Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      Tutorial On modding Level 0 For beginners

      Recommended Posts

      Staff

      The antivirus software uses two methods to protect our PC: 1 - Analyze the files comparing them with the database of malicious software (Signatures) would be like a police reconnaissance wheel or when trying to identify a criminal with a photo: The antivirus compares each file on the hard drive with a "dictionary" of known viruses. If any piece of code (signatures) in a file on the hard drive matches the virus known in the dictionary, the antivirus software comes into play and 2 the constant monitoring of the behavior of files that may be infected. 


      For example 

      Seeing it from Binary, let's suppose that for Avast this code is a virus signature "12 55 40 05" when analyzing the binary and find this: 

      Hidden Content

        Give reaction to this post to see the hidden content.


      Automatically Skip as a virus 


      Av Fucker Method 

      With this method we will look for the signature and we will change its code so that Avast or any antivirus does not recognize it anymore 


      Code detected as virus 

      Hidden Content

        Give reaction to this post to see the hidden content.



      Modified code indented 

      Hidden Content

        Give reaction to this post to see the hidden content.



      It's simple right? the issue is that when we modify one of those numbers (offset) it has to be functional 


      Let's see it Step by step 


      Step 1 tools 

      Undetectable offset locator 2.6 (is that I use but can be any locator) 
      Hex Workshop 
      This Crypter: LVL23 Crypter
      I used this little ball: LVL23 Ball

      Step 2 

      We grab the crypter and encrypt a small ball 

      Step 3 


      We open in offset locator and in "file" we choose the ball and in "directory" the folder where we will create the offsets (Create a new folder and call it offsets) in initial bytes we put "100" and fill in the number "90" 

      Hidden Content

        Give reaction to this post to see the hidden content.


      It would have to stay more or less ASi 

      Hidden Content

        Give reaction to this post to see the hidden content.


      We start and wait for it to finish creating the offset ... When finished we scan the offset folder with Avast and delete the detected ones 

      Step 4 

      Let's show offset 

      Hidden Content

        Give reaction to this post to see the hidden content.


      and we double click on the range that appears 2370 - 2410 

      now the locator will stay like this 

      Hidden Content

        Give reaction to this post to see the hidden content.


       

      Share this post


      Link to post
      Share on other sites
      Staff

      We delete all the files in the offsets folder and we give it again to start then we scan with Avast the offsets folders delete the detected ones and we would have these offsets 

      Hidden Content

        Give reaction to this post to see the hidden content.




      We click to show offsets again 


      Hidden Content

        Give reaction to this post to see the hidden content.



      And we chose the rank 2370 - 2410 

      the locator will remain like this: 

      Hidden Content

        Give reaction to this post to see the hidden content.


      We delete the files of the offset press and start again ... scan with avast ... we delete the detected ones 

      and we have these offsets 

      Hidden Content

        Give reaction to this post to see the hidden content.


      When we are 1 byte 

      we must try what works ... 

      We open the first 2380 

      And ... Perfect works 

      Hidden Content

        Give reaction to this post to see the hidden content.


      How do we know if it works? if you have to open the little ball that we encrypt ... 

      Step 5 

      We open the hex workshop 
      We open the stub 
      Right button 
      Goto 
      offset 
      and we put the one that was functional 2380 

      Hidden Content

        Give reaction to this post to see the hidden content.



      We change the number that appears in that offset by the number that we put in "fill in" 

      Hidden Content

        Give reaction to this post to see the hidden content.


      Hidden Content

        Give reaction to this post to see the hidden content.


      And we save File Save as ... 

      Stub modifica.exe 

      We scanned the stub and .... 


      Hidden Content

        Give reaction to this post to see the hidden content.



      Well this is the most basic if you have questions ask ... in a few days we move ...

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. cutter
          Cutter is a Qt and C++ GUI for radare2. Its goal is making an advanced, customizable and FOSS reverse-engineering platform while keeping the user experience at mind. Cutter is created by reverse engineers for reverse engineers.
          Disclaimer
          Cutter is not aimed at existing radare2 users. It instead focuses on those whose are not yet radare2 users because of the learning curve, because they don’t like CLI applications or because of the difficulty/instability of radare2.
          Changelog v2.0.3
          Additions and Changes
              Debug: Heap viewer widget for glibc
              Rizin, rz-ghidra and jsdec updated to 0.3.0 with changes for compatibility.
              Various improvements for native macOS UI (#2776)
              Many internal changes switching from error-prone rizin commands to C API
              CI and Linux builds: use Ubuntu 18.04 as oldest supported build system (#2736)
          Bugfixes
              Fix Decompiler Copy Shortcut (Fix #2773, #2778)
              Fix Restoring “Show Disassembly as” in Preferences (Fix #2726, #2748)
              Complete Color Theme Lists (Fix #2672) (#2752)
              macOS: Fix Versions in Info.plist (Fix #2679) (#2740)
              Debug: Fix continue until main not being enabled in certain cases (#2727)
              Debug: Fix attaching to a process with no file opened (#2727)
              Fix a crash when printing disassembly arrows (#2688)
          Removals
              Type Link features removed due to unreliability, in light of global variables coming soon (#2775)

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. WP Story is a simple and useful plugin where you can create instagram style stories. You can create multiple stories and display them in anywhere. No need to connect Instagram or other platforms. Just create your own stories in WordPress admin dashboard.
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Content:

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Turns any junk text into a usable wordlist for brute-forcing.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Learn how to set up profitable Twitter Marketing campaigns following a proven step by step process. Go From Zero to Hero.
          What you'll learn
              How to set up a Twitter account and optimise it
              How to come up with ideas on what to tweet about
              How to get Twitter followers
              How to generate more likes and engagement on your posts
              How to acquire new clients through twitter
              How to use & set up Twitter ad campaigns
              How to set up a Twitter ad campaign to drive traffic to a website
              How to set up conversion tracking
          Requirements
              All that I ask is that students come with an open mind ready to learn.
          Description
          Are you looking for a Twitter Marketing course that shows you how to GROW your Twitter account to generate more engagement more followers and more sales for your business?
          Great, you’re in the right place.
          I don’t just talk the talk; I actually walk the walk and live it too. In this course, you’ll be able to watch me in real-time as I reveal all the strategies I Implemented to grow my own twitter account to over 4,500 followers in a short space on time.
          My Twitter ad account now generates over half a million impressions every single month, and you can learn all the strategies I implemented to take to this this level.
          The strategies I teach are universal and can be applied to ANY business out there.
          The course is split into 2 core parts:
              Twitter Marketing
              Twitter Ads
          What you’ll learn by taking this course:
          1. Twitter Marketing
              Learn why Twitter is one of the best platforms to grow your business on
              Learn how to set up your twitter account and optimise it
              Learn how to come up with tons of ideas on what to tweet about
              Learn how to get Twitter followers
              Learn how to generate more likes and engagement on your posts
              Learn how to acquire new clients through Twitter
          2. Twitter Ads
              Learn how to set up a Twitter Advertising Account
              Learn how to set up a Twitter ad campaign to drive traffic to a website
              Learn how to set up a Twitter Ad Campaign To Get More Followers
              Learn how to set up audience targeting
              Learn how to determine where your ads will appear on Twitters platform
              Learn everything you need to know about Twitter ad creatives
              Learn how to set up custom audience
              Learn how to set up conversion tracking on Twitter
          Literally EVERYTHING you need to know to be able to create and implement a successful Twitter Marketing campaign.
          There are tons of resources for you to download throughout the course and lots of bonus tips and tricks you can use as well.
          Once you learn these skills, you’ll be able to drive traffic to your products and services, on demand.
          So, what are you waiting for?
          Enrol today.
          Who this course is for:
              People who need to promote their business (or brand)
              Anyone who is looking to master Twitter Marketing
              Anyone who is looking to master Twitter Ads
              Online marketers and marketing managers
              Small business owners
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.