Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.


Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.


      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  

      Protect Process

      Recommended Posts



      Hidden Content

        Give reaction to this post to see the hidden content.



      Hidden Content

        Give reaction to this post to see the hidden content.


      Share this post

      Link to post
      Share on other sites

      This only works with Win 7 and not after that.

      Share this post

      Link to post
      Share on other sites
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. dnSpy is a tool to reverse engineer .NET assemblies. It includes a decompiler, a debugger and an assembly editor (and more) and can be easily extended by writing your own extension. It uses dnlib to read and write assemblies so it can handle obfuscated assemblies (eg. malware) without crashing.
              Open Source (GPLv3) and Free Forever (:TM:)
              Assembly Editor
                  Use C# or Visual Basic to edit any method, property and event
                  Code editor has IntelliSense (code completion, signature help, quick info)
                  Whole classes can be added to assemblies by adding C# and Visual Basic code
                  Edit all metadata of types (classes), methods, properties, events, fields
                  Add, remove, rename any type (class), method, property, event, field
                  Edit, add, remove .NET resources and save them to disk
                  The IL editor allows editing method bodies at the IL level: IL instructions, locals, exception handlers
                  Debug any .NET assembly, no source code required
                  Set breakpoints in any assembly, including framework assemblies, assemblies in the GAC and assemblies existing only in memory
                  Memory window
                  Output window
                  Attach to process
                  Locals window
                      raw contents of locals (eg. decrypted byte arrays) can be saved to disk
                  Call Stack window
                  Threads window
                  Modules window
                      Modules (eg. decrypted in-memory modules) can be saved to disk
                  Exception Settings
                  Can debug dynamic assemblies
                  Debugging CoreCLR assemblies is supported
              Decompile to C#, Visual Basic, IL
              Themes: blue, dark, light (and high contrast)
              Supports smaller screens (eg. laptops)
                  Line height can be optimized for smaller screens
                      Blank and non-alphanumeric lines are 75% the normal height
                      No extra spacing between lines (saves 1 vertical pixel per line)
                  Menu and toolbar share the same line
                  Full screen mode (Shift+Alt+Enter) saves some vertical pixels
              High DPI support and per-monitor DPI-aware
              Translated to several languages
              Highly extensible
                  Write your own extensions and add your own features
                  All major features are already extensions (assembly editor, debugger, decompiler)
              Multiple tabs and tab groups
                  Your screen is too big? Don’t cut it in half, add another vertical tab group and read two classes at once!
                  The tabs and positions within the text editors are saved when you close dnSpy and restored at startup so you can continue where you left off
              Search assemblies
                  Search for types (classes), methods, properties, events, fields
                  Search for strings or numbers in code
              Assembly analyzer
                  Find usages of types (classes), methods, properties, events, fields
              BAML to XAML decompiler
              Highlighted references, keywords
                  References under the caret are highlighted to make it easier to see all uses of the reference in the code
                  Tab, Shift+Tab, Ctrl+Shift+Up, Ctrl+Shift+Down moves to the next or previous reference
                  Alt+Down and Alt+Up moves to the next or previous definition (type (class), method, property, event, field)
              Structure visualizer
                  Vertical guide lines shown between start and end of code blocks
                  Different colors are used for different blocks, eg. loop, conditional, method, etc
              dnlib is used to read and write assemblies so it can handle obfuscated code (eg. malware) without crashing
              Go to commands:
                  Entry point
                  Assembly static initialization method (<Module>..cctor)
                  Any metadata token
                  Any metadata row
              Syntax highlighted tooltips with XML doc comments when hovering over a type (class), method, property, event, field
              Methods, properties and events are decompiled in source code order or a custom user-defined order
                  Source code order means that related methods are usually next to each other, just like the programmer wanted
              Background images can be shown in the text editor
              Export to project decompiles all selected assemblies and creates a Visual Studio solution
                  Multiple assemblies can be exported at the same time
                  Creates a Visual Studio solution (supports VS2005 – VS-latest) and project files
                  Supports WinForms and WPF classes (creates a code-behind .cs/.vb file and a WinForms .resx / WPF .xaml file)
                  Converts .NET resources to .resx files
              Open from GAC
              Command line decompiler
                  Supports Windows, Linux and Mac
                  Syntax highlights output to the screen
              Scripting with C# REPL
                  Call public dnSpy methods from scripts
                  Script the debugger and other extensions
              Hex editor
              Method tokens and addresses are shown in comments and can be clicked to go to the raw metadata or IL bytes
              Metadata editor
              Collapse Assembly Explorer nodes command to quickly collapse unused nodes
              And more…
          Changelog v6.2 RC1
          New features:
              dnSpy now runs under .NET 6 and .NET Framework 4.8.
              Move to VS2022 icons for UI and exe files (by @InKahootz and @SychicBoy)
              Support for tilt/horizontal scrolling in the UI.
              Added support for editing custom attributes on module resources.
              Added support for modifying the Log2Rid value when saving the module.
              Add support for ARM64 target architecture in the assembly editor.
              Add an enum for PE Magic field in the PE editor (by @riQQ)
              Show debugged process’s name in the title bar (by @InKahootz)
              Add support for writing VS2022 compatible .sln files.
              Added back the Save Code, Save BAML, and Save XAML options in the File context menu which save the contents of the currently open document tab.
                  Display a warning message before starting to debug a target file with a different bitness than the current dnSpy version running.
                  Add a new option that allows to automatically break on <Module>::.cctor when starting to debug.
                  Display the exception’s HResult property when an unhandled exception is hit.
              ILSpy decompiler:
                  Added jump to reference support for jmp() expressions created when the jmp CIL opcode is present.
                  CIL disassembler now includes information about generic parameter attributes and constraints.
                  Add more information to the output when disassembling the module node when using the CIL disassembler.
                  The decompiler now splits up long method call chains using a new line.
                  Generate debug info for yield break; statements.
          Improvements and bug fixes:
              Fix the .NET 6 console executable having the incorrect subsystem set in the PE options resulting in a crash.
              Fixed escaping of namespaces in tooltips.
              Fixed syntax highlighting for structs in tooltips.
              Improved RVA <-> FileOffset conversions in PE editor to fix a crash with invalid values being passed in.
              Improved assembly resolution for .NET Standard, .NET Core, .NET 5, .NET 6.
              Read probe paths from .config files when searching for satellite assemblies during project export.
              Fixed incorrect label in the Save Module dialog.
              ILSpy Decompiler
                  Optimized the variable naming step in the decompiler by reducing memory allocations.
                  Improved insertion of checked() blocks.
                  Improved decompilation of query expressions.
                  Prevent delegate construction decompilation from crashing the entire decompiler if it failed.
                  Improved analysis for unsafe modifier.
                  Ignore invalid prefixes when constructing the ILAst. This prevents a common method used to crash the decompiler from working.
                  Many improvements and fixes to the async method decompilation logic.
                  Optimized the removal of dead nop instructions when building the ILAst. This deficiency was a known method to crash dnSpy’s decompiler by filling a method body with huge amounts of useless code.
                  Fixed a rare case where field initializers would not be detected properly.
                  Fixed a rarely occurring bug that resulted in incorrect ILAst being built.
                  Optimized construction of ILAst by calculating the stack behavior of instruction only once and by caching the result of MethodDef.HasReturnType.
                  Improved required parenthesis analysis.
                  Fixed a bug that caused the infamous ??? exception to occur when debugging.
                  Improved debugging support for newer mono runtimes.
                  Fixed a crash that occurred in the .NET Framework version of dnSpy when a module loaded into memory during debugging would contain an invalid file path resulting in a crash.
              BAML decompiler
                  Resolve namespaces of properties.
                  Fix Name attribute for properties incorrect in rare circumstances.
                  Fix missing x:Static and x:Type (by @wwh1004)
          Dependency updates:
              Updated dnlib to 3.5.0
              Updated Iced to 1.17.0
              Roslyn compiler to 4.1.0
              Ookii.Dialogs.Wpf to 5.0.1
              VS MEF to 16.9.20
              ILSpy to 2.4
              Mono.Debugger.Soft was updated to the latest commit.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Pro tip: For enabling the primitive emulation bypass or "Anti Memory Scanner", remove the " ' " in line 537 in source.txt.
          Its functionality is pretty simple, some strings are not encoded so you can do it, this will prevent the source from getting detected too fast.
          Used themes:
          -Knight theme by byEarn (HF)
          -Meth Theme by Mephobia (HF)
          All (optional) functions:
          - Evade AV detections
          - Add Icon
          - Add Antis [SandboxieRpcSs, VBoxTray, VBoxService, vmtoolsd, Procmon64, Procmon, ProcessGovernor, ProcessLasso,ProcessHacker, Taskmgr]
          - Copy Temp => the process copies its file to the temp folder and restarts at the new location
          - Delay => delays the execution of your testing "payload", to bypass some other av detection techniques or just delays the execution (maybe detected)
          - Autostarts
          - Registry => writes a registry key so your program will automatically starts with your system
          - Autostart => copies the file into the autostart folder from the current user.
          - File Info => Set the information you can see in the properties.
          =>Anti Emulation : will prevent runtime detections
          =>USG : changes many variable names to evade detection trough static string names
          =>Dynamic Editing : only functions that are enabled will be added into the sourcecode of the source.txt
          =>Gen Properties : I will present you way of saving data, with this easy trick, gets less detected than simple functions that are returning anything...

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. A powerful high quality dork generator.
              Parallel execution and fast speed
              High Quality Dorks
              Efficient self-made scraper bot for scraping from the most used word generator website randomwordgenerator.com
              Advanced usage mechanics
              Add your own dorks

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Free utility to convert your logs from JSON format to NETSCAPE format.
          The program works with logs, specify the path to the logs and at the output you get the initial cookies in JSON format overwritten already in Netscape format.
          I also attach the source code, you can finish it for yourself or just be useful to someone.

          Hidden Content
          Give reaction to this post to see the hidden content.