Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      Tutorial On modding Level 0 For beginners

      Recommended Posts

      Staff

      The antivirus software uses two methods to protect our PC: 1 - Analyze the files comparing them with the database of malicious software (Signatures) would be like a police reconnaissance wheel or when trying to identify a criminal with a photo: The antivirus compares each file on the hard drive with a "dictionary" of known viruses. If any piece of code (signatures) in a file on the hard drive matches the virus known in the dictionary, the antivirus software comes into play and 2 the constant monitoring of the behavior of files that may be infected. 


      For example 

      Seeing it from Binary, let's suppose that for Avast this code is a virus signature "12 55 40 05" when analyzing the binary and find this: 

      Hidden Content

        Give reaction to this post to see the hidden content.


      Automatically Skip as a virus 


      Av Fucker Method 

      With this method we will look for the signature and we will change its code so that Avast or any antivirus does not recognize it anymore 


      Code detected as virus 

      Hidden Content

        Give reaction to this post to see the hidden content.



      Modified code indented 

      Hidden Content

        Give reaction to this post to see the hidden content.



      It's simple right? the issue is that when we modify one of those numbers (offset) it has to be functional 


      Let's see it Step by step 


      Step 1 tools 

      Undetectable offset locator 2.6 (is that I use but can be any locator) 
      Hex Workshop 
      This Crypter: LVL23 Crypter
      I used this little ball: LVL23 Ball

      Step 2 

      We grab the crypter and encrypt a small ball 

      Step 3 


      We open in offset locator and in "file" we choose the ball and in "directory" the folder where we will create the offsets (Create a new folder and call it offsets) in initial bytes we put "100" and fill in the number "90" 

      Hidden Content

        Give reaction to this post to see the hidden content.


      It would have to stay more or less ASi 

      Hidden Content

        Give reaction to this post to see the hidden content.


      We start and wait for it to finish creating the offset ... When finished we scan the offset folder with Avast and delete the detected ones 

      Step 4 

      Let's show offset 

      Hidden Content

        Give reaction to this post to see the hidden content.


      and we double click on the range that appears 2370 - 2410 

      now the locator will stay like this 

      Hidden Content

        Give reaction to this post to see the hidden content.


       

      Share this post


      Link to post
      Share on other sites
      Staff

      We delete all the files in the offsets folder and we give it again to start then we scan with Avast the offsets folders delete the detected ones and we would have these offsets 

      Hidden Content

        Give reaction to this post to see the hidden content.




      We click to show offsets again 


      Hidden Content

        Give reaction to this post to see the hidden content.



      And we chose the rank 2370 - 2410 

      the locator will remain like this: 

      Hidden Content

        Give reaction to this post to see the hidden content.


      We delete the files of the offset press and start again ... scan with avast ... we delete the detected ones 

      and we have these offsets 

      Hidden Content

        Give reaction to this post to see the hidden content.


      When we are 1 byte 

      we must try what works ... 

      We open the first 2380 

      And ... Perfect works 

      Hidden Content

        Give reaction to this post to see the hidden content.


      How do we know if it works? if you have to open the little ball that we encrypt ... 

      Step 5 

      We open the hex workshop 
      We open the stub 
      Right button 
      Goto 
      offset 
      and we put the one that was functional 2380 

      Hidden Content

        Give reaction to this post to see the hidden content.



      We change the number that appears in that offset by the number that we put in "fill in" 

      Hidden Content

        Give reaction to this post to see the hidden content.


      Hidden Content

        Give reaction to this post to see the hidden content.


      And we save File Save as ... 

      Stub modifica.exe 

      We scanned the stub and .... 


      Hidden Content

        Give reaction to this post to see the hidden content.



      Well this is the most basic if you have questions ask ... in a few days we move ...

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Students of computer and electrical engineering may often take a course that educates them about computer networks and OSI levels.
          What you’ll learn
              The Seven OSI Layers in Computer Networks: Detailed Functionalities
              The networking equipment consists of hubs, switches, routers, etc.
              The Foundational Ideas of Switching and Routing
              The OSI/TCP-IP model’s application layer positions
              The OSI/TCP-IP model’s presentation layer position
              tasks at the session layer in the OSI/TCP-IP paradigm.
              The OSI/TCP-IP model’s transport layer position
              The OSI/TCP-IP model’s network layer position
              Jobs in the OSI/TCP-IP model’s MAC/DLL layer
              Jobs at the physical layer of the OSI/TCP-IP paradigm
          Requirements
              Who has a genuine interest in learning about computer networks?
              Basic understanding of computer systems.
              No prior knowledge of coding or programming is necessary.
              To achieve your objectives more quickly, show commitment and dedication.
          Description
          A Beginner’s Guide to Computer Networks
          An increasing trend is computer networks. The majority of the sites you visit on a regular basis, including your house, school, and workplace, have them. In this course, you will learn the fundamentals of computer networking. You should specifically reach the following benchmarks:
          Recognize the networks that are all around you.
          You will also comprehend a sizable portion of the IT world if you start recognizing networks all around you. You’ll discover many things, including how the Internet operates, how your Internet Service Provider (ISP) enables you to connect online, how data is shared without a connection to the Internet, and much more. Learning about computer networks is the first step in anything.
          Study Network Configuration.
          Setting up a network is a skill that is highly valuable nowadays, whether you are taking this course to better yourself, to earn a higher grade at school, or for a job. However, a lot of individuals lack the necessary skills. In a few minutes, you have the chance to learn it.
          Learn how to keep yourself safe while using a network, such as the Internet.
          Nobody wants their passwords, photos, papers, credit card information, or online activity to be shared without their consent. But as more people use computer networks, the concept of privacy is fading into obscurity. This training assists you in safeguarding your online identity as well as the network at your house or place of business.
          Who is this course for?
              Anyone who wants to learn the most important concepts of Computer Networks
              A person who just wants to learn how the Internet works
              Anyone who is studying for their Computer Network exam.
          What will you learn?
          You will study the key ideas in computer networking, as I said previously. The specific subjects are:
              various network types (size, topology).
              Computer networks use cables.
              TCP/IP structure
              Model ISO/OSI
              (addresses and routing) HTTP protocol
              How TCP & UDP Operate and What They Do
              management of TCP connections.
          What supplies do I require?
          You simply need an internet connection and a computer or smartphone to take this course. Additionally, you can always get in touch with me if you have questions or need assistance. I often reply within a day. You will get a certificate of completion at the conclusion of this course. Something you might include in your linked profile or CV.
          Who this course is for:
              Students of computer engineering
              Electrical engineering students
              Students of Telecommunication Engineering
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Description
          If you are completely new to Cutter and want to get up and running fast then this course is for you. In this course, we will cover how to use Cutter for Windows and Linux. Cutter is an an advanced, GUI-based, free and open-source reverse-engineering platform designed to take the pain out of radare2. It’s backend is running Rizin, a fork of the radare2 engine. Cutter is created by reverse engineers for reverse engineers. Cutter releases are fully integrated with native Ghidra decompiler.  Not only can Cutter disassemble a binary file, but it can also decompile it to C language. It also has a linear disassembly view, fully featured graph view as well as mini-graph for fast navigation. Cutter also features the ability to reverse debug which other debugger lacks. This feature allows you to not only step forwards, but you can also step backwards!  Cutter also has hexdumps and stack view which allows you to trace stack, register and inspect memory on the fly.  In addition to that, you can also patch the binary, by reversing jumps, modifying instructions and bytes. This course will teach you all of the above and more.
              Designed with beginners in mind.
              Simple windows and Linux Crackme’s designed to learn reverse engineering legally
              Practical and hands-on
              Using free tools only
          Suitable for:
              Reverse Engineering and Malware Analysis Students
              Anyone interested to learn to use Cutter for Reverse Engineering
              Security researchers
          Prerequisite:
              Windows PC
              Basic Assembly and C/C++ language would be helpful but not mandatory
              Familiarity with basic Linux commands would be useful but not mandatory
              Everything you need to know is covered in the course
          Enroll now and I will see you inside!
          Who this course is for:
              Anyone interested to learn to use Cutter for Reverse Engineering
              Reverse engineering and malware analysis students
              Security researchers
          Requirements
              Basic Assembly Language , C Programming
              Windows PC
              Basic Linux commands
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. This PHP course teaches PHP to beginners most quickly and straightforwardly possible using real-world projects.
          What you’ll learn
              The foundations of the PHP programming language will be covered.
              You’ll get knowledge about how to use a MySQL database.
              You’ll observe. Learn PHP’s XML support.
              Recognize how to build your PHP-driven website.
              You’ll learn how to use PHP and MySQL to build practical applications.
              You’ll discover MySQL.
              Global variables in PHP will be covered.
              You’ll learn how to troubleshoot your program.
              You’ll pick up the skill of refactoring code.
              You’ll pick up database use skills.
              You’ll learn how to input data into databases using forms.
              You’ll get knowledge about PHP security.
              Password hashing will be covered.
              By working on the project, you will get expertise in using bootstrapping.
              You will get debugging skills (fix your code).
          Requirements
              Since I will teach you all you need to know to begin developing PHP scripts, you don’t need any previous programming knowledge.
          Description
          Do you want to learn PHP and MySQL as quickly and easily as possible? If so, this course is right for you. This course may be quite helpful for anybody seeking to learn PHP. The subjects I covered, clarified, and simplified in this course are all those that I recorded while I was learning PHP and where, as a novice, I had trouble understanding how this program worked in those particular areas. Without a shadow of a doubt, this course will provide you with a strong PHP foundation.
          I make a commitment to you that this course will always be in development, which means I’ll be adding new lectures and updating it often. This program will never get monotonous. Let’s now discuss developing initiatives. We’ll develop not just one, but several initiatives, and the cycle will repeat. My goal is to complete this course in 100 hours. I have high hopes that you will find this course very simple to comprehend. As I said before, I was once a novice myself, and I am aware of the specific places where beginners have problems.
          Why PHP?
          The most widely used website programming language worldwide is PHP. Web applications are often built using the PHP and MySQL combo, and developers with these essential abilities are in great demand. In this course, you will learn how to develop web apps in PHP that use the MySQL database.
          In this course, what will you learn?
          You will gain knowledge of code security, and write reusable, more maintainable code by utilizing programming standards, and object-oriented programming approaches as you go.
          Along with these topics, you’ll learn how to design your website with MD Bootstrap, add code from third-party sources, store data in a relational database and use it from PHP code, and more.
          The course covers every step in detail, from setting up a web server and editor on your PC to creating the code for your web app. In the end, this course will teach you the basic skills you need to be a good PHP programmer.
          Why this course?
          Having said that, every lesson in this course is incredibly simple to follow and includes a real-world example, so you’ll be able to grasp every aspect of PHP with ease. As a programming teacher, my main goal is to make computer programming easy enough that anyone can start learning it, even if they have never done it before. This gives them the unique and privileged chance to change or improve their career path.
          However, it doesn’t matter if you’ve never used a programming language before; in this course, I’ll teach you all you need to know to start creating database-driven web apps using PHP and MySQL. Don’t be concerned if you have no experience with computer programming.
          But what if you have inquiries?
          As if this course weren’t comprehensive enough, I provide full assistance, responding to any inquiries you may have 24 hours a day, seven days a week (whereas many instructors answer just once per week, or not at all). With my help, you won’t have to deal with any big problems as you go through this course.
          Who this course is for:
              This PHP and MySQL Course is designed for complete beginners.
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.