If you can't figure out the password, how will you know what to do once you unpack it. Much like you head, you may not know it is stuck up your own buttstop being retarded and just give the password already. JFC.
If you can't figure out the password, how will you know what to do once you unpack it. Much like you head, you may not know it is stuck up your own buttstop being retarded and just give the password already. JFC.
because i do not like playing games like that. and i do know what to do when i will unpack it.If you can't figure out the password, how will you know what to do once you unpack it. Much like you head, you may not know it is stuck up your own butt
check arch of your client.exe, cause there's process hollowing injection in regasm.exe, consider that it is 32 bit process.
Is your script that disable Defender FUD or it gots detected?Yes, I tried with different archs, also one option that is "work for any process" but couldnt make it to work.
Anyway I will try another thing because I have a script to disable windows defender and load any .exe without killing it, the thing is that I would like to crypt the .exe, it bypass WD but just in case.
Is your script that disable Defender FUD or it gots detected?
xss.proдля тех у кого мало времени, но нужно посмотреть что там
Скрытое содержимое
я не знаю можно ли так делать, но короче я сделал, если нельзя то пните меня, я удалю сообщение
Привет, наоборот eHNzLmlzCg== base64 string декодируй в текстПривет, се то не понимаю)
Pbaireg.SebzOnfr64Fgevat("rUAmYzymPt==")
С ROT13 - Convert.FromBase64String("eHNzLmlzCg==") , но это не ответ, значит нужно ("eHNzLmlzCg==") или ("rUAmYzymPt==") конвертировать в base64 string. Попробовал - первое, ZUhOekxtbHpDZz09, не походит, второе clVBbVl6eW1QdD09. Так-же не подходит, можно хелп?)