👍2
IsUACEanable ???
#malware_dev
#include <stdio.h>
#include <windows.h>
#include <iostream>
using namespace std;
int main()
{
HKEY res=NULL;
//RegOpenKey(HKEY_LOCAL_MACHINE,"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\EnableLUA",res);
DWORD type;
DWORD data;
DWORD size = sizeof(DWORD);
long lres=RegOpenKeyEx(HKEY_LOCAL_MACHINE, L"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System", 0, KEY_READ, &res);
if (lres == ERROR_SUCCESS) {
RegQueryValueExW(res, L"EnableLUA", NULL, REG_NONE, (LPBYTE)&data, &size);
cout << data<<endl;
return 0;
}
return 0;
}
#malware_dev
❤6👎1
Source Byte
IsUACEanable ??? #include <stdio.h> #include <windows.h> #include <iostream> using namespace std; int main() { HKEY res=NULL; //RegOpenKey(HKEY_LOCAL_MACHINE,"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\\EnableLUA",res); DWORD…
Or if you want to disable it you should use
(You should have the administration rights)
RegSetValueEX() and initial the data with 0 in that(You should have the administration rights)
WinDbg extension for data mining managed heap. It also includes commands to list http request, wcf services, WIF tokens among others
https://github.com/rodneyviana/netext
#tool
———
@islemolecule_source
https://github.com/rodneyviana/netext
#tool
———
@islemolecule_source
Source Byte
Unit 8200.ru.en.pdf
If you read this document you will find a section which Israel army have a OSINT unit , now look at this document 👇 it's all gathered from public sources and yes it is from US defense intelligence 🫡
I think we had to look OSINT as a serious job🤔
I think we had to look OSINT as a serious job🤔
Disable Windows #Defender
( Upgrade to SYSTEM)
https://github.com/EvilGreys/Disable-Windows-Defender-
#malware_dev
( Upgrade to SYSTEM)
https://github.com/EvilGreys/Disable-Windows-Defender-
#malware_dev
Forwarded from Order of Six Angles
A Deep Dive Into Exploiting Windows Thread Pools
https://urien.gitbook.io/diago-lima/a-deep-dive-into-exploiting-windows-thread-pools
https://urien.gitbook.io/diago-lima/a-deep-dive-into-exploiting-windows-thread-pools
urien.gitbook.io
A Deep Dive Into Exploiting Windows Thread Pools | Diago Lima
Forwarded from Humpy Dumpy
TheAndroidMalwareHandbook_DetectionandAnalysisbyHumanandMachine.pdf
14.6 MB
👍3❤1
Forwarded from Humpy Dumpy
Here's the android malware handbook 2024
🔥1
Malware Analysis Tutorials: a Reverse Engineering Approach
Author: Dr. Xiang Fu
(One of the best)
Link
#malware_analysis
———
@islemolecule_source
Author: Dr. Xiang Fu
(One of the best)
Link
#malware_analysis
———
@islemolecule_source
Blogspot
Malware Analysis Tutorials: a Reverse Engineering Approach
Author: Dr. Xiang Fu Roadmap: You need to first follow Tutorials 1 to 4 to set up the lab configuration. Then each tutorial addresses an ...
Forwarded from CRACKSurl
VMware.ESXi.v8.0.2-BTCRiSO.rar
766.3 KB
VMware All Products Multi Keygen Win-Linux-OSX by BTCRiSO