![](https://rstforums.com/forum/uploads/set_resources_17/84c1e40ea0e759e3f1505eb1788ddf3c_pattern.png)
rukov
Active Members-
Posts
1123 -
Joined
-
Last visited
-
Days Won
16
Everything posted by rukov
-
E un cod sa extragi emailuri din fisiere text.
-
Incearca sa le stergi din linux.
-
La Multi Aniii!
-
Version 3.9 * Fixed a reported bug while loading assembly info when the assembly is drag droped * Added support for multiple assemblies * No longer over-wrties the original assembly/No longer locks the origianl assembly * Got rid of most of the useless code for optimizations Version 3.6 * Fixed a bug with searching for strings * Added decompiling-time method renaming * Added the ability to dump methods Version 3.3 * Fixed most of the decompiling errors (thanks 0xd4d) * Fixed goto entrypoint with assemblies with no EP * Now mono handles checking the compiler, so you won't have any further problems with some assemblies. * Now you can copy multiple bytes, added hotkey CTRL+C for copying bytes * Removed scripting language * Removed hotkey DELETE for noping instructions * Some optimizations at loading assemblies (13MB assembly now loads at 2.8 seconds instead of 3.5) version 3.0 * Fixed a critical bug with decompiling empty type names (CodeCracker's Obfuscator) * Fixed a bug while trying to modify a non selected item * Fixed "Goto Entrypoint" bug with few assemblies * Now should locate the correct metadata section * Added error reporting * Added the ability to trace methods * Added assembly info node which includes: Version, Compiler version, Obfuscator, IL Only flag, PublicKeyToken, entrypoint token * Added token support for scripting language, now you can use tokens like: nop_all_br t6000001 * Added a var "ep" for the scripting language, can be used like this: nop_all_call ep * Added new command "get_all_inner_call" same function as "get_all_call" except it only adds the calls that is located in the assembly (non referenced calls) * Removed script writer Version 2.4 * Now you can modify opcodes in IL too instead of only bytes. * Now when you refresh an assembly it will navigate back to the method you were on. * Added a close button so it would be much easier to make any changes in the assembly. * Added a reverse branch function, now you can right click on any branch and reverse it. Ex: 2C99 will be reversed to 2D99 * Added a scripting language, current commands: modify rva newbytes modifies your defined rva with those bytes nop rva nopes your defined rva revbran rva reverses a branch with the defiend rva wipe rva wipes method rva (changes all the instructions to nop and last instruction to ret) get_all_#OPCODE# rva var gets all the rva addresses for your defined rva in your defined method and stores them in the var, example usage: get_all_call 2090 call : nop call10. this nops the 10th call in the method rva nop_all_#OPCODE# rva nops all the defined OPCODE in the defined methodrva example : nop_all_call 2090 # for comments, all comments will be ignored. Version 2.0 * OpCode highlighting. * Code decompilation fixes with generic parameters. * Now you can nop multiple OpCodes. * Added a search funciton. Version 1.5 * Fixed a critical bug with deassemblying some bytes with size 2 and simliar op codes. * Fixed a bug with trying to decompile some methods. * Now instruction # shown as hex. * Added a Goto module constructor. * Added hotkey delete automatically fill byte's with NOP. * Added double click modify OP code. * Added parameters and return type for methods. Version 1.0 * Decompiliation of methods using Mono.Cecil. * Displayes op codes of methods, va, rva, bytes, token. * Modifying of op codes. Download https://hostr.co/file/0Bg4tgDu4MFq/ByteME-v3.9.rar?warning=on
-
Often we need to compare two different versions of an assembly and see differences between the two. This is especially true when you are making a point release (or hot fix) and not upgrading the entire environment and you want to compare the selected assemblies that you will overwrite in production (live) environment, so that you can be sure of changes which are going in the new assembly. CLR assemblies being binary files cannot be compared with usual text file comparer tools. Hence, you need a separate tool which can compare CLR assemblies. That’s where I welcome you to using this new tool, Girish Jain’s Assembly Comparer. Using this tool, you can compare two CLR assemblies and it will give you nice graphical view to see the differences along with advanced comparer features to filter view for mismatch items only or common items, and so on. Best way to explain its features would be by doing a comparison and showing differences hence, I have created a fiction data layer DLL with some common entities and data access layer classes/methods and created two versions of it v1.1 and v1.2. Download http://girishjjain.com/tools/AssemblyComparer/AssemblyComparer.application
-
With Advanced Email Verifier you can: Use the email verifier to clear your email list or database from bounced and undeliverable email addresses, which thereby allows you update and keep your contact lists "clean" on a proactive basis. This means you can protect your email server domain from getting blacklisted and increase your email campaigns' performance. Decrease the Internet traffic and save your bandwidth which means you reduce your costs by focusing only on real prospects. Verify the email addresses directly from the database without import-export — you save a lot of time and manual work thanks to the email address verifier. Our email verifier can connect to any ODBC compatible database like MS Access, MS SQL, MYSQL, Oracle, etc. Quickly load mailing lists in program to check email validity — big time saver! Import email lists containing email addresses and other custom fields for verification from Paradox, DBase, Excel, Text (.CSV, Word HTML, Lotus 1-2-3, QuattroPro, XML, MS Access files, and DBISAM tables (.dat files) which means the email verifier will ensure that you don't lose any contact information, such as first name, last name, company, phone, address, etc. Quickly save the results generated by the email verification software to a text file — for your convenience you can save good and bad emails to different files. Export the email addresses together with custom fields to Paradox, DBase, Excel, Text (.CSV), HTML, Word, SYLK, DIF, Lotus 1-2-3, QuattroPro, SQL script, XML, MS Access, Rich text format files, and MS Windows Clipboard. Handle bounced messages and get high accuracy in list cleaning. Advanced Email Verifier is the only email list cleaner program on the market that has the powerful built-in bounce handler and is able to process a large amount of bounced messages from POP3 and IMAP servers and from your local or network folders extracting the recipient's email address and original message subject — this means you can easily find the recipient in your database and take them off your list. Automatically delete auto-reply emails — Advanced Email Verifier helps you keep your Inbox sane. You won't see "Out of office" and challenge-response email messages flooding your Inbox after each email campaign. Check email syntax — you can quickly run the verification of the email addresses syntax only without checking emails for validity. Sort and filter the email addresses through the email verification software, which means you can organize the contact information in the most convenient way for you. Safely save and recover your data — the email verifier works in a way so that you don't lose your email lists if your computer hangs in the middle of any operation. Download Advanced_Email_Verifier_G-Lock_Software-8.3.6.0.rar
-
https://east1.openhosting.com/accounts/trial/ (5 day free trial.Requires a mobile phone) Cloud servers & Hosting | Switzerland Europe US (7 day free trial) Free Trial - VMware (7 day free trial) Cloud Servers - Windows or Linux, Billed per Hour in SA. (7 day free trial) Free 5 Day Trial | Cloud Servers | US, Canada, Europe, Hong Kong, Sydney (5 day free trial, requires a mobile phone)
-
Demo https://www.inkydeals.com/deal/colossal-web-dev-bundle/ Download https://mega.nz/#!CxdmHKxb!joUqWLBtuighzhw1urap0FGPbJXAefWUG0lcgd75Kgc
-
Official-Liker.net - Clone Script 2015 + Facebook Bot
rukov replied to criss84's topic in Free stuff
Official Liker Bot.rar — RGhost — file sharing -
Download WILEY PRACTICAL REVERSE ENGINEERING X86 X64 ARM WINDOWS KERNEL REVERSING TOOLS AND OBFUSCATION 2014 PDF | DropPDF.com
-
- 1
-
-
Un site care se respecta avea macar un https cand se inscrie userul. Just my 2¢
-
Am 3 teme cumparate mai de mult si vreau sa fac share cu voi.Temele sunt actualizate la ultima versiune. Natural - Powerful Responsive WordPress Theme - WordPress | ThemeForest Beauty Center - Responsive Wordpress Theme - WordPress | ThemeForest http://themeforest.net/item/medicaldoctor-wordpress-theme-for-medical/5390456 Download themeforest-5390456-medicaldoctor-wordpress-theme-for-medical.zip — RGhost — file sharing themeforest-4508494-beauty-center-responsive-wordpress-theme.zip — RGhost — file sharing http://rghost.net/6JKWnpLP8 Enjoy
-
@J Ai aici pentru Malwarebytes si Anti-Exploit Premium Zippyshare.com toata treaba este ca, sa va generati inainte serialele intr-un fisier text si pe urma sa stergeti keygenurile pentru ca altfel Malwarebytes nu valideaza cheile
-
Cheii valabile pana in 2016-2017 Zippyshare.com
-
Binary analysis. Powerful features. Supported PE, Elf and mach0 file formats ARM, i386 and x86-64 architectures Call/syscall recognition Code/Data Cross-references And much, much more! User interface. Makes it easy. Dissasembly, graph and hexdump views Functions, strings, imports, symbols and file info listings Cross-references, code navigation, sections graph and console Assembler, binary diffing, calculator and assembly cheat sheet Many themes and personalization options Download Bokken - Download
-
Zippyshare.com
-
Is your computer infected by some of the MackingTeam tools? You can find out now! Rook Security released their tool called Milano, witch are sharing freely, scans for the presence of files associated with the recent Hacking Team breach. For this first iteration of the tool, we they conducted analysis on 93 Windows binaries released from the Hacked Team breach. These files were specific to the projects found on the Hacked Team git projects. They are continuing to review the remaining files from the 400Gb and will provide more .ioc files as more information is available. Milano can scan to find Hacking Team associated files in two different ways: Quick scan: This mode scans for files by filename. If a filename matches, it then checks if file?? computed hash matches the hash from the Hacking-Team-associated file. This approach is not comprehensive, but it is an OK starting point for detection. It is much faster than the deep scan approach. Deep scan: This approach checks all files (via their computed hash) against all md5s from Hacking-Team-associated files. You can grab the tool there, unpack and run (opens shell): https://www.rooksecurity.com/wp-content/uploads/2015/07/Package_1.1.zip For possible future updates, check there: https://www.rooksecurity.com/hacking-team-malware-detection-utility/
-
Zippyshare.com spor la treaba.
-
4n4lDetector v1.1 [+] Added a command line, which writes the report in the root. Use -> (4n4lDetector.exe c: \malware.exe) [+] Added new words to the module "Interest Words". [+] Added the removal of the Subsystem field, associated with the application type and size of image. [+] Fixed a bug in the representation of the possible builds hidden behind UPX. [+] Including new executables to remove command lines. [+] Including the removal of new registry paths. [+] Added the removal of new APIS, detections of calls to functions using Call API By Name, Call API by Hash and mZombieInvoke. [+] Added a new binary to run x86 libraries in memory, within the run mode. [+] Anti detection methods of Deep Freeze. [+] Enhanced the removal of URLs Unicode. [+] Reorganization of searching for information on non-executable binary. [+] Detection of lack of permission to access the binary to analyze. [+] Routine detection of executables called Dnet.Dropper, Crypters, joiners and binders. [+] Extraction routine of routes with executable binaries improved. Download https://docs.google.com/uc?id=0B74kMAGqImI9a0NrYjdiNnMyc00
- 3 replies
-
- compromise
- computer
-
(and 3 more)
Tagged with:
-
Mirosi a frauda de la distanta.