![0xD3struction](/img/default-banner.jpg)
- 27
- 27 747
0xD3struction
Registrace 4. 07. 2023
Hacking / Cracking
FOUR SERIES:
- HACKING BASICS
- REAL HACKING
- MALWARE
- REVERSE ENGINEERING / CRACKING
FOUR SERIES:
- HACKING BASICS
- REAL HACKING
- MALWARE
- REVERSE ENGINEERING / CRACKING
💀 HOW HACKERS REWRITE EXE FILES ? [HACKING BASICS]
‼️ FOR EDUCATIONAL PURPOSES ONLY ‼️
👉 FIRST PART:
czcams.com/video/JNe7dQZ6K8A/video.htmlsi=yBnOI71Q7WXlR2O_
In This video you will see how easily hackers can change EXE files.
Its second part of EXE FILES.
In This Video:
[ 1 ] - TimeDateStamp - After changing this nobody will be never knows when you created your file.
[ 2 ] - SubSystem - How to Hide Your CMD window?
[ 3 ] - AddressOfEntryPoint - Start your app in completly different place.
SOURCE CODES SOON
0:00 - INTRO
0:37 - IN THIS VIDEO
1:15 - TimeDateStamp
5:09 - Hide CMD Window
8:55 - New AddressOfEntryPoint
👉 FIRST PART:
czcams.com/video/JNe7dQZ6K8A/video.htmlsi=yBnOI71Q7WXlR2O_
In This video you will see how easily hackers can change EXE files.
Its second part of EXE FILES.
In This Video:
[ 1 ] - TimeDateStamp - After changing this nobody will be never knows when you created your file.
[ 2 ] - SubSystem - How to Hide Your CMD window?
[ 3 ] - AddressOfEntryPoint - Start your app in completly different place.
SOURCE CODES SOON
0:00 - INTRO
0:37 - IN THIS VIDEO
1:15 - TimeDateStamp
5:09 - Hide CMD Window
8:55 - New AddressOfEntryPoint
zhlédnutí: 610
Video
☠️ HOW HACKERS READING EXE FILES [HACKING BASICS]
zhlédnutí 3,2KPřed měsícem
‼️ FOR EDUCATIONAL PURPOSES ONLY ‼️ 🔥 github.com/0xD3struction/0xD3struction/tree/main/HACKING BASICS/[2] READING EXE 🧨 In my opinion, this skill is absolutely fundamental if you want to become a hacker. Ofcourse it isn't last video about exe files. Will be much more. Its much better for start, then using nmap for example! Because, even if you will find som vuln app, how do you want to write Ex...
☠️ HOW MALWARE ALWAYS FIND WAY TO YOUR DATA ❓(ASM / C / VBS)[HACKING BASICS] #hacking #basics
zhlédnutí 253Před 3 měsíci
HOW HACKERS AND MALWARE ALWAYS FIND A WAY TO YOUR DATA ❓ First part of HACKING BASICS series. After watching this video you will be know, why no one uses direct folders paths. 3 example source codes: 👉 ASM 👉 C 👉 VBS SOURCE CODES: github.com/0xD3struction/0xD3struction/tree/main/HACKING BASICS/[1]OS VARS ✔️en.wikipedia.org/wiki/Environment_variable ✔️learn.microsoft.com/en-us/cpp/c-runtime-libra...
📜VBS VIRUS EXAMPLE + CODE EXPLANATION [MALWARE]
zhlédnutí 380Před 4 měsíci
THE INFORMATIONS PUBLISHED AND CONTAINED IN THIS VIDEO IS PROVIDED FOR EDUCATIONAL, INFORMATIONS AND ENTERTAINMENT PURPOSES ONLY! PLEASE DO NOT RECREATE ANY ACTION CONTAINED IN THIS VIDEO! DONT USE SOURCE CODES IF YOU ARE NOT PROFESSIONALIST! ✨Third part of Overwrite Viruses✨ SOURCE CODES: 👉github.com/0xD3struction/0xD3struction/tree/main/MALWARE/OVERWRITE_VIRUSES/VBS_EXAMPLE 0:00 - INTRO 2:10 ...
☢️ MALWARE ANALYSIS [REAL VIRUS] STATIC/DYNAMIC
zhlédnutí 449Před 5 měsíci
In this video you can see how the most basic virus analysis looks like. Static Analisis is much shorter, but dont worry, when I start Polymorphic Viruses Series then you could see more of this. Dynamic Analysis is just tracing execution in IDA debugger. You could find interesting tips about how to safely debugging apps. First Part of Reverse Engineering. 0:00 INTRO 1:30 STATIC ANALYSIS(SHORT VE...
🔥 ASSEMBLY VIRUS EXAMPLE + CODE EXPLANATION [MALWARE]
zhlédnutí 830Před 6 měsíci
🔥 ASSEMBLY VIRUS EXAMPLE CODE EXPLANATION [MALWARE]
🎃 WINAPI SCREAMER IN C++ | HALLOWEEN SPECIAL 🎃
zhlédnutí 195Před 8 měsíci
🎃 WINAPI SCREAMER IN C | HALLOWEEN SPECIAL 🎃
💾 C VIRUS EXAMPLE + CODE EXPLANATION [MALWARE]
zhlédnutí 703Před 9 měsíci
💾 C VIRUS EXAMPLE CODE EXPLANATION [MALWARE]
👉 Full Video : czcams.com/video/BKZ1MfQHC-c/video.htmlsi=e8yrKlE37PoHGUu4
1st PART(READ EXE) : czcams.com/video/JNe7dQZ6K8A/video.htmlsi=vNVYRpgFrd9hg_j5 2nd PART(WRITE EXE) : czcams.com/video/BKZ1MfQHC-c/video.htmlsi=q9GrErsEIQXHKytd
Wow 😮❤
😍😍
Niceeeee
🔥SOURCE CODES🔥 github.com/0xD3struction/0xD3struction/tree/main/HACKING%20BASICS/%5B2%5D%20READING%20EXE
omg I’m gonna make that and put it into my school computers’ system32 folder
There will be whole series about prank apps 🙃
Instead of memcpy you can simply typecast the buffered file data to the structure type and read the file data directly from the buffered file data, thereby reducing memory usage and run time.
This method is already use in next video, to show another way of filling the struct 🙃 For those who don't know what it is, struct could be filled up also in this way: --------- IMAGE_NT_HEADERS32 *NTHeaders; NTHeaders = (IMAGE_NT_HEADERS32*)(FILE_BUFF+Pe_Offset); ---------- Ofcourse, I will upload both versions on Github 😎
Great content mate, keep it up 👍👍🔥
I know 😁 Thx a lot! ❤️ I'll do my best! 💪
take this like only because of nostalgia of seeing DevC++
😘 "PromoSM"
I thought it's stepford county railway
Pretty infomative speed it up and turn the music lower
czcams.com/video/s4p41u60Zio/video.htmlsi=e6lPKrRD5Hpzb41v
Couldnt you use "nasm - f bin file.s -o out.bin"? Or something like that
No way man's using VBS in 2024...
I don't think that VBS has expiration date 🙃 Get ready for 16 bits DOS COM files 😜
"vbs virus" bro i made those when i was like 7 years old its really not that freaking hard 💀
Its more Tribute to vbs ❤️ then showing super hard virus ☠️ When I was 12 I created IMO very good USB worm in VBS, and ofcourse it will be on Channel in Worm Series. Not everyone knows that something like VBS exists, so Its also good opportunity to remaind how dangerous it can be.
mate that's not shell code at all 😭
I think it is. Explain then what it is 🙃
wtf is shell code😭
@@0xD3structionit’s machine code dum dum
Virustotal is not good enough. Try to run it in AnyRun next time
nasm -f elf shellcode.asm ld -o shellcode shellcode.o objdump -d shellcode
Lol rip
czcams.com/video/B3ipq6PLW2E/video.html
Dang bro im not suspicious when it hits 10 lmao
czcams.com/video/7C6Dd1goIec/video.htmlsi=TFORzsATqEjvolr4
czcams.com/video/B3ipq6PLW2E/video.html
😮❤
Its really working! THANKS ! ❤
The first of this dangerous batch files was born back in time in the stone age of MSDOS from a giant dinosaurus egg. It bites in the file system.
But a pump gun can destroy files faster.😂
EMP is even faster 🙃
COM is also an executable. It dates to the MS-DOS era.
COM is already unsupported by default on Win10. (It could be turned on) Will be videos of COM, for eg. in Overwrite Viruses Series.
Screen Savers are executables. Any really there isn't any legit reason that Windows still allows them to be executed post Windows XP tbh
Yes, that's right. There is no reason to support this file type.
I have a DVD logo screensaver.
Damn! Never knew this! Thanks for sharing!
F - secure 😂
👏👏👏👏