Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      Protect Process

      Recommended Posts

      Staff

      VB.NET:

      Hidden Content

        Give reaction to this post to see the hidden content.

       

      C#:

      Hidden Content

        Give reaction to this post to see the hidden content.

       

      Share this post


      Link to post
      Share on other sites

      This only works with Win 7 and not after that.

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. REDasm – The Open Source Disassembler
          REDasm is an interactive, multiarchitecture disassembler written in modern C++11 using Qt5 as UI Framework, its core is modular and it can be easily extended in order to support new file formats and instruction sets.
          You can hack and improve REDasm without any issues and limitations.
          REDasm is under heavy development but it provides several interesting features:
              IDA-Like interactive listing.
              Multithreaded analysis.
              Graphing support.
              Project management.
              Signature engine.
              Cross-platform.
              Easy to use.
          Changelog v3.0 beta2
              Reimplemented cross references analysis
              Implemented Tensilica Xtensa and ESP32 support
              Added support for Xtensa ELF executables
              Implemented COFF plugin
              Improved build system
              Restored RDCommandPlugin (WIP)
              Fixed UI related APIs
              Minor fixes

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. REDasm – The Open Source Disassembler
          REDasm is an interactive, multiarchitecture disassembler written in modern C++11 using Qt5 as UI Framework, its core is modular and it can be easily extended in order to support new file formats and instruction sets.
          You can hack and improve REDasm without any issues and limitations.
          REDasm is under heavy development but it provides several interesting features:
              IDA-Like interactive listing.
              Multithreaded analysis.
              Graphing support.
              Project management.
              Signature engine.
              Cross-platform.
              Easy to use.
          Changelog v3.0 beta1
              New User Interface
              Brand new Disassembler Engine
              Plugin interface
              Plain C API
              C++17 Core
              Support for x86 and x86_64, ARM64 and MIPS architectures
              Support for PE, ELF, PSX and XBOX1 executables
              32 Bit MSVC RTTI support

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. English | 2020 | ISBN: 1484261798 | 379 Pages | PDF, EPUB | 3.31 MB
          Implement design patterns in .NET Core 3 using the latest versions of the C# and F# languages. This book provides a comprehensive overview of the field of design patterns as they are used in today’s developer toolbox. This new edition introduces topics such as Functional Builder, Asynchronous Factory Method, Generic Value Adapter, and new Composite Proxies, including one that attempts to solve the SoA/AoS problem.
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Description
          HyperDbg is designed with a focus on using modern hardware technologies to provide new features to the reverse engineering world. It operates on top of Windows by virtualizing an already running system using Intel VT-x and Intel PT. This debugger aims not to use any APIs and software debugging mechanisms, but instead, it uses Second Layer Page Table (a.k.a. Extended Page Table or EPT) extensively to monitor both kernel and user executions.
          HyperDbg comes with features like hidden hooks, which is as fast as old inline hooks, but also stealth. It mimics hardware debug registers for (read & write) to a specific location, but this time entirely invisible for both Windows kernel and the programs, and of course without any limitation in size or count!
          Using TLB-splitting, and having features such as measuring code coverage and monitoring all mov(s) to/from memory by a function, makes HyperDbg a unique debugger.
          Although it has novel features, HyperDbg tries to be as stealth as possible. It doesn’t use any debugging APIs to debug Windows or any application, so classic anti-debugging methods won’t detect it. Also, it resists the exploitation of time delta methods (e.g., RDTSC/RDTSCP) to detect the presence of hypervisors, therefore making it much harder for applications, packers, protectors, malware, anti-cheat engines, etc. to discover the debugger.
          Unique Features
          First Release (v0.1.0.0)
              Classic EPT Hook (Hidden Breakpoint) [link][link]
              Inline EPT Hook (Inline Hook) [link][link]
              Monitor Memory For R/W (Emulating Hardware Debug Registers Without Limitation) [link][link]
              SYSCALL Hook (Disable EFER & Handle #UD) [link][link]
              SYSRET Hook (Disable EFER & Handle #UD) [link][link]
              CPUID Hook & Monitor [link]
              RDMSR Hook & Monitor [link]
              WRMSR Hook & Monitor [link]
              RDTSC/RDTSCP Hook & Monitor [link]
              RDPMC Hook & Monitor [link]
              VMCALL Hook & Monitor [link]
              Debug Registers Hook & Monitor [link]
              I/O Port (In Instruction) Hook & Monitor [link]
              I/O Port (Out Instruction) Hook & Monitor [link]
              MMIO Monitor
              Exception (IDT < 32) Monitor [link][link]
              External-Interrupt (IDT > 32) Monitor [link][link]
              Running Automated Scripts [link]
              Transparent-mode (Anti-debugging and Anti-hypervisor Resistance) [link]
              Running Custom Assembly In Both VMX-root, VMX non-root (Kernel & User) [link]
              Checking For Custom Conditions [link][link]
              Script Engine [link][link][link]
              VMX-root Compatible Message Tracing [link]
              Powerful Kernel Side Scripting Engine [link][link]
              Event Forwarding (#DFIR) [link][link]
              Transparent Breakpoint Handler
              Various Custom Scripts [link]

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.