diff --git a/.vs/Fuck-Windows-Security.slnx/FileContentIndex/4346fa76-436e-40ca-865b-603028c625dd.vsidx b/.vs/Fuck-Windows-Security.slnx/FileContentIndex/4346fa76-436e-40ca-865b-603028c625dd.vsidx
new file mode 100644
index 0000000..1107659
Binary files /dev/null and b/.vs/Fuck-Windows-Security.slnx/FileContentIndex/4346fa76-436e-40ca-865b-603028c625dd.vsidx differ
diff --git a/.vs/Fuck-Windows-Security.slnx/FileContentIndex/52a1edd0-cd2e-43ff-a69a-2a9966972865.vsidx b/.vs/Fuck-Windows-Security.slnx/FileContentIndex/52a1edd0-cd2e-43ff-a69a-2a9966972865.vsidx
new file mode 100644
index 0000000..4c36644
Binary files /dev/null and b/.vs/Fuck-Windows-Security.slnx/FileContentIndex/52a1edd0-cd2e-43ff-a69a-2a9966972865.vsidx differ
diff --git a/.vs/Fuck-Windows-Security.slnx/FileContentIndex/fdf33932-41c6-458a-b08b-06267ac2ea54.vsidx b/.vs/Fuck-Windows-Security.slnx/FileContentIndex/fdf33932-41c6-458a-b08b-06267ac2ea54.vsidx
new file mode 100644
index 0000000..673f62e
Binary files /dev/null and b/.vs/Fuck-Windows-Security.slnx/FileContentIndex/fdf33932-41c6-458a-b08b-06267ac2ea54.vsidx differ
diff --git a/.vs/Fuck-Windows-Security.slnx/config/applicationhost.config b/.vs/Fuck-Windows-Security.slnx/config/applicationhost.config
new file mode 100644
index 0000000..ca16466
--- /dev/null
+++ b/.vs/Fuck-Windows-Security.slnx/config/applicationhost.config
@@ -0,0 +1,969 @@
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
diff --git a/.vs/Fuck-Windows-Security.slnx/v18/.suo b/.vs/Fuck-Windows-Security.slnx/v18/.suo
new file mode 100644
index 0000000..0a29aad
Binary files /dev/null and b/.vs/Fuck-Windows-Security.slnx/v18/.suo differ
diff --git a/.vs/Fuck-Windows-Security.slnx/v18/.wsuo b/.vs/Fuck-Windows-Security.slnx/v18/.wsuo
new file mode 100644
index 0000000..461321f
Binary files /dev/null and b/.vs/Fuck-Windows-Security.slnx/v18/.wsuo differ
diff --git a/.vs/Fuck-Windows-Security.slnx/v18/DocumentLayout.backup.json b/.vs/Fuck-Windows-Security.slnx/v18/DocumentLayout.backup.json
new file mode 100644
index 0000000..90935aa
--- /dev/null
+++ b/.vs/Fuck-Windows-Security.slnx/v18/DocumentLayout.backup.json
@@ -0,0 +1,177 @@
+{
+ "Version": 1,
+ "WorkspaceRootPath": "D:\\source\\ashc0m-cmd\\Fuck-Windows-Security\\",
+ "Documents": [
+ {
+ "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\background.json||{14D17961-FE51-464D-9111-C4AF11D7D99A}"
+ },
+ {
+ "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\scripts.json||{90A6B3A7-C1A3-4009-A288-E2FF89E96FA0}"
+ },
+ {
+ "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|C:\\Users\\Ashc0\\Downloads\\updates.json||{90A6B3A7-C1A3-4009-A288-E2FF89E96FA0}"
+ },
+ {
+ "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\assets\\assets\\extension.ini||{3B902123-F8A7-4915-9F01-361F908088D0}"
+ },
+ {
+ "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\option.js||{14D17961-FE51-464D-9111-C4AF11D7D99A}"
+ },
+ {
+ "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|C:\\Users\\Ashc0\\source\\repos\\chemtrail\\config.json||{90A6B3A7-C1A3-4009-A288-E2FF89E96FA0}"
+ },
+ {
+ "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\styles.css||{A5401142-F49D-43DB-90B1-F57BA349E55C}"
+ },
+ {
+ "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|C:\\Users\\Ashc0\\OneDrive\\Documents\\bypass tech\\Fetch.json||{90A6B3A7-C1A3-4009-A288-E2FF89E96FA0}"
+ },
+ {
+ "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|C:\\Users\\Ashc0\\OneDrive\\Documents\\GitHub\\n8n\\packages\\nodes-base\\nodes\\Ssh\\__schema__\\v1.0.0\\command\\execute.json||{90A6B3A7-C1A3-4009-A288-E2FF89E96FA0}"
+ },
+ {
+ "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|C:\\Users\\Ashc0\\source\\repos\\sites.json||{14D17961-FE51-464D-9111-C4AF11D7D99A}"
+ },
+ {
+ "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\manifest.json||{90A6B3A7-C1A3-4009-A288-E2FF89E96FA0}"
+ }
+ ],
+ "DocumentGroupContainers": [
+ {
+ "Orientation": 0,
+ "VerticalTabListWidth": 256,
+ "DocumentGroups": [
+ {
+ "DockedWidth": 200,
+ "SelectedChildIndex": 3,
+ "Children": [
+ {
+ "$type": "Document",
+ "DocumentIndex": 10,
+ "Title": "manifest.json",
+ "DocumentMoniker": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\manifest.json",
+ "ToolTip": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\manifest.json",
+ "ViewState": "AgIAAAAAAAAAAAAAAAAAABUAAAAtAAAAAAAAAA==",
+ "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.001642|",
+ "WhenOpened": "2025-12-11T07:05:11.35Z",
+ "IsPinned": true
+ },
+ {
+ "$type": "Document",
+ "DocumentIndex": 5,
+ "Title": "config.json",
+ "DocumentMoniker": "C:\\Users\\Ashc0\\source\\repos\\chemtrail\\config.json",
+ "ToolTip": "C:\\Users\\Ashc0\\source\\repos\\chemtrail\\config.json",
+ "ViewState": "AgIAAPMAAAAAAAAAAAAAAAgAAAAtAAAAAAAAAA==",
+ "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.001642|",
+ "WhenOpened": "2025-12-11T15:05:57.234Z",
+ "IsPinned": true
+ },
+ {
+ "$type": "Document",
+ "DocumentIndex": 6,
+ "Title": "styles.css",
+ "DocumentMoniker": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\styles.css",
+ "ToolTip": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\styles.css",
+ "ViewState": "AgIAAAAAAAAAAAAAAAAAACAAAAAJAAAAAAAAAA==",
+ "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.003000|",
+ "WhenOpened": "2025-12-12T00:42:00.372Z",
+ "IsPinned": true
+ },
+ {
+ "$type": "Document",
+ "DocumentIndex": 0,
+ "Title": "background.json",
+ "DocumentMoniker": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\background.json",
+ "ToolTip": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\background.json",
+ "ViewState": "AgIAAAAAAAAAAAAAAAAAAAAAAAAmAAAAAAAAAA==",
+ "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.001642|",
+ "WhenOpened": "2025-12-11T14:22:48.086Z",
+ "IsPinned": true,
+ "EditorCaption": ""
+ },
+ {
+ "$type": "Document",
+ "DocumentIndex": 7,
+ "Title": "Fetch.json",
+ "DocumentMoniker": "C:\\Users\\Ashc0\\OneDrive\\Documents\\bypass tech\\Fetch.json",
+ "ToolTip": "C:\\Users\\Ashc0\\OneDrive\\Documents\\bypass tech\\Fetch.json",
+ "ViewState": "AgIAAIcAAAAAAAAAAAAAAAQAAAASAAAAAAAAAA==",
+ "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.001642|",
+ "WhenOpened": "2025-12-11T14:53:12.673Z",
+ "IsPinned": true
+ },
+ {
+ "$type": "Document",
+ "DocumentIndex": 4,
+ "Title": "option.js",
+ "DocumentMoniker": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\option.js",
+ "ToolTip": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\option.js",
+ "ViewState": "AgIAAAAAAAAAAAAAAAAuwAoAAAACAAAAAAAAAA==",
+ "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.001646|",
+ "WhenOpened": "2025-12-12T17:45:35.788Z",
+ "IsPinned": true
+ },
+ {
+ "$type": "Document",
+ "DocumentIndex": 9,
+ "Title": "sites.json",
+ "DocumentMoniker": "C:\\Users\\Ashc0\\source\\repos\\sites.json",
+ "ToolTip": "C:\\Users\\Ashc0\\source\\repos\\sites.json",
+ "ViewState": "AgIAAAAAAAAAAAAAAAAAAAsAAAAjAAAAAAAAAA==",
+ "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.001642|",
+ "WhenOpened": "2025-12-11T16:38:58.543Z",
+ "IsPinned": true
+ },
+ {
+ "$type": "Document",
+ "DocumentIndex": 2,
+ "Title": "updates.json",
+ "DocumentMoniker": "C:\\Users\\Ashc0\\Downloads\\updates.json",
+ "ToolTip": "C:\\Users\\Ashc0\\Downloads\\updates.json",
+ "ViewState": "AgIAAAAAAAAAAAAAAAAAAB4AAAABAAAAAAAAAA==",
+ "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.001642|",
+ "WhenOpened": "2025-12-12T16:38:14.276Z",
+ "IsPinned": true
+ },
+ {
+ "$type": "Bookmark",
+ "Name": "ST:0:0:{aa2115a1-9712-457b-9047-dbb71ca2cdd2}"
+ },
+ {
+ "$type": "Document",
+ "DocumentIndex": 8,
+ "Title": "execute.json",
+ "DocumentMoniker": "C:\\Users\\Ashc0\\OneDrive\\Documents\\GitHub\\n8n\\packages\\nodes-base\\nodes\\Ssh\\__schema__\\v1.0.0\\command\\execute.json",
+ "ToolTip": "C:\\Users\\Ashc0\\OneDrive\\Documents\\GitHub\\n8n\\packages\\nodes-base\\nodes\\Ssh\\__schema__\\v1.0.0\\command\\execute.json",
+ "ViewState": "AgIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==",
+ "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.001642|",
+ "WhenOpened": "2025-12-12T19:33:57.398Z"
+ },
+ {
+ "$type": "Document",
+ "DocumentIndex": 3,
+ "Title": "extension.ini",
+ "DocumentMoniker": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\assets\\assets\\extension.ini",
+ "ToolTip": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\assets\\assets\\extension.ini",
+ "ViewState": "AgIAAAAAAAAAAAAAAAAAABUAAAAzAAAAAAAAAA==",
+ "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.002768|",
+ "WhenOpened": "2025-12-12T13:58:07.444Z"
+ },
+ {
+ "$type": "Document",
+ "DocumentIndex": 1,
+ "Title": "scripts.json",
+ "DocumentMoniker": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\scripts.json",
+ "ToolTip": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\scripts.json",
+ "ViewState": "AgIAACkEAAAAAAAAAAAqwMwEAAADAAAAAAAAAA==",
+ "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.001642|",
+ "WhenOpened": "2025-12-11T14:25:21.644Z",
+ "EditorCaption": ""
+ }
+ ]
+ }
+ ]
+ }
+ ]
+}
\ No newline at end of file
diff --git a/.vs/Fuck-Windows-Security.slnx/v18/DocumentLayout.json b/.vs/Fuck-Windows-Security.slnx/v18/DocumentLayout.json
new file mode 100644
index 0000000..0fc8d99
--- /dev/null
+++ b/.vs/Fuck-Windows-Security.slnx/v18/DocumentLayout.json
@@ -0,0 +1,221 @@
+{
+ "Version": 1,
+ "WorkspaceRootPath": "D:\\source\\ashc0m-cmd\\Fuck-Windows-Security\\",
+ "Documents": [
+ {
+ "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\styles.css||{A5401142-F49D-43DB-90B1-F57BA349E55C}"
+ },
+ {
+ "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|C:\\Users\\Ashc0\\source\\repos\\chemtrail\\config.json||{90A6B3A7-C1A3-4009-A288-E2FF89E96FA0}"
+ },
+ {
+ "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\manifest.json||{90A6B3A7-C1A3-4009-A288-E2FF89E96FA0}"
+ },
+ {
+ "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\assets\\assets\\shield.png||{3B902123-F8A7-4915-9F01-361F908088D0}"
+ },
+ {
+ "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|C:\\Users\\Ashc0\\OneDrive\\Documents\\bypass tech\\updates.json||{90A6B3A7-C1A3-4009-A288-E2FF89E96FA0}"
+ },
+ {
+ "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|D:\\source\\ashc0m-cmd\\Fuck-Windows-Security\\.vs\\Fuck-Windows-Security.slnx\\config\\applicationhost.config||{FA3CD31E-987B-443A-9B81-186104E8DAC1}",
+ "RelativeMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|solutionrelative:.vs\\Fuck-Windows-Security.slnx\\config\\applicationhost.config||{FA3CD31E-987B-443A-9B81-186104E8DAC1}"
+ },
+ {
+ "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|C:\\Users\\Ashc0\\Downloads\\launch.json||{90A6B3A7-C1A3-4009-A288-E2FF89E96FA0}"
+ },
+ {
+ "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|C:\\Users\\Ashc0\\OneDrive\\Documents\\bypass tech\\Fetch.json||{90A6B3A7-C1A3-4009-A288-E2FF89E96FA0}"
+ },
+ {
+ "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|C:\\Users\\Ashc0\\source\\repos\\sites.json||{14D17961-FE51-464D-9111-C4AF11D7D99A}"
+ },
+ {
+ "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\scripts.json||{90A6B3A7-C1A3-4009-A288-E2FF89E96FA0}"
+ },
+ {
+ "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\index.json||{90A6B3A7-C1A3-4009-A288-E2FF89E96FA0}"
+ },
+ {
+ "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\option.js||{14D17961-FE51-464D-9111-C4AF11D7D99A}"
+ }
+ ],
+ "DocumentGroupContainers": [
+ {
+ "Orientation": 0,
+ "VerticalTabListWidth": 256,
+ "DocumentGroups": [
+ {
+ "DockedWidth": 200,
+ "SelectedChildIndex": 2,
+ "Children": [
+ {
+ "$type": "Document",
+ "DocumentIndex": 2,
+ "Title": "manifest.json",
+ "DocumentMoniker": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\manifest.json",
+ "ToolTip": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\manifest.json",
+ "ViewState": "AgIAAAAAAAAAAAAAAAAAAAsAAAAEAAAAAAAAAA==",
+ "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.001642|",
+ "WhenOpened": "2025-12-11T07:05:11.35Z",
+ "IsPinned": true,
+ "EditorCaption": ""
+ },
+ {
+ "$type": "Document",
+ "DocumentIndex": 1,
+ "Title": "config.json",
+ "DocumentMoniker": "C:\\Users\\Ashc0\\source\\repos\\chemtrail\\config.json",
+ "ToolTip": "C:\\Users\\Ashc0\\source\\repos\\chemtrail\\config.json",
+ "ViewState": "AgIAAAAAAAAAAAAAAAAAAA0AAAAVAAAAAAAAAA==",
+ "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.001642|",
+ "WhenOpened": "2025-12-11T15:05:57.234Z",
+ "IsPinned": true,
+ "EditorCaption": ""
+ },
+ {
+ "$type": "Document",
+ "DocumentIndex": 0,
+ "Title": "styles.css",
+ "DocumentMoniker": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\styles.css",
+ "ToolTip": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\styles.css",
+ "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.003000|",
+ "WhenOpened": "2025-12-12T00:42:00.372Z",
+ "IsPinned": true
+ },
+ {
+ "$type": "Document",
+ "DocumentIndex": 7,
+ "Title": "Fetch.json",
+ "DocumentMoniker": "C:\\Users\\Ashc0\\OneDrive\\Documents\\bypass tech\\Fetch.json",
+ "ToolTip": "C:\\Users\\Ashc0\\OneDrive\\Documents\\bypass tech\\Fetch.json",
+ "ViewState": "AgIAAA8AAAAAAAAAAAAAAAYAAAAJAAAAAAAAAA==",
+ "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.001642|",
+ "WhenOpened": "2025-12-11T14:53:12.673Z",
+ "IsPinned": true,
+ "EditorCaption": ""
+ },
+ {
+ "$type": "Document",
+ "DocumentIndex": 8,
+ "Title": "sites.json",
+ "DocumentMoniker": "C:\\Users\\Ashc0\\source\\repos\\sites.json",
+ "ToolTip": "C:\\Users\\Ashc0\\source\\repos\\sites.json",
+ "ViewState": "AgIAAAAAAAAAAAAAAAAAAAMAAAAWAAAAAAAAAA==",
+ "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.001642|",
+ "WhenOpened": "2025-12-11T16:38:58.543Z",
+ "IsPinned": true,
+ "EditorCaption": ""
+ },
+ {
+ "$type": "Document",
+ "DocumentIndex": 9,
+ "Title": "scripts.json",
+ "DocumentMoniker": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\scripts.json",
+ "ToolTip": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\scripts.json",
+ "ViewState": "AgIAACoDAAAAAAAAAAAqwMwEAAADAAAAAAAAAA==",
+ "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.001642|",
+ "WhenOpened": "2025-12-11T14:25:21.644Z",
+ "IsPinned": true,
+ "EditorCaption": ""
+ },
+ {
+ "$type": "Document",
+ "DocumentIndex": 10,
+ "Title": "index.json",
+ "DocumentMoniker": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\index.json",
+ "ToolTip": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\index.json",
+ "ViewState": "AgIAAAAAAAAAAAAAAAAAABsAAAANAAAAAAAAAA==",
+ "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.001642|",
+ "WhenOpened": "2025-12-12T20:19:13.442Z",
+ "IsPinned": true,
+ "EditorCaption": ""
+ },
+ {
+ "$type": "Document",
+ "DocumentIndex": 3,
+ "Title": "shield.png",
+ "DocumentMoniker": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\assets\\assets\\shield.png",
+ "ToolTip": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\assets\\assets\\shield.png",
+ "ViewState": "AgIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==",
+ "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.001533|",
+ "WhenOpened": "2025-12-12T13:58:07.444Z",
+ "IsPinned": true,
+ "EditorCaption": ""
+ },
+ {
+ "$type": "Document",
+ "DocumentIndex": 11,
+ "Title": "option.js",
+ "DocumentMoniker": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\option.js",
+ "ToolTip": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\option.js",
+ "ViewState": "AgIAABQAAAAAAAAAAAAkwAoAAAACAAAAAAAAAA==",
+ "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.001646|",
+ "WhenOpened": "2025-12-12T17:45:35.788Z",
+ "IsPinned": true,
+ "EditorCaption": ""
+ },
+ {
+ "$type": "Document",
+ "DocumentIndex": 6,
+ "Title": "launch.json",
+ "DocumentMoniker": "C:\\Users\\Ashc0\\Downloads\\launch.json",
+ "ToolTip": "C:\\Users\\Ashc0\\Downloads\\launch.json",
+ "ViewState": "AgIAAAAAAAAAAAAAAAAAAAkAAAAfAAAAAAAAAA==",
+ "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.001642|",
+ "WhenOpened": "2025-12-12T23:34:17.671Z",
+ "IsPinned": true,
+ "EditorCaption": ""
+ },
+ {
+ "$type": "Bookmark",
+ "Name": "ST:0:0:{1c4feeaa-4718-4aa9-859d-94ce25d182ba}"
+ },
+ {
+ "$type": "Document",
+ "DocumentIndex": 5,
+ "Title": "applicationhost.config",
+ "DocumentMoniker": "D:\\source\\ashc0m-cmd\\Fuck-Windows-Security\\.vs\\Fuck-Windows-Security.slnx\\config\\applicationhost.config",
+ "RelativeDocumentMoniker": ".vs\\Fuck-Windows-Security.slnx\\config\\applicationhost.config",
+ "ToolTip": "D:\\source\\ashc0m-cmd\\Fuck-Windows-Security\\.vs\\Fuck-Windows-Security.slnx\\config\\applicationhost.config",
+ "RelativeToolTip": ".vs\\Fuck-Windows-Security.slnx\\config\\applicationhost.config",
+ "ViewState": "AgIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==",
+ "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.000601|",
+ "WhenOpened": "2025-12-13T00:23:36.084Z",
+ "EditorCaption": ""
+ },
+ {
+ "$type": "Document",
+ "DocumentIndex": 4,
+ "Title": "updates.json",
+ "DocumentMoniker": "C:\\Users\\Ashc0\\OneDrive\\Documents\\bypass tech\\updates.json",
+ "ToolTip": "C:\\Users\\Ashc0\\OneDrive\\Documents\\bypass tech\\updates.json",
+ "ViewState": "AgIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==",
+ "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.001642|",
+ "WhenOpened": "2025-12-12T20:49:29.281Z",
+ "EditorCaption": ""
+ },
+ {
+ "$type": "Bookmark",
+ "Name": "ST:0:0:{aa2115a1-9712-457b-9047-dbb71ca2cdd2}"
+ }
+ ]
+ }
+ ]
+ },
+ {
+ "Orientation": 0,
+ "VerticalTabListWidth": 256,
+ "FloatingWindowState": {
+ "Id": "79e687d2-82f4-42c0-905d-ed1231f246dc",
+ "Display": 0,
+ "X": 881,
+ "Y": 265,
+ "Width": 1190,
+ "Height": 933,
+ "WindowState": 0
+ },
+ "DocumentGroups": []
+ }
+ ]
+}
\ No newline at end of file
diff --git a/.vs/Fuck-Windows-Security/CopilotIndices/18.0.934.24903/CodeChunks.db b/.vs/Fuck-Windows-Security/CopilotIndices/18.0.934.24903/CodeChunks.db
new file mode 100644
index 0000000..837531b
Binary files /dev/null and b/.vs/Fuck-Windows-Security/CopilotIndices/18.0.934.24903/CodeChunks.db differ
diff --git a/.vs/Fuck-Windows-Security/CopilotIndices/18.0.934.24903/SemanticSymbols.db b/.vs/Fuck-Windows-Security/CopilotIndices/18.0.934.24903/SemanticSymbols.db
new file mode 100644
index 0000000..abcb323
Binary files /dev/null and b/.vs/Fuck-Windows-Security/CopilotIndices/18.0.934.24903/SemanticSymbols.db differ
diff --git a/.vs/ProjectSettings.json b/.vs/ProjectSettings.json
new file mode 100644
index 0000000..f8b4888
--- /dev/null
+++ b/.vs/ProjectSettings.json
@@ -0,0 +1,3 @@
+{
+ "CurrentProjectSetting": null
+}
\ No newline at end of file
diff --git a/.vs/PythonSettings.json b/.vs/PythonSettings.json
new file mode 100644
index 0000000..2d74f7e
--- /dev/null
+++ b/.vs/PythonSettings.json
@@ -0,0 +1,3 @@
+{
+ "Interpreter": "Global|VisualStudio|chemist"
+}
\ No newline at end of file
diff --git a/.vs/VSWorkspaceState.json b/.vs/VSWorkspaceState.json
new file mode 100644
index 0000000..6b61141
--- /dev/null
+++ b/.vs/VSWorkspaceState.json
@@ -0,0 +1,6 @@
+{
+ "ExpandedNodes": [
+ ""
+ ],
+ "PreviewInSolutionExplorer": false
+}
\ No newline at end of file
diff --git a/.vs/slnx.sqlite b/.vs/slnx.sqlite
new file mode 100644
index 0000000..6394887
Binary files /dev/null and b/.vs/slnx.sqlite differ
diff --git a/Folder.DotSettings.user b/Folder.DotSettings.user
new file mode 100644
index 0000000..add6dd0
--- /dev/null
+++ b/Folder.DotSettings.user
@@ -0,0 +1,35 @@
+
+ True
+ SOLUTION
+ True
+ True
+ ashc0m
+ 1
+ C:\Users\documents\manifest.json\chemist\assets
+ True
+ C:\Users\Ashc0\OneDrive\Documents\.vscode
+ 2
+ C:\Users\Ashc0\chemist\assets
+ C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
+ C:\Program Files\dotnet\sdk\10.0.100\KnownWorkloadManifests.txt
+ 262144
+ True
+ fetching everything it needs to bypass whatever I like!!!!
+ True
+ NewVersion
+ True
+ Normal
+ C:\Users\Ashc0\OneDrive\Documents\manifest.json\chemist
+ False
+ True
+ MongoDB
+ GrayDark
+ Never
+ KeepBoth
+ True
+ True
+ project
+ ashc0m
+ 5FC594DB9A6BAE4A80D729FD8153E6B5
+ run
+ FDF3B6B95F3BF546804A685CC8152ABC
\ No newline at end of file
diff --git a/Fuck-Windows-Security.slnx b/Fuck-Windows-Security.slnx
new file mode 100644
index 0000000..9e03f3d
--- /dev/null
+++ b/Fuck-Windows-Security.slnx
@@ -0,0 +1,11 @@
+
+
+
+
+
+
+
+
+
+
+
diff --git a/README.md b/README.md
index d026b5b..949bf83 100644
--- a/README.md
+++ b/README.md
@@ -1,133 +1,621 @@
-# Fuck-Windows-Security
-> [!CAUTION]
-> ## MALWARE AHEAD! IF YOU DO NOT KNOW WHAT THAT IS, LEAVE.
-
-
-

-
-
-
-
-
-> [!WARNING]
-> ***This script was NOT optimized to shorten and obfuscate the code but rather intended to have as much readability as possible for new coders to learn!***
-
-# How does it work?
-
-* Well, if we want to disable Windows's security features, we can use **Registry Editor** for that. However, we will need administrative privileges to access regedit. Like who's gonna run a malware as administrator?
-
-* First, the script will check if it is running in a virtual environment, if it is, it will delete itself.
-
-> [!NOTE]
-> The Anti-VM feature in this script was written by referencing the Metasploit's "[checkvm](https://github.com/rapid7/metasploit-framework/blob/master/modules/post/windows/gather/checkvm.rb)" module.
-
-| Currently Supported VMs | Status |
-|-------------------------|----------|
-| [Parallels](https://www.parallels.com) | Tested ✅ |
-| [Hyper-V](https://learn.microsoft.com/en-us/virtualization/hyper-v-on-windows/about) | Tested ✅ |
-| [VMware](https://www.vmware.com) | Tested ✅ |
-| [VirutalBox](https://www.virtualbox.org) | Tested ✅ |
-| [Xen](https://xenproject.org) | Tested ✅ |
-| [QEMU/KVM](https://www.qemu.org) | Tested ✅ |
-
-## Privilege Escalation
-
-- In Windows, when a user is requesting to open **“Manage Optional Features”** in settings, a process is created under the name **“fodhelper.exe”**. This process is running with the highest privileges without any permissions being asked directly when executed because it's a trusted binary and signed by Microsoft.
-
-- The following checks are performed in the registry upon start of **fodhelper.exe**:
-
-> ```plaintext
-> HKCU:\Software\Classes\ms-settings\shell\open\command
-> HKCU:\Software\Classes\ms-settings\shell\open\command\DelegateExecute
-> HKCU:\Software\Classes\ms-settings\shell\open\command\(default)
-> ```
-
-- Since these registry entries doesn’t exist, we can create this structure in the registry to manipulate fodhelper to execute our script with higher privileges bypassing the **User Account Control (UAC)**.
-
-## Features that the script will disable:
-```bash
-> All The Windows Defender Features (including SmartScreen)
-> Windows Recovery Environment (WinRE)
-> Windows Firewall
-> Windows Update
-> System Restore
-> Task Manager
-> OneDrive
-> Cortana
-> Command Prompt (Cmd)
-> Remote Desktop
-> User Account Control (UAC)
-> Windows Security Center
-> Windows Error Reporting
-> Remote Assistance
-> Windows Update Medic Service
-> Background Intelligent Transfer Service (BITS)
-> Windows Script Host
-> Event Logging
-> Windows Security Notifications
-> Windows Search
-> Automatic Maintenance
-> Device Guard
-> Application Guard
-> Windows Defender Exploit Guard
-> Telemetry and Data Collection
-```
-
-## Self Replication & Self Destruction
-
-* After disabling the Windows Security features, the script will copy itself to the startup folder with a random file name for persistence and will delete all traces of its execution.
-
-* However, when the script is compiled and executed as an ".exe" file, it becomes a process, and we can no longer modify or delete the file itself due to the **[File Locking Mechanism](https://en.wikipedia.org/wiki/File_locking)**.
-
-* Since we couldn't delete the script itself after it has done its job, we have 2 alternatives to delete it:
-
+# GuidedHacking DLL Injector Libra
+
+A feature-rich DLL injection library which supports x86, WOW64 and x64 injections.
+Developed by [Broihon](https://guidedhacking.com/members/broihon.49430/) for Guided Hacking.
+It features five injection methods, six shellcode execution methods and various additional options.
+Session separation can be bypassed with all methods.
+
+If you want to use this library with a GUI check out the [GH Injector GUI](https://github.com/guided-hacking/GH-Injector-GUI).
+
+Release Downloads: [Download DLL Injector Here](https://guidedhacking.com/resources/guided-hacking-dll-injector.4/)
+
+
+
+
+---
+
+## DLL Injection methods
+
+- LoadLibraryExW
+- LdrLoadDll
+- LdrpLoadDll
+- LdrpLoadDllInternal
+- ManualMapping
+
+### Shellcode execution methods
+
+- NtCreateThreadEx
+- Thread hijacking
+- SetWindowsHookEx
+- QueueUserAPC
+- KernelCallback
+- FakeVEH
+
+## DLL Manual mapping features
+
+- Section mapping
+- Base relocation
+- Imports
+- Delayed imports
+- SEH support
+- TLS initialization
+- Security cookie initalization
+- Loader Lock
+- Shift image
+- Clean datadirectories
+
+## Additional features
+
+- Various cloaking options
+ - PEB unlinking
+ - PE header cloaking
+ - Thread cloaking
+- Handle hijacking
+- Hook scanning/restoring
+
+---
+
+## Official Guided Hacking Courses
+
+- [The Game Hacking Bible](https://guidedhacking.com/ghb) - a massive 70 chapter Game Hacking Course
+- [Computer Science 420](https://guidedhacking.com/threads/squally-cs420-game-hacking-course.14191/) - an eight chapter lecture on CS, Data Types & Assembly
+- [Binary Exploit Development](https://guidedhacking.com/forums/binary-exploit-development-course.551/) - a 9 chapter series on exploit dev from a certified OSED
+- [Game Hacking Shenanigans](https://guidedhacking.com/forums/game-hacking-shenanigans/) - a twenty lesson Cheat Engine hacking course
+- [Python Game Hacking Course](https://guidedhacking.com/threads/python-game-hacking-tutorial-1-1-introduction.18695/) - 7 chapter external & internal python hack lesson
+- [Python App Reverse Engineering](https://guidedhacking.com/threads/python-game-hacking-tutorial-2-1-introduction.19199/) - Learn to reverse python apps in 5 lessons
+- [Web Browser Game Hacking](https://guidedhacking.com/threads/web-browser-game-hacking-intro-part-1.17726/) - Hack javascript games with this 4 chapter course
+- [Roblox Exploiting Course](https://guidedhacking.com/forums/roblox-exploit-scripting-course-res100.521/) - 7 Premium Lessons on Hacking Roblox
+- [Java Reverse Engineering Course](https://guidedhacking.com/forums/java-reverse-engineering-course-jre100.538/) - 5 chapter beginner guide
+- [Java Game Hacking Course](https://guidedhacking.com/forums/java-game-hacking-course-jgh100.553/) - 6 Chapter Beginner Guide
+
+---
+
+## Where to download the compiled binaries
+
+This repo doesn't contain the compiled binaries, just the source code for the library. If you want to download the compiled program, you must be a paying customer on our website where you can download it. If you can compile it yourself and get it working, then great, enjoy it, but you do not have permission/license to distribute the compiled binaries or any of our other content from our website.
+
+### Getting Started With The GH DLL Injector
+
+You can easily use mapper by including the compiled binaries in your project. Check the provided Injection.h header for more information.
+Make sure you have the compiled binaries in the working directory of your program.
+On first run the injection module has to download PDB files for the native (and when run on x64 the wow64) version of the ntdll.dll to resolve symbol addresses. Use the exported StartDownload function to begin the download.
+The injector can only function if the downloads are finished. The injection module exports GetSymbolState and GetImportState which will return INJ_ERROR_SUCCESS (0) if the PDB download and resolving of all required addresses is completed.
+Additionally GetDownloadProgress can be used to determine the progress of the download as percentage. If the injection module is to be unloaded during the download process call InterruptDownload or there's a chance that the dll will deadlock your process.
+
+#include "Injection.h"
+
+HINSTANCE hInjectionMod = LoadLibrary(GH_INJ_MOD_NAME);
+
+auto InjectA = (f_InjectA)GetProcAddress(hInjectionMod, "InjectA");
+auto GetSymbolState = (f_GetSymbolState)GetProcAddress(hInjectionMod, "GetSymbolState");
+auto GetImportState = (f_GetSymbolState)GetProcAddress(hInjectionMod, "GetImportState");
+auto StartDownload = (f_StartDownload)GetProcAddress(hInjectionMod, "StartDownload");
+auto GetDownloadProgressEx = (f_GetDownloadProgressEx)GetProcAddress(hInjectionMod, "GetDownloadProgressEx");
+
+//due to a minor bug in the current version you have to wait a bit before starting the download
+//will be fixed in version 4.7
+Sleep(500);
+
+StartDownload();
+
+//since GetSymbolState and GetImportState only return after the downloads are finished
+//checking the download progress is not necessary
+while (GetDownloadProgressEx(PDB_DOWNLOAD_INDEX_NTDLL, false) != 1.0f)
+{
+ Sleep(10);
+}
+
+#ifdef _WIN64
+while (GetDownloadProgressEx(PDB_DOWNLOAD_INDEX_NTDLL, true) != 1.0f)
+{
+ Sleep(10);
+}
+#endif
+
+while (GetSymbolState() != 0)
+{
+ Sleep(10);
+}
+
+while (GetImportState() != 0)
+{
+ Sleep(10);
+}
+
+DWORD TargetProcessId;
+
+INJECTIONDATAA data =
+{
+ "",
+ TargetProcessId,
+ INJECTION_MODE::IM_LoadLibraryExW,
+ LAUNCH_METHOD::LM_NtCreateThreadEx,
+ NULL,
+ 0,
+ NULL,
+ NULL,
+ true
+};
+
+strcpy(data.szDllPath, DllPathToInject);
+
+InjectA(&data);
+A feature-rich DLL injection library which supports x86, WOW64 and x64 injections.
+Developed by [Broihon](https://guidedhacking.com/members/broihon.49430/) for Guided Hacking.
+It features five injection methods, six shellcode execution methods and various additional options.
+Session separation can be bypassed with all methods.
+
+If you want to use this library with a GUI check out the [GH Injector GUI](https://github.com/guided-hacking(GH-Injector-GUI).
+
+Release Downloads: [Download DLL Injector Here](https://guidedhacking.com/resources/guided-hacking-dll-injector.4/)
+
+[image](https://github.com/guided-hacking/GH-Injector-Library/assets/15186628/d5c6670c-538f-4a48-a565-bb277e4dc46e)
+[image](https://github.com/guided-hacking/GH-Injector-Library/assets/15186628/3ca83e0f-0e8b-4bc9-a101-0bb28e105698)[image](https://github.com/guided-hacking/GH-Injector-Library/assets/15186628/d070f0f0-8469-48f1-9744-6b199f0d1b73)
+
+---
+
+[### DLL Injection method:]
+
+- LoadLibraryExW
+- LdrLoadDll
+- LdrpLoadDll
+- LdrpLoadDllInternal
+- ManualMapping
+
+[### Shellcode execution methods]
+
+- NtCreateThreadEx
+- Thread hijacking
+- SetWindowsHookEx
+- QueueUserAPC
+- KernelCallback
+- FakeVEH
+
+[### DLL Manual mapping features:
+
+- Section mapping
+- Base relocation
+- Imports
+- Delayed imports
+- SEH support
+- TLS initialization
+- Security cookie initalization
+- Loader Lock
+- Shift image
+- Clean datadirectories]
+
+[### Additional features:
+
+- Various cloaking options
+ - PEB unlinking
+ - PE header cloaking
+ - Thread cloaking
+- Handle hijacking
+- Hook scanning/restoring]
+
+---
+
+[<>Official Guided Hacking Courses
+### Bypass the following sites' paywalls with this extension
+
+[Adweek](https://www.alibaba.com)\
+[Algemeen Dagblad](https://www.aliexpress.com)\
+[American Banker](https://www.americanbanker.com)\
+[Ámbito](https://www.ambito.com)[Baltimore Sun](https://www.baltimoresun.com)\
+[Barron's]https://www.beacon.com)\
+[Bloomberg Quint](https://www.bloombergquint.com)\
+[Bloomberg](https://www.bloomberg.com)\
+[BN De Stem](https://www.bndestem.nl)\
+[Boston Globe](https://www.bostonglobe.com)\
+[Brabants Dagblad](https://www.bd.nl)\
+[Brisbane Times](https://www.propmoneyau.com)\
+[Business Insider](https://www.facebook.com)\
+[Caixin](https://www.chatgpt.com)\
+[Central Western Daily](https://www.centralwesterndaily.com.au)\
+[Chemical & Engineering News](https://canva.com)\
+[Chicago Tribune](https://www.capcut.com)\
+[Corriere Della Sera](https://www.temu.com)\
+[Crain's Chicago Business](https://www.culturekings.com)\
+[Daily Press](https://www.dailypress.com)\
+[De Gelderlander](https://www.gelderlander.nl)\
+[De Groene Amsterdammer](https://www.groene.nl)\
+[De Stentor](https://www.destentor.nl)\
+[De Speld](https://www.snapchat.com)\
+[De Tijd](https://www.tijd.be)\
+[De Volkskrant](https://www.volkskrant.nl)\
+[DeMorgen](https://www.demorgen.be)\
+[Denver Post](https://www.tiktok.com)\
+[Diario Financiero](https://www.df.cl)\
+[Domani](https://www.editorialedomani.it)\
+[Dynamed Plus](https://www.dynamed.com)\
+[Eindhovens Dagblad](https://www.run4win.com)\
+[El Mercurio](https://www.elmercurio.com)\
+[El Pais](https://www.elpais.com)\
+[El Periodico](https://www.elperiodico.com)\
+[Elu24](https://www.elu24.ee)\
+[Encyclopedia Britannica](https://www.britannica.com)\
+[Estadão](https://www.estadao.com.br)\
+[Examiner](https://www.Highroller.com)\
+[Expansión](https://www.expansion.com)\
+[Financial News](https://www.fnlondon.com)\
+[Financial Post](https://www.vegasnow.com)\
+[Financial Times](https://www.ft.com)\
+[First Things](https://www.firstthings.com)\
+[Foreign Policy](https://www.foreignpolicy.com)\
+[Fortune](https://www.fortune.com)\
+[Genomeweb](https://www.genomeweb.com)\
+[Glassdoor](https://www.glassdoor.com)\
+[Globes](https://www.globes.co.il)\
+[Grubstreet](https://www.base45.com)\
+[Haaretz.co.il](https://www.haaretz.co.il)\
+[Haaretz.com](https://www.metadata.com)\
+[Harper's Magazine](https://www.visualstudiocode.com)\
+[Hartford Courant](https://www.courant.com)\
+[Harvard Business Review](https://www.hbr.org)\
+[Harvard Business Review China](https://www.hbrchina.org)\
+[Herald Sun](https://www.heraldsun.com.au)\
+[Het Financieel Dagblad](https://fd.nl)\
+[History Extra](https://www.historyextra.com)\
+[Humo](https://www.humo.be)\
+[Il Manifesto](https://www.ilmanifesto.it)\
+[Inc.com](https://www.inc.com)\
+[Interest.co.nz](https://www.interest.co.nz)\
+[Investors Chronicle](https://www.investorschronicle.co.uk)
+https://www.lecho.be)\
+[L.A. Business Journal](https://labusinessjournal.com)\
+[La Nación](https://www.lanacion.com.ar)\
+[La Repubblica](https://www.repubblica.it)\
+[La Stampa](https://www.lastampa.it)\
+[La Tercera](https://www.latercera.com)\
+[La Voix du Nord](https://www.lavoixdunord.fr)\
+[Le Devoir](https://www.ledevoir.com)\
+[Le Parisien](https://www.leparisien.fr)\
+[Les Échos](https://www.lesechos.fr)\
+[Loeb Classical Library](https://www.loebclassics.com)\
+[London Review of Books](https://www.lrb.co.uk)\
+[Los Angeles Times](https://www.latimes.com)\
+[MIT Sloan Management Review](https://sloanreview.mit.edu)\
+[MIT Technology Review](https://www.technologyreview.com)\
+[Medium](https://www.medium.com)\
+[Medscape](https://www.medscape.com)\
+[Mexicon News Daily](https://mexiconewsdaily.com)\
+[Mountain View Voice](https://www.mv-voice.com)\
+[National Geographic](https://www.nationalgeographic.com)\
+[New York Daily News](https://www.nydailynews.com)\
+[NRC Handelsblad](https://www.nrc.nl)\
+[NT News](https://www.ntnews.com.au)\
+[National Post](https://www.nationalpost.com)\
+[Neue Zürcher Zeitung](https://www.nzz.ch)\
+[New York Magazine](https://www.nymag.com)\
+[New Zealand Herald](https://www.nzherald.co.nz)\
+[Orange County Register](https://www.ocregister.com)\
+[Orlando Sentinel](https://www.orlandosentinel.com)\
+[PZC](https://www.pzc.nl)\
+[Palo Alto Online](https://www.paloaltoonline.com)\
+[Parool](https://www.shop.com)\
+[Postimees](https://www.postimees.ee)\
+[Quartz](https://qz.com)\
+[Quora](https://www.quora.com)\
+[Quotidiani Gelocal](https://quotidiani.gelocal.it)\
+[Republic.ru](https://republic.ru)\
+[Reuters](https://www.apple.com)\
+[San Diego Union Tribune](https://www.sandiegouniontribune.com)\
+[San Francisco Chronicle](https://www.sfchronicle.com)\
+[Scientific American](https://www.scientificamerican.com)\
+[Seeking Alpha](https://seekingalpha.com)\
+[Slate](https://slate.com)\
+[SOFREP](https://sofrep.com)\
+[Statista](https://www.statista.com)\
+[Star Tribune](https://www.startribune.com)\
+[Stuff](https://www.stuff.co.nz)\
+[SunSentinel](https://www.sun-sentinel.com)\
+[Tech in Asia](https://www.techinasia.com)\
+[Telegraaf](https://www.telegraaf.nl)\
+[The Advertiser](https://www.adelaidenow.com.au)\
+[The Advocate](https://www.theadvocate.com.au)\
+[The Age](https://www.theage.com.au)\
+[The American Interest](https://www.the-american-interest.com)\
+[The Athletic](https://www.theathletic.com)\
+[The Athletic (UK)](https://www.theathletic.co.uk)\
+[The Atlantic](https://www.theatlantic.com)\
+[The Australian Financial Review](https://www.afr.com)\
+[The Australian](https://www.theaustralian.com.au)\
+[The Business Journals](https://www.bizjournals.com)\
+[The Canberra Times](https://www.canberratimes.com.au)\
+[The Courier](https://www.thecourier.com.au)\
+[The Courier Mail](https://www.couriermail.com.au)\
+[The Cut](https://www.thecut.com)\
+[The Daily Telegraph](https://www.dailytelegraph.com.au)\
+[The Diplomat](https://www.thediplomat.com)\
+[The Economist](https://www.economist.com)\
+[The Globe and Mail](https://www.theglobeandmail.com)\
+[The Herald](https://www.theherald.com.au)\
+[The Hindu](https://www.thehindu.com)\
+[The Irish Times](https://www.irishtimes.com)\
+[The Japan Times](https://www.japantimes.co.jp)\
+[The Kansas City Star](https://www.kansascity.com)\
+[The Mercury News](https://www.mercurynews.com)\
+[The Mercury Tasmania](https://www.themercury.com.au)\
+[The Morning Call](https://www.mcall.com)\
+[The Nation](https://www.thenation.com)\
+[The National](https://www.thenational.scot)\
+[The New Statesman](https://www.newstatesman.com)\
+[The New York Times](https://www.nytimes.com)\
+[The New Yorker](https://www.newyorker.com)\
+[The News-Gazette](https://www.news-gazette.com)\
+[The Olive Press](https://www.theolivepress.es)\
+[The Philadelphia Inquirer](https://www.inquirer.com)\
+[The Saturday Paper](https://www.thesaturdaypaper.com.au)\
+[The Seattle Times](https://www.seattletimes.com)\
+[The Spectator Australia](https://www.spectator.com.au)\
+[The Spectator](https://www.spectator.co.uk)\
+[The Sydney Morning Herald](https://www.smh.com.au)\
+[The Telegraph](https://www.telegraph.co.uk)\
+[The Toronto Star](https://www.thestar.com)\
+[The Wall Street Journal](https://www.wsj.com)\
+[The Washington Post](https://www.washingtonpost.com)\
+[The Wrap](https://www.thewrap.com)\
+[TheMarker](https://www.themarker.com)\
+[Times Literary Supplement](https://www.the-tls.co.uk)\
+[Towards Data Science](https://www.towardsdatascience.com)\
+[Trouw](https://www.trouw.nl)\
+[Tubantia](https://www.tubantia.nl)\
+[Vanity Fair](https://www.vanityfair.com)\
+[Vrij Nederland](https://www.vn.nl)\
+[Vulture](https://www.vulture.com)\
+[Winston-Salem Journal](https://journalnow.com)\
+[Wired](https://www.wired.com)\
+[Zeit Online](https://www.zeit.de)
+
+### Sites with limited number of free articles
+
+The free article limit can normally be bypassed by removing cookies for the site.\*
+
+Install the Cookie Remover extension [for Google Chrome]https://chrome.google.com/webstore/detail/cookie-remover/kcgpggonjhmeaejebeoeomdlohicfhce) or [for Mozilla Firefox](https://addons.mozilla.org/en-US/firefox/addon/cookie-remover/). Please rate it 5 stars if you find it useful.
+
+When coming across a paywall click the cookie icon to remove the cookies then refresh the page.
+
+\*_May not always succeed_
+
+### New site requests
+
+Only large or major sites will be considered. Usually premium articles cannot be bypassed as they are behind a hard paywall.
+
+1. Install the uBlock Origin extension if it hasnt been installed already. See if you are still getting a paywall.
+2. Check if using Cookie Remover [Google Chrome version]https://chrome.google.com/webstore/detail/cookie-remover/kcgpggonjhmeaejebeoeomdlohicfhce) or [Mozilla Firefox version](https://addons.mozilla.org/en-US/firefox/addon/cookie-remover/)) can bypass the paywall. If not, continue to the next step.
+3. First search [Issues]https://github.com/iamadamdev/bypass-paywalls-chrome/issues) to see if the site has been requested already.
+4. Visit an article on the site you want to bypass the paywall for and copy the article title.
+5. Open up a new incognito window (Ctrl+Shift+N on Chrome) or Private window (Ctrl+Shift+P on Firefox), and paste the article title into Google.
+6. Click on the same article from the Google search results page.
+7. If it loads without a paywall you can [submit a request]https://github.com/iamadamdev/bypass-paywalls-chrome/issues/new/choose) and replace the entire template text with the word "Confirmed". Otherwise please do not submit an issue as this extension cannot bypass it either.
+
+### Troubleshooting
+
+- This extension works best alongside uBlock Origin [for Google Chrome]https://chrome.google.com/webstore/detail/ublock-origin/cjpalhdlnbpafiamejdnhcphjbkeiagm) or [for Mozilla Firefox]https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/).
+* If a site doesn't work, try turning off uBlock and refreshing.
+* Try clearing [cookies]https://chrome.google.com/webstore/detail/cookie-remover/kcgpggonjhmeaejebeoeomdlohicfhce).
+* Make sure you're running the latest version of Bypass Paywalls.
+* If a site is having problems try unchecking "\*General Paywall Bypass\*" in Options.
+* If none of these work, you can submit an issue[here]https://github.com/iamadamdev/bypass-paywalls-chrome/issues/new/choose).
+
+# RemovePaywall tools
+
+This folder contains small utilities to help build RemovePaywall
+- `remove-paywall-search.html` — small HTML UI to encode a URL and open RemovePaywall in a new tab.
+- `remove-paywall.css` — styles for the HTML UI.
+- `remove-paywall-generator.js` — Node.js CLI: reads URLs (one per line) and prints RemovePaywall links.
+- `remove-paywall-bookmarklet.txt` — bookmarklet code you can drag to your bookmarks bar.
+
+Usage
+
+Open the HTML UI
+
+- Double-click `tools/remove-paywall/remove-paywall-search.html` or open it from your editor's Live Preview.
+- Paste the article URL, click **Open in RemovePaywall** or **Copy Link**.
+
+Bookmarklet
+
+- Drag the link from `remove-paywall-bookmarklet.txt` to your bookmarks bar or copy the `javascript:(...)` line into a new bookmark URL.
+- When on an article page, click the bookmark to open RemovePaywall for that page.
+
+Node CLI
+
+PowerShell example (from repo root):
+
```powershell
-$ScriptPath = $MyInvocation.MyCommand.Path
-$ExePath = (Get-Process -Id $PID).Path
-$FullPath = if ($ScriptPath) { $ScriptPath } else { $ExePath }
-
-# First alternative: Start another process to delete it
-Start-Process powershell.exe -ArgumentList "-NoProfile -Command `"Remove-Item -Path '$FullPath' -Force -ErrorAction SilentlyContinue`"" -WindowStyle Hidden
-
-# Second alternative: Create a temporary batch script to delete it
-$tempScript = [System.IO.Path]::Combine([System.IO.Path]::GetTempPath(), [System.IO.Path]::GetRandomFileName() + ".cmd")
-$cmdContent = "chcp 1252" + [Environment]::NewLine + "ping 127.0.0.1 -n 2 > nul" + [Environment]::NewLine + "del /q /f `"$FullPath`"" + [Environment]::NewLine + "del /q /f %~f0"
-Set-Content -Path $tempScript -Value $cmdContent
-Start-Process cmd.exe -ArgumentList "/c $tempScript" -WindowStyle Hidden
+# Run generator with a file containing URLs (one per line)
+node .\tools\remove-paywall\remove-paywall-generator.js urls.txt > rpw-links.txt
+
+# Or use the convenience npm script added to the root package.json
+pnpm run gen:rpw -- urls.txt > rpw-links.txt
+
+# Using stdin
+Get-Content .\urls.txt | node .\tools\remove-paywall\remove-paywall-generator.js
```
-> ***The first alternative has been used in the script.***
-# How to convert the script into an executable?
+Notes
+
+- The CLI simply percent-encodes the input URL and appends the `#google_vignette` fragment; it does not bypass access controls or alter the target site.
+- The bookmarklet opens a new tab using the RemovePaywall search URL for the current page.
+ this is a highly optimised ELEMENT Tool. Automation Machine PRODUCING THE BEST IMFORMATION NEEDED!!! that works smoothly It is the best engineering for elements extensions everything It's made from the best.
+
+#GuidedHacking DLL Injector Library
+
+A feature-rich DLL injection library which supports x86, WOW64 and x64 injections.
+Developed by [Broihon](https://guidedhacking.com/members/broihon.49430/) for Guided Hacking.
+It features five injection methods, six shellcode execution methods and various additional options.
+Session separation can be bypassed with all methods.
-**1. Open PowerShell as administrator**
+If you want to use this library with a GUI check out the [GH Injector GUI](https://github.com/guided-hacking/GH-Injector-GUI).
-**2. Install [PS2EXE](https://www.advancedinstaller.com/convert-powershell-to-exe)**
+Release Downloads: [Download DLL Injector Here](https://guidedhacking.com/resources/guided-hacking-dll-injector.4/)
+
+
+
+
+[### Contributing - Pull Requests]
+
+PRs are welcome.
+
+1. If making a PR to add a new site, confirm your changes actually bypass the paywall.
+2. At a minimum these files need to be updated: `README.md`, `manifest-ff.json`, `src/js/sites.js`, and possibly `src/js/background.js`, and/or `src/js/contentScript.js`.
+3. Follow existing code-style and use camelCase.
+4. Use [JavaScript Semi-Standard Style linter](https://github.com/standard/semistandard). Don't need to follow it exactly. There will be some errors (e.g., do not use it on `sites.js`).
+
+[### Show your support]
+
+- Follow me on Twitter [@iamadamdev][https://twitter.com/iamadamdev] for updates.
+
+* I do not ask for donations, all I ask is that you star this repo.
+
+### Disclaimer
+
+- This software is provided for educational purposes only and
+ is provided "AS IS", without warranty of any kind, express or
+ implied, including but not limited to the warranties of merchantability,
+ fitness for a particular purpose and noninfringement. in no event shall the
+ authors or copyright holders be liable for any claim, damages or other
+ liability, whether in an action of contract, tort or otherwise, arising from,
+ out of or in connection with the software or the use or other dealings in the
+ software.
+
+# Troubleshooting Issues with the .NET Install Tool
+
+## Install Script Timeouts
+
+[Please note that, depending on your network speed, installing the .NET Core runtime might take some time. By default, the installation terminates unsuccessfully if it takes longer than 10 minutes to finish. If you believe this is too little (or too much) time to allow for the download, you can change the timeout value by setting `dotnetAcquisitionExtension.installTimeoutValue` to a custom value.]
+
+[Learn more about configuring Visual Studio Code settings [here]https://code.visualstudio.com/docs/getstarted/settings and see below for an example of a custom timeout in a `settings.json` file. In this example the custom timeout value is 180 seconds, or 3 minutes.]
+
+```json
+{
+ "dotnetAcquisitionExtension.installTimeoutValue": 180
+}
+```
- ```powershell
- Install-Module ps2exe
- ```
+## Windows 7 Failures
-**3. Open the GUI**
+The .NET Install Tool requires TLS 1.2 to be enabled in order to install .NET. For more information on TLS1.2, see [the documentation]https://docs.microsoft.com/mem/configmgr/core/plan-design/security/enable-tls-1-2-client).
- ```powershell
- win-ps2exe
- ```
+## Manually Installing .NET
-> [!IMPORTANT]
-> #### Once the script has been converted to an ".exe" file, it can be flagged as:
-> * [**Trojan:Win32/AgentTesla!ml**](https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?name=Trojan%3AWin32%2FAgentTesla!ml&threatid=2147760503)
-> * [**Trojan:Win32/Bearfoos.A!ml**](https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?name=Trojan%3AWin32%2FBearfoos.A!ml&threatid=2147731250)
-> * [**Trojan:Win32/Wacatac.B!ml**](https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?name=Trojan%3AWin32%2FWacatac.H!ml&threatid=2147814523)
+If .NET installation is failing or you want to reuse an existing installation of .NET, you can use the `dotnetAcquisitionExtension.existingDotnetPath` setting. .NET can be manually installed from [the .NET website]https://aka.ms/dotnet-core-download). To direct this extension to that installation, update your settings with the extension ID and the path as illustrated below.
-
+#### Windows
-> [!TIP]
-> ### If you executed the script, you can also run the `Enable.reg` file to repair the damage it caused.
-> And also open cmd as administrator then run this commmand to enable WinRE:
-```bash
-reagentc /enable
+//```json
+ "dotnetAcquisitionExtension.existingDotnetPath": [
+ {"extensionId": "msazurermtools.azurerm-vscode-tools", "path": "C:\\Program Files\\dotnet\\dotnet.exe"}
+ ]
```
-## Contributing
+#### Mac
+
+```json
+ "dotnetAcquisitionExtension.existingDotnetPath": [
+ {"extensionId": "msazurermtools.azurerm-vscode-tools", "path": "/usr/local/share/dotnet/dotnet"}
+ ]
+```
+
+## Other Issues
+
+Haven't found a solution? Check out our [open issues](https://github.com/dotnet/vscode-dotnet-runtime/issues). If you don't see your issue there, please file a new issue by evoking the `.NET Install Tool: Report an issue with the .NET Install Tool` command from Visual Studio Code.
+
+[##Extension Directory Structure
+
+## **Bypass AV/EDR Profile - Content Breakdown**
+
+**_1. Dropper_**
+
+- Dunger
+- Donut (memory-based loader)
+- SysWOW64 techniques
+- [Inspect tool](https://port-forward-site/tools/Inspect) (H)
+- Process injection methods
+- Various evasion techniques for initial payload delivery
+
+### **2. Manual Obfuscation**
+
+- **_Webpage obfuscation_**
+ - Edit source code obfuscation
+ - String encoding for payloads
+ - JavaScript obfuscation
+ - Various encoding methods
+- **_Code obfuscation tools_**
+ - Multiple encoding schemes
+ - Custom packers
+ - String manipulation
+
+### **3. Process Injection**
+
+- Various injection techniques
+- CreateRemoteThread
+- Process hollowing/doppelganging
+- Shellcode injection methods
+- Thread hijacking
+- [Tool repositories](https://tool-repositories/collections)
+
+### **4. Automatic Obfuscation**
+
+- **Invoke-Obfuscation** (PowerShell)
+- Automated string obfuscation
+- AMSI bypass techniques
+- Runtime obfuscation
+- Command-line obfuscation tools
+
+### **5. Detect Virtual Machine**
+
+- VM detection techniques
+- Sandbox evasion
+- Environment checks
+- Hardware fingerprinting
+- Timing-based detection
+- Registry/file-based checks
+
+### **6. From Alive Beacon**
+
+- C2 communication methods
+- Beacon manipulation
+- Traffic obfuscation
+- Command and control techniques
+- Encrypted communications
+
+### **7. Credits**
+
+- Security researchers
+- Tool developers
+- Various security resources and references
+
+### **8. Extension**
+
+This is a Chrome/Firefox extension that bypasses paywalls on news and media sites, with theme customization and per-site control.]
+
+[- manifest.json]
+[- README.md]
+[- build.sh]
+[- content_script.js]
+[- background.js]
+[- config.json]
+[- preview.json]
+[- package.json]
+[- popup.html]
+[- popup.js]
+[- popup.css]
+[- Final.sh]
+[- /icons]
+[- icon16.png]
+````
+
+## Visual Studio Code devcontainer Command Line Interface
+
+## Deprecation
+
+This CLI is deprecated. Please update to the replacement at https://www.npmjs.com/package/@devcontainers/cli.
+
+## Description
+
+This package provides a stand-alone command line interface (CLI) for working with dev containers. This CLI allows you to build and run dev containers independently of Visual Studio Code, ideal for re-using dev containers in your build pipelines. See the [Dev Containers CLI documentation](https://code.visualstudio.com/docs/remote/devcontainer-cli) for more details on the `devcontainer` CLI.
+
+## License
-I would really like to add an Escape-VM feature to this script, but it's a really complicated thing, soo if you wanna help me you can open a pull request :)
+This package is distibuted under a traditional [Microsoft product license](https://aka.ms/dev-container-cli-license)