Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      Protect Process

      Recommended Posts

      Staff

      VB.NET:

      Hidden Content

        Give reaction to this post to see the hidden content.

       

      C#:

      Hidden Content

        Give reaction to this post to see the hidden content.

       

      Share this post


      Link to post
      Share on other sites

      This only works with Win 7 and not after that.

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe
          Before obfuscation

          Hidden Content
          Give reaction to this post to see the hidden content. After obfuscation

          Hidden Content
          Give reaction to this post to see the hidden content. LoGiC.NET
          LoGiC.NET is a free and open-source .NET obfuscator that uses dnlib for folks that want to see how obfuscation works with more complex obfuscations than Goldfuscator for example.
          Current Features
              Renames methods, parameters, properties, fields, and events.
              Adds proxy calls.
              Encrypts strings.
              Encodes ints.
              Adds junk methods.
              Prevents application tampering.
              Adds control flow.
              And more!
          v1.5 : Protections update
              Added Control Flow
              Improved String Encryption
              Added Stripping DOS Header
              Improved code efficiency (i.e. analyzers)
              Added Anti-De4dot
              Improved Integer Encoding
              Removed String Length integer encoding
              Improved Renamer
              Updated to dnlib v3.3.2
          Warning : Expect the obfuscated assembly to break, since there are been new obfuscations and I haven't tested them on a lot of assemblies.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. A Beginner's Course on Reverse Engineering and Analyzing Malicious .NET and Java Executable Files
          What you'll learn
              Decompiling .NET and Java Binaries
              De-obfuscation of .NET and Java Code
              Analyzing .NET and Java Malware
              Detecting Malware Artifacts and Indicators of Compromise
              Using Flare-VM Malware Analysis Tools
              Disassembling .NET binary to IL language
              Decompiling .NET binary to C# or VBNET
              Static Analysis of .NET and Java Executable
              Dynamic Analysis and Debugging using dnSpy
              Setting up Malware Analysis Lab
              Analyzing Ransomware
              Analyzing Spyware Trojans and Info-Stealers
              Identifying Native Files vs .NET and Java Files
              Decompiling Java Bytecode to Java Source
              Reverse Engineering
              Analyzing Cross Platform RATs
              and more...
          Requirements
              Windows PC
              Interest in Malware Analysis
              Knowledge of C# and Java would be helpful
          Description
          New malware are being created everyday and poses one of the greatest threat to computer systems everywhere. In order to infect Windows, Linux and Mac OSX, malware authors create cross-platform malware using .NET and Java. This course will introduce you to the basics of how to analyze .NET and Java malware - one of the most common and popular ways to create cross platform malware. If you are a beginner just starting out on malware analysis and wish to gain a fundamental knowledge to analyze .NET or Java malware, then this course is for you. It is a beginner course which introduces you to the technique and tools used to reverse engineer and also analyze .NET and Java binaries.
          In this course, you will learn how to check and analyze malicious .NET and Java executables for signs of malicious artifacts and indicators of compromise. This is a beginners course and targeted to those who are absolutely new to this field. I will take you from zero to proficient level in analyzing malicious .NET and Java binaries. You will learn using plenty of practical walk-throughs. We will learn the basic knowledge and skills in reverse engineering and analyzing malware. All the needed tools and where to download them will be provided. By the end of this course, you will have the fundamentals of malware analysis of .NET and Java under your belt to further your studies in this field. Even if you do not intend to take up malware analysis as a career, still the knowledge and skills gained would enable you to check executables for dangers and protect yourself from these attacks.
          We will use Flare-VM and windows virtual machine. Flare-VM is a popular Windows based Malware Analyst distribution that contains all the necessary tools for malware analysis. All the essential theory will be covered but kept to the minimum. The emphasis is on practicals and lab exercises.
          Go ahead and enroll now and I will see you inside.
          Who this course is for:
              Anyone who has no background in malware analysis and just starting out in this field
              Hobbyist who just like to learn how to analyze .NET and Java malware
              Students who like to get started on the career path to become malware analysts
              Anyone eager to learn how to detect new malware
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Satoshi box ~ Sell your digital content for bitcoins

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Sharperner
          Sharperner is a tool written in CSharp that generates a .NET dropper with AES and XOR obfuscated shellcode. A generated executable can possibly bypass signature check but I can’t be sure it can bypass heuristic scanning.
          Features
          PE binary
              Process Hollowing
              PPID Spoofing
              Random generated AES key and iv
              Final Shellcode, Key, and IV are translated to morse code 🙂
          .NET binary
              AES + XOR encrypted shellcode
              APC Process Injection (explorer.exe)
              Random function names
              Random generated AES key and iv
              Final Shellcode, Key, and IV are translated to morse code 🙂

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.