Windows. [Hidden Content]
  5. itsMe

    Wing IDE Pro 8.0.3 Windows

    Wing Python IDE was designed from the ground up for Python, to bring you a more productive development experience. Get More Done Type less and let Wing worry about the details. Get immediate feedback by writing your Python code interactively in the live runtime. Easily navigate code and documentation. Write Better Code Avoid common errors and find problems early with assistance from Wing's deep Python code analysis. Keep code clean with smart refactoring and code quality inspection. Find Bugs Faster Debug any Python code. Inspect debug data and try out bug fixes interactively without restarting your app. Work locally or on a remote host, VM, or container. [Hidden Content] [hide][Hidden Content]]
  6. A windows malware with complete different nature which allows you to bypass Windows Defender security. It uses http request and gives you Command Prompt/Powershell access. Last FUD check was April,2021 .. I hope It is still undetectable by AVs. [hide][Hidden Content]]
  7. WinObjEx64 is an advanced utility that lets you explore the Windows Object Manager namespace. For certain object types, you can double-click on it or use the “Properties…” toolbar button to get more information, such as description, attributes, resource usage etc. It let you view and edit object-related security information if you have required access rights. System Requirements WinObjEx64 does not require administrative privileges. However administrative privilege is required to view much of the namespace and to edit object-related security information. It works only on the following x64 Windows: Windows 7, Windows 8, Windows 8.1 and Windows 10 (TH1, TH2, RS1, RS2), including Server variants. WinObjEx64 does not work on Windows XP, Windows Vista is partially supported and has no plans for their full support. In order to use all program features Windows must be booted in the DEBUG mode. Changelog v1.9.1 21h2 compatibility improvements rtls updated [hide][Hidden Content]]
  8. SterJo Startup Patrol v.1.6 How many times did you ask yourself why is your computer slow? Waiting too long for Windows registry can be frustrating sometimes, especially if you're in a rush and need to quickly do something on your slow PC. If it happens too often, there is an easy solution of speeding up your PC and helping it work faster then ever! The solution for this annoying problem is SterJo Startup Patrol, free Startup management tool for Windows which can really speed up your PC. Why is my computer slow? The reason why your computer is slow is probably in software you've installed or some registry errors. Those software are maybe causing delay and slowing your PC. If you have too many applications which are set to automatically launch at startup, the longer will be your Windows registry. And the longer you will have to wait for startup programs to start working. Download the SterJo Startup Patrol to help your computer work faster. Version History Version 1.6: Minor changes and now playing alert sound for new entries. [hide][Hidden Content]]
  9. Stealers (Windows only) All scripts are independent of each other. [hide][Hidden Content]]
  10. Learn Windows PowerShell by hands on practice exercises | A Short & Crisp Introduction to Scripting. What you'll learn Full of hands-on instructions, interesting and illustrative examples, clear explanations Learn an important and mandatory skill for Windows Server Administration Introduction to scripting world using Windows PowerShell scripting Introductory concepts of PowerShell Requirements Some basic understanding of command line (Win CMD/Unix Shell) will help quickly picking up PC/Laptop installed with Windows OS. You should be able to use PC/laptop comfortably. Description This course is designed to take the system administrators to an advanced level and make them more efficient at their work. You will find ways to automate your daily work using the advantages of Windows PowerShell scripting. PowerShell is a cross-platform task automation solution made up of a command-line shell, a scripting language, and a configuration management framework. PowerShell runs on Windows, Linux, and macOS. This course is a short & crisp introduction to those who do not have any prior knowledge of scripting or any programming basics. The instructor has tried to explain the concepts in such a simple terminology that even non-technical people will find very easy to grasp the various PowerShell concepts. The course is intended to make people think in terms of automating small daily tasks using PowerShell and improve work efficiency and then gradually move towards complex logical tasks. Once you have completed this course, you will be should be able to use even the modules which are not part of our discussion. Topics which may not be Windows PowerShell concepts but are important for developing PowerShell understanding are included which comes as bonus. Important Content: Why Automation How Launch PowerShell as Admin and Non-Admin What is Execution Policy PowerShell Help PowerShell File Read Operations PowerShell , Windows PowerShell , Microsoft scripting language PowerShell Modules Introduction & Benefits Who this course is for: Anyone who is working in IT and uses Windows Operating System Aspirants seeking carrier in IT Automation [Hidden Content] [hide][Hidden Content]]
  11. IDA Version 7.6 Enjoy your IDA Pro with many new features and enhancements including: Apple Silicon support Golang analysis RISC-V and RL78 UI and Decompilers improvements And much more! Today, Hex-Rays announces the release of Service Pack 1 (SP1) for IDA 7.6. We are glad to announce the release of IDA 7.6 Service Pack 1 today! This Service Pack is primarily a bug fix release for a few errors that might affect some users. See what’s new [Hidden Content] [Hidden Content] Tools [hide][Hidden Content]]
  12. Create fake certs for binaries using windows binaries and the power of bat files Over the years, several cool tools have been released that are capeable of stealing or forging fake signatures for binary files. All of these tools however, have additional dependencies which require Go,python,... This repo gives you the opportunity of fake signing with 0 additional dependencies, all of the binaries used are part of Microsoft's own devkits. I took the liberty of writing a bat file to make things easy. So if you are lazy like me, just clone the git, run the bat, follow the instructions and enjoy your new fake signed binary. With some adjustments it could even be used to sign using valid certs as well ¯\(ツ)/¯ [hide][Hidden Content]]
  13. [hide][Hidden Content]]
  14. imyPass Windows Password Reset The best solution to reset/remove the forgotten Windows password and delete/create a Windows account. imyPass Windows Password Reset – Secure & Trustworthy It must be a disaster to find that you have lost your Windows password and cannot access your Windows PC. To enter your computer, what you need is a reliable Windows password cracker to recover your password without any data loss. [Hidden Content] [hide][Hidden Content]]
  15. Evil-WinRM This shell is the ultimate WinRM shell for hacking/pentesting. WinRM (Windows Remote Management) is the Microsoft implementation of the WS-Management Protocol. A standard SOAP-based protocol that allows hardware and operating systems from different vendors to interoperate. Microsoft included it in their Operating Systems in order to make life easier to system administrators. This program can be used on any Microsoft Windows Servers with this feature enabled (usually at port 5985), of course only if you have credentials and permissions to use it. So we can say that it could be used in a post-exploitation hacking/pentesting phase. The purpose of this program is to provide nice and easy-to-use features for hacking. It can be used with legitimate purposes by system administrators as well but most of its features are focused on hacking/pentesting stuff. Features Command History WinRM command completion Local files completion Upload and download files List remote machine services FullLanguage Powershell language mode Load Powershell scripts Load in memory dll files bypassing some AVs Load in memory C# (C Sharp) compiled exe files bypassing some AVs Colorization on output messages (can be disabled optionally) Changelog v3.2 Fixed minor duplicated code problem Dockerfile improvements Amsi bypass update [hide][Hidden Content]]
  16. itsMe

    Windows 11 UX Pack 1.0

    Windows 11 UX Pack – The program will theme your Windows 10 desktop with Windows 11 Light/Dark themes, wallpapers, sound effects and more. Features • Instantly dress up Windows 10 with Windows 11 user experience in one minute • Seamless installation and uninstallation giving user’s confidence and security in system • Easily configurable in single click with intelligence Metro UI design • Windows 11 Light/Dark themes, wallpapers, and sound effects • Centered taskbar items with TaskbarX [hide][Hidden Content]]
  17. go-shellcode is a repository of Windows Shellcode runners and supporting utilities. The applications load and execute Shellcode using various API calls or techniques. [hide][Hidden Content]]
  18. The Most Comprehensive iPhone and iOS Data Recovery Solution You May Ever Find The Most Reliable Android Data Recovery Tool Saves All Your Indispensable Data & Files [Hidden Content] [Hidden Content]
  19. Windows 11 will only run on PCs that meet the minimum requirements. Windows 11 Compatibility Check quickly analyzes your hardware and reports possible issues. This includes TPM (trusted platform module) as well as all installed or connected components and relevant configurations. The following hardware components and configurations will be inspected: CPU, RAM, hard disk, display resolution, graphics card, DirectX, WDDM, TPM, UEFI, SecureBoot. If your PC fails in any of these categories, you'll be notified along with possible fixes. Ashampoo Windows 11 Compatibility Check is the fast and user-friendly Ashampoo Windows 11 compatibility checker for everyone. The program will be constantly updated to reflect the latest requirements so you'll always be on the safe side. [hide][Hidden Content]]
  20. Evil-WinRM This shell is the ultimate WinRM shell for hacking/pentesting. WinRM (Windows Remote Management) is the Microsoft implementation of the WS-Management Protocol. A standard SOAP-based protocol that allows hardware and operating systems from different vendors to interoperate. Microsoft included it in their Operating Systems in order to make life easier to system administrators. This program can be used on any Microsoft Windows Servers with this feature enabled (usually at port 5985), of course only if you have credentials and permissions to use it. So we can say that it could be used in a post-exploitation hacking/pentesting phase. The purpose of this program is to provide nice and easy-to-use features for hacking. It can be used with legitimate purposes by system administrators as well but most of its features are focused on hacking/pentesting stuff. Features Command History WinRM command completion Local files completion Upload and download files List remote machine services FullLanguage Powershell language mode Load Powershell scripts Load in memory dll files bypassing some AVs Load in memory C# (C Sharp) compiled exe files bypassing some AVs Colorization on output messages (can be disabled optionally) Changelog v3.0 Remote files/directories autocomplete feature (Thanks to arale61) Added option to log commands and outputs to a log file (Thanks to Borch Cañavate) [hide][Hidden Content]]
  21. Gray Windows Keylogger 2 is gmail keylogger which can generate small windows executable file as well as dll. On clicking this file, it will load and start capturing keyboard keystrokes and send it via gmail you provided. Features Capture keystrokes and save it temp directory in a file Auto Startup as system starts Low size + Low memory/CPU consompsion It sends files to gmail as attachment Added Stealth mode (hides after running) Run only when any keyboard key is pressed [hide][Hidden Content]]
  22. itsMe

    Get Windows 11 v1.0.0.0

    Description This is a simple and straightforward tool that enables you to grab a copy of a verified Windows 11 build leak so that you can check out the new OS. It is an open-source, lightweight tool designed to help you directly download the leaked Windows 11 build safely. It comes with a simple, small window interface that displays the two steps needed to grab your Windows 11 copy. Simply put, first you need to specify a destination folder and afterward click the dedicated download button. It is worth mentioning that once you select the destination, the app immediately displays the required and available space. Essentially, you need to have at least 5GB of free space for the download and, of course, more than that to install and run the new Windows OS. Features Simple and straightforward tool Download the leaked Windows 11 build safely Simply select the destination directly and you are set Small window interface Easy to use [hide][Hidden Content]]
  23. Safeguard your network and websites with Kali Linux by identifying vulnerabilities and tackling them on Windows platform What you'll learn Detect vulnerable ports and learn how to exploit them Pentest your website and hack data with different types of attacks Crack passwords to gain elevated access to resources Exploit well-known Windows vulnerabilities. Create persistent access to an exploited machine and maintain a stable backdoor. Collect valuable information from the exploited host. Requirements Basic understanding of penetration testing would be an advantage Description Kali Linux is the premier platform for testing and maintaining Windows security. Managing Windows security has always been a challenge for any security professional. As Windows is the most popular operating system in the corporate environment, this course will help you detect and tackle attacks early to save your organization data and money. With this practical course, you will start off with learning how to gather information about the target network and websites to discover all the vulnerable ports. Once you find the necessary info, you’ll learn to bypass security restrictions using exploitation tools to access the target system, hack websites using various pentesting tools. Moving further you'll be mastering master various exploitation and post exploitation techniques such as Pass-The-Hash techniques. By the end of this video tutorial, you will be able to successfully identify and tackle the flaws and vulnerabilities within the Windows OS (versions 7, 8.1, 10) using Metasploit and Kali Linux tools & collect valuable information from the exploited host. Contents and Overview This training program includes 2 complete courses, carefully chosen to give you the most comprehensive training possible. The first course, Learning Windows Penetration Testing Using Kali Linux you’ll start by gathering information about the target network and websites to discover all the vulnerable ports. Moving on, you’ll learn to bypass security restrictions using exploitation tools to access the target system. Also, you’ll hack websites using various pentesting tools and learn how to present your test reports. By the end of the course, you’ll be able to find, exploit, and prevent security vulnerabilities in Windows OS using Kali Linux. The second course, Practical Windows Penetration Testing will follow a typical penetration test scenario throughout. At each stage, you will be shown all the necessary tools and techniques, and how they are applied. The whole course is hands-on to guarantee that you gain practical knowledge. You will start by setting up the environment and learn service identification and network scanning techniques. You will master various exploitation and post exploitation techniques. You will also learn to proxy traffic and implement the most famous hacking technique: the pass-the-hash attack. By the end of this video tutorial, you will be able to successfully identify and tackle the flaws and vulnerabilities within the Windows OS (versions 7, 8.1, 10) using Metasploit and Kali Linux tools. About the Authors: Taking education on security to a completely new level, Angelique Keyter is devoted to making a difference in the world of cybercrime. She has numerous years of hacking and lecturing behind her and focuses her time on making a difference in her community and teaching people how to fight an unseen criminal. Angelique is a certified hacker, Linux professional, and Microsoft solutions expert with more than 20 years of experience. She is a mother of twins and spends a lot of time studying new things and learning new concepts. She believes that you are never too old to learn. She has a passion for gaming and geeky stuff from hacking to robotics to forensic psychology. She is a focused person with a witty sense of humor, always ready to help or play football with her boys. Gergely Révay, the instructor of this course, hacks stuff for fun and profit at Multinational Corporation in Germany and in the USA. He has worked as a penetration tester since 2011; before that, he was a quality assurance engineer in his home country, Hungary. As a consultant, he did penetration tests and security assessments in various industries, such as insurance, banking, telco, mobility, healthcare, industrial control systems, and even car production. Who this course is for: This course is for IT professionals, security enthusiasts, and security professionals who are willing to learn how to find, exploit, and prevent security vulnerabilities in Windows OS using Kali Linux as well as penetration testing on the Windows platform. [Hidden Content] [hide][Hidden Content]]
  24. WinObjEx64 is an advanced utility that lets you explore the Windows Object Manager namespace. For certain object types, you can double-click on it or use the “Properties…” toolbar button to get more information, such as description, attributes, resource usage etc. It let you view and edit object-related security information if you have required access rights. Changelog v1.9 added Section object structured dump added ALPC port connections list (similar to !alpc /lpc windbg command) added MmUnloadedDrivers list added ExCreateCallback list to the callbacks list (PR #26) updated ApiSet plugin now support in place search filter internal rearrange [hide][Hidden Content]]
  25. MsfMania is a command-line tool developed in Python that is designed to bypass antivirus software on Windows. Free version features Polymorphic C/C++ source code. x86/x64 staged/stageless windows payload meterpreter/shell. LocalThread Injection CreateRemoteThread Injection ThreadHijacking Injection XOR encryption-based key length. Sandbox/Antivirus Evasion. Junkcode. Run as Administrator. Executable customizable with an icon. Cross-compiler MinGW. Strip executable. Rar compression. Autorun Metasploit config Sign executable with a spoofed certificate UPX Packer FUD [hide][Hidden Content]]