Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      Protect Process

      Recommended Posts

      Staff

      VB.NET:

      Hidden Content

        Give reaction to this post to see the hidden content.

       

      C#:

      Hidden Content

        Give reaction to this post to see the hidden content.

       

      Share this post


      Link to post
      Share on other sites

      This only works with Win 7 and not after that.

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Description
          Network protection is vital to organizations big and small, but it doesn’t have to be an expensive proposition. Learn how to protect your network with open-source tools, and do it completely free. Jungwoo Ryoo shows how to set up firewalls, investigate network traffic with a packet analyzer, detect threats and malicious activity with an intrusion-detection system, and enable network logging and monitoring. Start here for a low-cost route to a more secure network.
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By scrack
          The source code of the new banking Trojan DEFENSOR ID.

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.  
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. .NET Reactor
          Unmatched .NET code protection system which completely stops any decompiling. Protect your software in a safe and simple way without worrying how to protect your intellectual property.
          What is .NET Reactor?
          .NET Reactor is a powerful code protection and software licensing system for software written for the .NET Framework, and supports all languages that generate .NET assemblies. Its' main features are :
              Intellectual property protection
                  NecroBit Protection
                  Native Code generation
                  Code Virtualization
                  Obfuscation
                  Control Flow Obfuscation
                  Hide Method Calls (dynamic proxy)
                  String Encryption
                  Anti Tampering
                  Anti Debugging
                  Resource Encryption and Compression
                  Dependency Merging
                  Protects full applications and libraries (dlls)
              Powerful licensing system
                  Create trial versions of your software
                      Set an expiration date
                      Limit use to a fixed number of days after installation
                      Limit by number of uses
                      Limit to use for no more than a set number of minutes each invocation
                      Limit trial version functionality
                  Easily turn your trial version into a fully licensed version
                  License your software
                      Permanently (non expiring license)
                      By time period (i.e rent your software)
                      By number of uses (i.e software as a service)
              Software development kit
                  Integrate license checking into you assembly and extend licensing fuctionality
                  Extend licensing functions with bespoke extensions.
              Deployment
                  Create .NET Core single file application bundles
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. RAT-el is an open-source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software.
          Features
          RATelServer:
              Multiple Connections
              Broadcast commands to all clients
              Stores client information in the database
              Encryption of data on the network via XOR
              Token management system to identify clients
          Client:
              Encryption of data sent over the network
              Startup persistence
              Remote command execution via CMD
              Remote command execution via Powershell
              Encryption of data on the network via XOR
              Automatic persistence when running the client
              Automatic reconnection
          RATelGenerator:
              Automatic client compilation

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Bruto Crypt
          Oldschool-style crypter with flashy graphics. Used to run a .NET executable in memory through a C++ stub. Tested with Quasar-Rat and works fine.
          Notes
          Doesn't actually encrypt your .NET executable yet, just puts it raw in native resources of the stub.
          Usage
              Compile the C++ stub
              Compile the C# Crypter
              Copy InstallUtil.exe (stub) to a folder with the crypter bin called Stub/InstallUtil.exe
              Start the crypter
              Crypt any .NET executable
              ???????
              [email protected]

          Hidden Content
          Give reaction to this post to see the hidden content.