👍2
IsUACEanable ???
#malware_dev
#include <stdio.h>
#include <windows.h>
#include <iostream>
using namespace std;
int main()
{
HKEY res=NULL;
//RegOpenKey(HKEY_LOCAL_MACHINE,"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\EnableLUA",res);
DWORD type;
DWORD data;
DWORD size = sizeof(DWORD);
long lres=RegOpenKeyEx(HKEY_LOCAL_MACHINE, L"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System", 0, KEY_READ, &res);
if (lres == ERROR_SUCCESS) {
RegQueryValueExW(res, L"EnableLUA", NULL, REG_NONE, (LPBYTE)&data, &size);
cout << data<<endl;
return 0;
}
return 0;
}
#malware_dev
❤6👎1
Source Byte
IsUACEanable ??? #include <stdio.h> #include <windows.h> #include <iostream> using namespace std; int main() { HKEY res=NULL; //RegOpenKey(HKEY_LOCAL_MACHINE,"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\EnableLUA",res); DWORD…
Or if you want to disable it you should use
(You should have the administration rights)
RegSetValueEX() and initial the data with 0 in that(You should have the administration rights)
WinDbg extension for data mining managed heap. It also includes commands to list http request, wcf services, WIF tokens among others
https://github.com/rodneyviana/netext
#tool
———
@islemolecule_source
https://github.com/rodneyviana/netext
#tool
———
@islemolecule_source
Source Byte
Unit 8200.ru.en.pdf
If you read this document you will find a section which Israel army have a OSINT unit , now look at this document 👇 it's all gathered from public sources and yes it is from US defense intelligence 🫡
I think we had to look OSINT as a serious job🤔
I think we had to look OSINT as a serious job🤔
Disable Windows #Defender
( Upgrade to SYSTEM)
https://github.com/EvilGreys/Disable-Windows-Defender-
#malware_dev
( Upgrade to SYSTEM)
https://github.com/EvilGreys/Disable-Windows-Defender-
#malware_dev
Forwarded from Order of Six Angles
A Deep Dive Into Exploiting Windows Thread Pools
https://urien.gitbook.io/diago-lima/a-deep-dive-into-exploiting-windows-thread-pools
https://urien.gitbook.io/diago-lima/a-deep-dive-into-exploiting-windows-thread-pools
urien.gitbook.io
A Deep Dive Into Exploiting Windows Thread Pools | Diago Lima
Forwarded from Humpy Dumpy
TheAndroidMalwareHandbook_DetectionandAnalysisbyHumanandMachine.pdf
14.6 MB
👍3❤1
Forwarded from Humpy Dumpy
Here's the android malware handbook 2024
🔥1
Malware Analysis Tutorials: a Reverse Engineering Approach
Author: Dr. Xiang Fu
(One of the best)
Link
#malware_analysis
———
@islemolecule_source
Author: Dr. Xiang Fu
(One of the best)
Link
#malware_analysis
———
@islemolecule_source
Blogspot
Malware Analysis Tutorials: a Reverse Engineering Approach
Author: Dr. Xiang Fu Roadmap: You need to first follow Tutorials 1 to 4 to set up the lab configuration. Then each tutorial addresses an ...
Forwarded from CRACKSurl
VMware.ESXi.v8.0.2-BTCRiSO.rar
766.3 KB
VMware All Products Multi Keygen Win-Linux-OSX by BTCRiSO
My friend explain and show how to work with gdb + demo
https://www.aparat.com/v/zdEBg
(Persian)
#reverse
———
@islemolecule_source
https://www.aparat.com/v/zdEBg
(Persian)
#reverse
———
@islemolecule_source
آپارات - سرویس اشتراک ویدیو
بررسی و نحوه کار با دیباگر GDB لینوکس
GDB چیست ؟GNU Debugger ابزاری است که امکاناتی در اختیار شما قرار می دهد تا بتوانید ببینید درون برنامه تان چه اتفاقی میفتد یا در حین ایجاد یک مشکل در کدتان، کد چگونه عکس العمل نشان می دهد. GDB از طریق متوقف کردن برنامه در لحظات مشخص و همچنین شروع برنامه از…
❤5💩1