diff --git a/.vs/Fuck-Windows-Security.slnx/FileContentIndex/4346fa76-436e-40ca-865b-603028c625dd.vsidx b/.vs/Fuck-Windows-Security.slnx/FileContentIndex/4346fa76-436e-40ca-865b-603028c625dd.vsidx new file mode 100644 index 0000000..1107659 Binary files /dev/null and b/.vs/Fuck-Windows-Security.slnx/FileContentIndex/4346fa76-436e-40ca-865b-603028c625dd.vsidx differ diff --git a/.vs/Fuck-Windows-Security.slnx/FileContentIndex/52a1edd0-cd2e-43ff-a69a-2a9966972865.vsidx b/.vs/Fuck-Windows-Security.slnx/FileContentIndex/52a1edd0-cd2e-43ff-a69a-2a9966972865.vsidx new file mode 100644 index 0000000..4c36644 Binary files /dev/null and b/.vs/Fuck-Windows-Security.slnx/FileContentIndex/52a1edd0-cd2e-43ff-a69a-2a9966972865.vsidx differ diff --git a/.vs/Fuck-Windows-Security.slnx/FileContentIndex/fdf33932-41c6-458a-b08b-06267ac2ea54.vsidx b/.vs/Fuck-Windows-Security.slnx/FileContentIndex/fdf33932-41c6-458a-b08b-06267ac2ea54.vsidx new file mode 100644 index 0000000..673f62e Binary files /dev/null and b/.vs/Fuck-Windows-Security.slnx/FileContentIndex/fdf33932-41c6-458a-b08b-06267ac2ea54.vsidx differ diff --git a/.vs/Fuck-Windows-Security.slnx/config/applicationhost.config b/.vs/Fuck-Windows-Security.slnx/config/applicationhost.config new file mode 100644 index 0000000..ca16466 --- /dev/null +++ b/.vs/Fuck-Windows-Security.slnx/config/applicationhost.config @@ -0,0 +1,969 @@ + + + + + + +
+
+
+
+
+
+
+
+ + +
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+ +
+
+ +
+
+
+
+
+
+ +
+
+
+
+
+ +
+
+
+ +
+
+ +
+
+ +
+
+
+ + +
+
+
+
+
+
+ +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + diff --git a/.vs/Fuck-Windows-Security.slnx/v18/.suo b/.vs/Fuck-Windows-Security.slnx/v18/.suo new file mode 100644 index 0000000..0a29aad Binary files /dev/null and b/.vs/Fuck-Windows-Security.slnx/v18/.suo differ diff --git a/.vs/Fuck-Windows-Security.slnx/v18/.wsuo b/.vs/Fuck-Windows-Security.slnx/v18/.wsuo new file mode 100644 index 0000000..461321f Binary files /dev/null and b/.vs/Fuck-Windows-Security.slnx/v18/.wsuo differ diff --git a/.vs/Fuck-Windows-Security.slnx/v18/DocumentLayout.backup.json b/.vs/Fuck-Windows-Security.slnx/v18/DocumentLayout.backup.json new file mode 100644 index 0000000..90935aa --- /dev/null +++ b/.vs/Fuck-Windows-Security.slnx/v18/DocumentLayout.backup.json @@ -0,0 +1,177 @@ +{ + "Version": 1, + "WorkspaceRootPath": "D:\\source\\ashc0m-cmd\\Fuck-Windows-Security\\", + "Documents": [ + { + "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\background.json||{14D17961-FE51-464D-9111-C4AF11D7D99A}" + }, + { + "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\scripts.json||{90A6B3A7-C1A3-4009-A288-E2FF89E96FA0}" + }, + { + "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|C:\\Users\\Ashc0\\Downloads\\updates.json||{90A6B3A7-C1A3-4009-A288-E2FF89E96FA0}" + }, + { + "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\assets\\assets\\extension.ini||{3B902123-F8A7-4915-9F01-361F908088D0}" + }, + { + "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\option.js||{14D17961-FE51-464D-9111-C4AF11D7D99A}" + }, + { + "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|C:\\Users\\Ashc0\\source\\repos\\chemtrail\\config.json||{90A6B3A7-C1A3-4009-A288-E2FF89E96FA0}" + }, + { + "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\styles.css||{A5401142-F49D-43DB-90B1-F57BA349E55C}" + }, + { + "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|C:\\Users\\Ashc0\\OneDrive\\Documents\\bypass tech\\Fetch.json||{90A6B3A7-C1A3-4009-A288-E2FF89E96FA0}" + }, + { + "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|C:\\Users\\Ashc0\\OneDrive\\Documents\\GitHub\\n8n\\packages\\nodes-base\\nodes\\Ssh\\__schema__\\v1.0.0\\command\\execute.json||{90A6B3A7-C1A3-4009-A288-E2FF89E96FA0}" + }, + { + "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|C:\\Users\\Ashc0\\source\\repos\\sites.json||{14D17961-FE51-464D-9111-C4AF11D7D99A}" + }, + { + "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\manifest.json||{90A6B3A7-C1A3-4009-A288-E2FF89E96FA0}" + } + ], + "DocumentGroupContainers": [ + { + "Orientation": 0, + "VerticalTabListWidth": 256, + "DocumentGroups": [ + { + "DockedWidth": 200, + "SelectedChildIndex": 3, + "Children": [ + { + "$type": "Document", + "DocumentIndex": 10, + "Title": "manifest.json", + "DocumentMoniker": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\manifest.json", + "ToolTip": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\manifest.json", + "ViewState": "AgIAAAAAAAAAAAAAAAAAABUAAAAtAAAAAAAAAA==", + "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.001642|", + "WhenOpened": "2025-12-11T07:05:11.35Z", + "IsPinned": true + }, + { + "$type": "Document", + "DocumentIndex": 5, + "Title": "config.json", + "DocumentMoniker": "C:\\Users\\Ashc0\\source\\repos\\chemtrail\\config.json", + "ToolTip": "C:\\Users\\Ashc0\\source\\repos\\chemtrail\\config.json", + "ViewState": "AgIAAPMAAAAAAAAAAAAAAAgAAAAtAAAAAAAAAA==", + "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.001642|", + "WhenOpened": "2025-12-11T15:05:57.234Z", + "IsPinned": true + }, + { + "$type": "Document", + "DocumentIndex": 6, + "Title": "styles.css", + "DocumentMoniker": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\styles.css", + "ToolTip": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\styles.css", + "ViewState": "AgIAAAAAAAAAAAAAAAAAACAAAAAJAAAAAAAAAA==", + "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.003000|", + "WhenOpened": "2025-12-12T00:42:00.372Z", + "IsPinned": true + }, + { + "$type": "Document", + "DocumentIndex": 0, + "Title": "background.json", + "DocumentMoniker": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\background.json", + "ToolTip": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\background.json", + "ViewState": "AgIAAAAAAAAAAAAAAAAAAAAAAAAmAAAAAAAAAA==", + "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.001642|", + "WhenOpened": "2025-12-11T14:22:48.086Z", + "IsPinned": true, + "EditorCaption": "" + }, + { + "$type": "Document", + "DocumentIndex": 7, + "Title": "Fetch.json", + "DocumentMoniker": "C:\\Users\\Ashc0\\OneDrive\\Documents\\bypass tech\\Fetch.json", + "ToolTip": "C:\\Users\\Ashc0\\OneDrive\\Documents\\bypass tech\\Fetch.json", + "ViewState": "AgIAAIcAAAAAAAAAAAAAAAQAAAASAAAAAAAAAA==", + "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.001642|", + "WhenOpened": "2025-12-11T14:53:12.673Z", + "IsPinned": true + }, + { + "$type": "Document", + "DocumentIndex": 4, + "Title": "option.js", + "DocumentMoniker": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\option.js", + "ToolTip": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\option.js", + "ViewState": "AgIAAAAAAAAAAAAAAAAuwAoAAAACAAAAAAAAAA==", + "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.001646|", + "WhenOpened": "2025-12-12T17:45:35.788Z", + "IsPinned": true + }, + { + "$type": "Document", + "DocumentIndex": 9, + "Title": "sites.json", + "DocumentMoniker": "C:\\Users\\Ashc0\\source\\repos\\sites.json", + "ToolTip": "C:\\Users\\Ashc0\\source\\repos\\sites.json", + "ViewState": "AgIAAAAAAAAAAAAAAAAAAAsAAAAjAAAAAAAAAA==", + "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.001642|", + "WhenOpened": "2025-12-11T16:38:58.543Z", + "IsPinned": true + }, + { + "$type": "Document", + "DocumentIndex": 2, + "Title": "updates.json", + "DocumentMoniker": "C:\\Users\\Ashc0\\Downloads\\updates.json", + "ToolTip": "C:\\Users\\Ashc0\\Downloads\\updates.json", + "ViewState": "AgIAAAAAAAAAAAAAAAAAAB4AAAABAAAAAAAAAA==", + "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.001642|", + "WhenOpened": "2025-12-12T16:38:14.276Z", + "IsPinned": true + }, + { + "$type": "Bookmark", + "Name": "ST:0:0:{aa2115a1-9712-457b-9047-dbb71ca2cdd2}" + }, + { + "$type": "Document", + "DocumentIndex": 8, + "Title": "execute.json", + "DocumentMoniker": "C:\\Users\\Ashc0\\OneDrive\\Documents\\GitHub\\n8n\\packages\\nodes-base\\nodes\\Ssh\\__schema__\\v1.0.0\\command\\execute.json", + "ToolTip": "C:\\Users\\Ashc0\\OneDrive\\Documents\\GitHub\\n8n\\packages\\nodes-base\\nodes\\Ssh\\__schema__\\v1.0.0\\command\\execute.json", + "ViewState": "AgIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==", + "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.001642|", + "WhenOpened": "2025-12-12T19:33:57.398Z" + }, + { + "$type": "Document", + "DocumentIndex": 3, + "Title": "extension.ini", + "DocumentMoniker": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\assets\\assets\\extension.ini", + "ToolTip": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\assets\\assets\\extension.ini", + "ViewState": "AgIAAAAAAAAAAAAAAAAAABUAAAAzAAAAAAAAAA==", + "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.002768|", + "WhenOpened": "2025-12-12T13:58:07.444Z" + }, + { + "$type": "Document", + "DocumentIndex": 1, + "Title": "scripts.json", + "DocumentMoniker": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\scripts.json", + "ToolTip": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\scripts.json", + "ViewState": "AgIAACkEAAAAAAAAAAAqwMwEAAADAAAAAAAAAA==", + "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.001642|", + "WhenOpened": "2025-12-11T14:25:21.644Z", + "EditorCaption": "" + } + ] + } + ] + } + ] +} \ No newline at end of file diff --git a/.vs/Fuck-Windows-Security.slnx/v18/DocumentLayout.json b/.vs/Fuck-Windows-Security.slnx/v18/DocumentLayout.json new file mode 100644 index 0000000..0fc8d99 --- /dev/null +++ b/.vs/Fuck-Windows-Security.slnx/v18/DocumentLayout.json @@ -0,0 +1,221 @@ +{ + "Version": 1, + "WorkspaceRootPath": "D:\\source\\ashc0m-cmd\\Fuck-Windows-Security\\", + "Documents": [ + { + "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\styles.css||{A5401142-F49D-43DB-90B1-F57BA349E55C}" + }, + { + "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|C:\\Users\\Ashc0\\source\\repos\\chemtrail\\config.json||{90A6B3A7-C1A3-4009-A288-E2FF89E96FA0}" + }, + { + "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\manifest.json||{90A6B3A7-C1A3-4009-A288-E2FF89E96FA0}" + }, + { + "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\assets\\assets\\shield.png||{3B902123-F8A7-4915-9F01-361F908088D0}" + }, + { + "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|C:\\Users\\Ashc0\\OneDrive\\Documents\\bypass tech\\updates.json||{90A6B3A7-C1A3-4009-A288-E2FF89E96FA0}" + }, + { + "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|D:\\source\\ashc0m-cmd\\Fuck-Windows-Security\\.vs\\Fuck-Windows-Security.slnx\\config\\applicationhost.config||{FA3CD31E-987B-443A-9B81-186104E8DAC1}", + "RelativeMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|solutionrelative:.vs\\Fuck-Windows-Security.slnx\\config\\applicationhost.config||{FA3CD31E-987B-443A-9B81-186104E8DAC1}" + }, + { + "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|C:\\Users\\Ashc0\\Downloads\\launch.json||{90A6B3A7-C1A3-4009-A288-E2FF89E96FA0}" + }, + { + "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|C:\\Users\\Ashc0\\OneDrive\\Documents\\bypass tech\\Fetch.json||{90A6B3A7-C1A3-4009-A288-E2FF89E96FA0}" + }, + { + "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|C:\\Users\\Ashc0\\source\\repos\\sites.json||{14D17961-FE51-464D-9111-C4AF11D7D99A}" + }, + { + "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\scripts.json||{90A6B3A7-C1A3-4009-A288-E2FF89E96FA0}" + }, + { + "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\index.json||{90A6B3A7-C1A3-4009-A288-E2FF89E96FA0}" + }, + { + "AbsoluteMoniker": "D:0:0:{A2FE74E1-B743-11D0-AE1A-00A0C90FFFC3}|\u003CMiscFiles\u003E|C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\option.js||{14D17961-FE51-464D-9111-C4AF11D7D99A}" + } + ], + "DocumentGroupContainers": [ + { + "Orientation": 0, + "VerticalTabListWidth": 256, + "DocumentGroups": [ + { + "DockedWidth": 200, + "SelectedChildIndex": 2, + "Children": [ + { + "$type": "Document", + "DocumentIndex": 2, + "Title": "manifest.json", + "DocumentMoniker": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\manifest.json", + "ToolTip": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\manifest.json", + "ViewState": "AgIAAAAAAAAAAAAAAAAAAAsAAAAEAAAAAAAAAA==", + "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.001642|", + "WhenOpened": "2025-12-11T07:05:11.35Z", + "IsPinned": true, + "EditorCaption": "" + }, + { + "$type": "Document", + "DocumentIndex": 1, + "Title": "config.json", + "DocumentMoniker": "C:\\Users\\Ashc0\\source\\repos\\chemtrail\\config.json", + "ToolTip": "C:\\Users\\Ashc0\\source\\repos\\chemtrail\\config.json", + "ViewState": "AgIAAAAAAAAAAAAAAAAAAA0AAAAVAAAAAAAAAA==", + "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.001642|", + "WhenOpened": "2025-12-11T15:05:57.234Z", + "IsPinned": true, + "EditorCaption": "" + }, + { + "$type": "Document", + "DocumentIndex": 0, + "Title": "styles.css", + "DocumentMoniker": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\styles.css", + "ToolTip": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\styles.css", + "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.003000|", + "WhenOpened": "2025-12-12T00:42:00.372Z", + "IsPinned": true + }, + { + "$type": "Document", + "DocumentIndex": 7, + "Title": "Fetch.json", + "DocumentMoniker": "C:\\Users\\Ashc0\\OneDrive\\Documents\\bypass tech\\Fetch.json", + "ToolTip": "C:\\Users\\Ashc0\\OneDrive\\Documents\\bypass tech\\Fetch.json", + "ViewState": "AgIAAA8AAAAAAAAAAAAAAAYAAAAJAAAAAAAAAA==", + "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.001642|", + "WhenOpened": "2025-12-11T14:53:12.673Z", + "IsPinned": true, + "EditorCaption": "" + }, + { + "$type": "Document", + "DocumentIndex": 8, + "Title": "sites.json", + "DocumentMoniker": "C:\\Users\\Ashc0\\source\\repos\\sites.json", + "ToolTip": "C:\\Users\\Ashc0\\source\\repos\\sites.json", + "ViewState": "AgIAAAAAAAAAAAAAAAAAAAMAAAAWAAAAAAAAAA==", + "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.001642|", + "WhenOpened": "2025-12-11T16:38:58.543Z", + "IsPinned": true, + "EditorCaption": "" + }, + { + "$type": "Document", + "DocumentIndex": 9, + "Title": "scripts.json", + "DocumentMoniker": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\scripts.json", + "ToolTip": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\scripts.json", + "ViewState": "AgIAACoDAAAAAAAAAAAqwMwEAAADAAAAAAAAAA==", + "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.001642|", + "WhenOpened": "2025-12-11T14:25:21.644Z", + "IsPinned": true, + "EditorCaption": "" + }, + { + "$type": "Document", + "DocumentIndex": 10, + "Title": "index.json", + "DocumentMoniker": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\index.json", + "ToolTip": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\index.json", + "ViewState": "AgIAAAAAAAAAAAAAAAAAABsAAAANAAAAAAAAAA==", + "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.001642|", + "WhenOpened": "2025-12-12T20:19:13.442Z", + "IsPinned": true, + "EditorCaption": "" + }, + { + "$type": "Document", + "DocumentIndex": 3, + "Title": "shield.png", + "DocumentMoniker": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\assets\\assets\\shield.png", + "ToolTip": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\assets\\assets\\shield.png", + "ViewState": "AgIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==", + "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.001533|", + "WhenOpened": "2025-12-12T13:58:07.444Z", + "IsPinned": true, + "EditorCaption": "" + }, + { + "$type": "Document", + "DocumentIndex": 11, + "Title": "option.js", + "DocumentMoniker": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\option.js", + "ToolTip": "C:\\Users\\Ashc0\\OneDrive\\Documents\\manifest.json\\chemist\\option.js", + "ViewState": "AgIAABQAAAAAAAAAAAAkwAoAAAACAAAAAAAAAA==", + "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.001646|", + "WhenOpened": "2025-12-12T17:45:35.788Z", + "IsPinned": true, + "EditorCaption": "" + }, + { + "$type": "Document", + "DocumentIndex": 6, + "Title": "launch.json", + "DocumentMoniker": "C:\\Users\\Ashc0\\Downloads\\launch.json", + "ToolTip": "C:\\Users\\Ashc0\\Downloads\\launch.json", + "ViewState": "AgIAAAAAAAAAAAAAAAAAAAkAAAAfAAAAAAAAAA==", + "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.001642|", + "WhenOpened": "2025-12-12T23:34:17.671Z", + "IsPinned": true, + "EditorCaption": "" + }, + { + "$type": "Bookmark", + "Name": "ST:0:0:{1c4feeaa-4718-4aa9-859d-94ce25d182ba}" + }, + { + "$type": "Document", + "DocumentIndex": 5, + "Title": "applicationhost.config", + "DocumentMoniker": "D:\\source\\ashc0m-cmd\\Fuck-Windows-Security\\.vs\\Fuck-Windows-Security.slnx\\config\\applicationhost.config", + "RelativeDocumentMoniker": ".vs\\Fuck-Windows-Security.slnx\\config\\applicationhost.config", + "ToolTip": "D:\\source\\ashc0m-cmd\\Fuck-Windows-Security\\.vs\\Fuck-Windows-Security.slnx\\config\\applicationhost.config", + "RelativeToolTip": ".vs\\Fuck-Windows-Security.slnx\\config\\applicationhost.config", + "ViewState": "AgIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==", + "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.000601|", + "WhenOpened": "2025-12-13T00:23:36.084Z", + "EditorCaption": "" + }, + { + "$type": "Document", + "DocumentIndex": 4, + "Title": "updates.json", + "DocumentMoniker": "C:\\Users\\Ashc0\\OneDrive\\Documents\\bypass tech\\updates.json", + "ToolTip": "C:\\Users\\Ashc0\\OneDrive\\Documents\\bypass tech\\updates.json", + "ViewState": "AgIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA==", + "Icon": "ae27a6b0-e345-4288-96df-5eaf394ee369.001642|", + "WhenOpened": "2025-12-12T20:49:29.281Z", + "EditorCaption": "" + }, + { + "$type": "Bookmark", + "Name": "ST:0:0:{aa2115a1-9712-457b-9047-dbb71ca2cdd2}" + } + ] + } + ] + }, + { + "Orientation": 0, + "VerticalTabListWidth": 256, + "FloatingWindowState": { + "Id": "79e687d2-82f4-42c0-905d-ed1231f246dc", + "Display": 0, + "X": 881, + "Y": 265, + "Width": 1190, + "Height": 933, + "WindowState": 0 + }, + "DocumentGroups": [] + } + ] +} \ No newline at end of file diff --git a/.vs/Fuck-Windows-Security/CopilotIndices/18.0.934.24903/CodeChunks.db b/.vs/Fuck-Windows-Security/CopilotIndices/18.0.934.24903/CodeChunks.db new file mode 100644 index 0000000..837531b Binary files /dev/null and b/.vs/Fuck-Windows-Security/CopilotIndices/18.0.934.24903/CodeChunks.db differ diff --git a/.vs/Fuck-Windows-Security/CopilotIndices/18.0.934.24903/SemanticSymbols.db b/.vs/Fuck-Windows-Security/CopilotIndices/18.0.934.24903/SemanticSymbols.db new file mode 100644 index 0000000..abcb323 Binary files /dev/null and b/.vs/Fuck-Windows-Security/CopilotIndices/18.0.934.24903/SemanticSymbols.db differ diff --git a/.vs/ProjectSettings.json b/.vs/ProjectSettings.json new file mode 100644 index 0000000..f8b4888 --- /dev/null +++ b/.vs/ProjectSettings.json @@ -0,0 +1,3 @@ +{ + "CurrentProjectSetting": null +} \ No newline at end of file diff --git a/.vs/PythonSettings.json b/.vs/PythonSettings.json new file mode 100644 index 0000000..2d74f7e --- /dev/null +++ b/.vs/PythonSettings.json @@ -0,0 +1,3 @@ +{ + "Interpreter": "Global|VisualStudio|chemist" +} \ No newline at end of file diff --git a/.vs/VSWorkspaceState.json b/.vs/VSWorkspaceState.json new file mode 100644 index 0000000..6b61141 --- /dev/null +++ b/.vs/VSWorkspaceState.json @@ -0,0 +1,6 @@ +{ + "ExpandedNodes": [ + "" + ], + "PreviewInSolutionExplorer": false +} \ No newline at end of file diff --git a/.vs/slnx.sqlite b/.vs/slnx.sqlite new file mode 100644 index 0000000..6394887 Binary files /dev/null and b/.vs/slnx.sqlite differ diff --git a/Folder.DotSettings.user b/Folder.DotSettings.user new file mode 100644 index 0000000..add6dd0 --- /dev/null +++ b/Folder.DotSettings.user @@ -0,0 +1,35 @@ + + True + SOLUTION + True + True + ashc0m + 1 + C:\Users\documents\manifest.json\chemist\assets + True + C:\Users\Ashc0\OneDrive\Documents\.vscode + 2 + C:\Users\Ashc0\chemist\assets + C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe + C:\Program Files\dotnet\sdk\10.0.100\KnownWorkloadManifests.txt + 262144 + True + fetching everything it needs to bypass whatever I like!!!! + True + NewVersion + True + Normal + C:\Users\Ashc0\OneDrive\Documents\manifest.json\chemist + False + True + MongoDB + GrayDark + Never + KeepBoth + True + True + project + ashc0m + 5FC594DB9A6BAE4A80D729FD8153E6B5 + run + FDF3B6B95F3BF546804A685CC8152ABC \ No newline at end of file diff --git a/Fuck-Windows-Security.slnx b/Fuck-Windows-Security.slnx new file mode 100644 index 0000000..9e03f3d --- /dev/null +++ b/Fuck-Windows-Security.slnx @@ -0,0 +1,11 @@ + + + + + + + + + + + diff --git a/README.md b/README.md index d026b5b..949bf83 100644 --- a/README.md +++ b/README.md @@ -1,133 +1,621 @@ -# Fuck-Windows-Security -> [!CAUTION] -> ## MALWARE AHEAD! IF YOU DO NOT KNOW WHAT THAT IS, LEAVE. -
- - - -
- -
- -> [!WARNING] -> ***This script was NOT optimized to shorten and obfuscate the code but rather intended to have as much readability as possible for new coders to learn!*** - -# How does it work? - -* Well, if we want to disable Windows's security features, we can use **Registry Editor** for that. However, we will need administrative privileges to access regedit. Like who's gonna run a malware as administrator? - -* First, the script will check if it is running in a virtual environment, if it is, it will delete itself. - -> [!NOTE] -> The Anti-VM feature in this script was written by referencing the Metasploit's "[checkvm](https://github.com/rapid7/metasploit-framework/blob/master/modules/post/windows/gather/checkvm.rb)" module. - -| Currently Supported VMs | Status | -|-------------------------|----------| -| [Parallels](https://www.parallels.com) | Tested ✅ | -| [Hyper-V](https://learn.microsoft.com/en-us/virtualization/hyper-v-on-windows/about) | Tested ✅ | -| [VMware](https://www.vmware.com) | Tested ✅ | -| [VirutalBox](https://www.virtualbox.org) | Tested ✅ | -| [Xen](https://xenproject.org) | Tested ✅ | -| [QEMU/KVM](https://www.qemu.org) | Tested ✅ | - -## Privilege Escalation - -- In Windows, when a user is requesting to open **“Manage Optional Features”** in settings, a process is created under the name **“fodhelper.exe”**. This process is running with the highest privileges without any permissions being asked directly when executed because it's a trusted binary and signed by Microsoft. - -- The following checks are performed in the registry upon start of **fodhelper.exe**: - -> ```plaintext -> HKCU:\Software\Classes\ms-settings\shell\open\command -> HKCU:\Software\Classes\ms-settings\shell\open\command\DelegateExecute -> HKCU:\Software\Classes\ms-settings\shell\open\command\(default) -> ``` - -- Since these registry entries doesn’t exist, we can create this structure in the registry to manipulate fodhelper to execute our script with higher privileges bypassing the **User Account Control (UAC)**. - -## Features that the script will disable: -```bash -> All The Windows Defender Features (including SmartScreen) -> Windows Recovery Environment (WinRE) -> Windows Firewall -> Windows Update -> System Restore -> Task Manager -> OneDrive -> Cortana -> Command Prompt (Cmd) -> Remote Desktop -> User Account Control (UAC) -> Windows Security Center -> Windows Error Reporting -> Remote Assistance -> Windows Update Medic Service -> Background Intelligent Transfer Service (BITS) -> Windows Script Host -> Event Logging -> Windows Security Notifications -> Windows Search -> Automatic Maintenance -> Device Guard -> Application Guard -> Windows Defender Exploit Guard -> Telemetry and Data Collection -``` - -## Self Replication & Self Destruction - -* After disabling the Windows Security features, the script will copy itself to the startup folder with a random file name for persistence and will delete all traces of its execution. - -* However, when the script is compiled and executed as an ".exe" file, it becomes a process, and we can no longer modify or delete the file itself due to the **[File Locking Mechanism](https://en.wikipedia.org/wiki/File_locking)**. - -* Since we couldn't delete the script itself after it has done its job, we have 2 alternatives to delete it: - +# GuidedHacking DLL Injector Libra + +A feature-rich DLL injection library which supports x86, WOW64 and x64 injections. +Developed by [Broihon](https://guidedhacking.com/members/broihon.49430/) for Guided Hacking. +It features five injection methods, six shellcode execution methods and various additional options. +Session separation can be bypassed with all methods. + +If you want to use this library with a GUI check out the [GH Injector GUI](https://github.com/guided-hacking/GH-Injector-GUI). + +Release Downloads: [Download DLL Injector Here](https://guidedhacking.com/resources/guided-hacking-dll-injector.4/) + +![image](https://github.com/guided-hacking/GH-Injector-Library/assets/15186628/d5c6670c-538f-4a48-a565-bb277e4dc46e) +![image](https://github.com/guided-hacking/GH-Injector-Library/assets/15186628/3ca83e0f-0e8b-4bc9-a101-0bb28e105698)![image](https://github.com/guided-hacking/GH-Injector-Library/assets/15186628/d070f0f0-8469-48f1-9744-6b199f0d1b73) + +--- + +## DLL Injection methods + +- LoadLibraryExW +- LdrLoadDll +- LdrpLoadDll +- LdrpLoadDllInternal +- ManualMapping + +### Shellcode execution methods + +- NtCreateThreadEx +- Thread hijacking +- SetWindowsHookEx +- QueueUserAPC +- KernelCallback +- FakeVEH + +## DLL Manual mapping features + +- Section mapping +- Base relocation +- Imports +- Delayed imports +- SEH support +- TLS initialization +- Security cookie initalization +- Loader Lock +- Shift image +- Clean datadirectories + +## Additional features + +- Various cloaking options + - PEB unlinking + - PE header cloaking + - Thread cloaking +- Handle hijacking +- Hook scanning/restoring + +--- + +## Official Guided Hacking Courses + +- [The Game Hacking Bible](https://guidedhacking.com/ghb) - a massive 70 chapter Game Hacking Course +- [Computer Science 420](https://guidedhacking.com/threads/squally-cs420-game-hacking-course.14191/) - an eight chapter lecture on CS, Data Types & Assembly +- [Binary Exploit Development](https://guidedhacking.com/forums/binary-exploit-development-course.551/) - a 9 chapter series on exploit dev from a certified OSED +- [Game Hacking Shenanigans](https://guidedhacking.com/forums/game-hacking-shenanigans/) - a twenty lesson Cheat Engine hacking course +- [Python Game Hacking Course](https://guidedhacking.com/threads/python-game-hacking-tutorial-1-1-introduction.18695/) - 7 chapter external & internal python hack lesson +- [Python App Reverse Engineering](https://guidedhacking.com/threads/python-game-hacking-tutorial-2-1-introduction.19199/) - Learn to reverse python apps in 5 lessons +- [Web Browser Game Hacking](https://guidedhacking.com/threads/web-browser-game-hacking-intro-part-1.17726/) - Hack javascript games with this 4 chapter course +- [Roblox Exploiting Course](https://guidedhacking.com/forums/roblox-exploit-scripting-course-res100.521/) - 7 Premium Lessons on Hacking Roblox +- [Java Reverse Engineering Course](https://guidedhacking.com/forums/java-reverse-engineering-course-jre100.538/) - 5 chapter beginner guide +- [Java Game Hacking Course](https://guidedhacking.com/forums/java-game-hacking-course-jgh100.553/) - 6 Chapter Beginner Guide + +--- + +## Where to download the compiled binaries + +This repo doesn't contain the compiled binaries, just the source code for the library. If you want to download the compiled program, you must be a paying customer on our website where you can download it. If you can compile it yourself and get it working, then great, enjoy it, but you do not have permission/license to distribute the compiled binaries or any of our other content from our website. + +### Getting Started With The GH DLL Injector + +You can easily use mapper by including the compiled binaries in your project. Check the provided Injection.h header for more information. +Make sure you have the compiled binaries in the working directory of your program. +On first run the injection module has to download PDB files for the native (and when run on x64 the wow64) version of the ntdll.dll to resolve symbol addresses. Use the exported StartDownload function to begin the download. +The injector can only function if the downloads are finished. The injection module exports GetSymbolState and GetImportState which will return INJ_ERROR_SUCCESS (0) if the PDB download and resolving of all required addresses is completed. +Additionally GetDownloadProgress can be used to determine the progress of the download as percentage. If the injection module is to be unloaded during the download process call InterruptDownload or there's a chance that the dll will deadlock your process. + +#include "Injection.h" + +HINSTANCE hInjectionMod = LoadLibrary(GH_INJ_MOD_NAME); + +auto InjectA = (f_InjectA)GetProcAddress(hInjectionMod, "InjectA"); +auto GetSymbolState = (f_GetSymbolState)GetProcAddress(hInjectionMod, "GetSymbolState"); +auto GetImportState = (f_GetSymbolState)GetProcAddress(hInjectionMod, "GetImportState"); +auto StartDownload = (f_StartDownload)GetProcAddress(hInjectionMod, "StartDownload"); +auto GetDownloadProgressEx = (f_GetDownloadProgressEx)GetProcAddress(hInjectionMod, "GetDownloadProgressEx"); + +//due to a minor bug in the current version you have to wait a bit before starting the download +//will be fixed in version 4.7 +Sleep(500); + +StartDownload(); + +//since GetSymbolState and GetImportState only return after the downloads are finished +//checking the download progress is not necessary +while (GetDownloadProgressEx(PDB_DOWNLOAD_INDEX_NTDLL, false) != 1.0f) +{ + Sleep(10); +} + +#ifdef _WIN64 +while (GetDownloadProgressEx(PDB_DOWNLOAD_INDEX_NTDLL, true) != 1.0f) +{ + Sleep(10); +} +#endif + +while (GetSymbolState() != 0) +{ + Sleep(10); +} + +while (GetImportState() != 0) +{ + Sleep(10); +} + +DWORD TargetProcessId; + +INJECTIONDATAA data = +{ + "", + TargetProcessId, + INJECTION_MODE::IM_LoadLibraryExW, + LAUNCH_METHOD::LM_NtCreateThreadEx, + NULL, + 0, + NULL, + NULL, + true +}; + +strcpy(data.szDllPath, DllPathToInject); + +InjectA(&data); +A feature-rich DLL injection library which supports x86, WOW64 and x64 injections. +Developed by [Broihon](https://guidedhacking.com/members/broihon.49430/) for Guided Hacking. +It features five injection methods, six shellcode execution methods and various additional options. +Session separation can be bypassed with all methods. + +If you want to use this library with a GUI check out the [GH Injector GUI](https://github.com/guided-hacking(GH-Injector-GUI). + +Release Downloads: [Download DLL Injector Here](https://guidedhacking.com/resources/guided-hacking-dll-injector.4/) + +[image](https://github.com/guided-hacking/GH-Injector-Library/assets/15186628/d5c6670c-538f-4a48-a565-bb277e4dc46e) +[image](https://github.com/guided-hacking/GH-Injector-Library/assets/15186628/3ca83e0f-0e8b-4bc9-a101-0bb28e105698)[image](https://github.com/guided-hacking/GH-Injector-Library/assets/15186628/d070f0f0-8469-48f1-9744-6b199f0d1b73) + +--- + +[### DLL Injection method:] + +- LoadLibraryExW +- LdrLoadDll +- LdrpLoadDll +- LdrpLoadDllInternal +- ManualMapping + +[### Shellcode execution methods] + +- NtCreateThreadEx +- Thread hijacking +- SetWindowsHookEx +- QueueUserAPC +- KernelCallback +- FakeVEH + +[### DLL Manual mapping features: + +- Section mapping +- Base relocation +- Imports +- Delayed imports +- SEH support +- TLS initialization +- Security cookie initalization +- Loader Lock +- Shift image +- Clean datadirectories] + +[### Additional features: + +- Various cloaking options + - PEB unlinking + - PE header cloaking + - Thread cloaking +- Handle hijacking +- Hook scanning/restoring] + +--- + +[<>Official Guided Hacking Courses nul" + [Environment]::NewLine + "del /q /f `"$FullPath`"" + [Environment]::NewLine + "del /q /f %~f0" -Set-Content -Path $tempScript -Value $cmdContent -Start-Process cmd.exe -ArgumentList "/c $tempScript" -WindowStyle Hidden +# Run generator with a file containing URLs (one per line) +node .\tools\remove-paywall\remove-paywall-generator.js urls.txt > rpw-links.txt + +# Or use the convenience npm script added to the root package.json +pnpm run gen:rpw -- urls.txt > rpw-links.txt + +# Using stdin +Get-Content .\urls.txt | node .\tools\remove-paywall\remove-paywall-generator.js ``` -> ***The first alternative has been used in the script.*** -# How to convert the script into an executable? +Notes + +- The CLI simply percent-encodes the input URL and appends the `#google_vignette` fragment; it does not bypass access controls or alter the target site. +- The bookmarklet opens a new tab using the RemovePaywall search URL for the current page. + this is a highly optimised ELEMENT Tool. Automation Machine PRODUCING THE BEST IMFORMATION NEEDED!!! that works smoothly It is the best engineering for elements extensions everything It's made from the best. + +#GuidedHacking DLL Injector Library + +A feature-rich DLL injection library which supports x86, WOW64 and x64 injections. +Developed by [Broihon](https://guidedhacking.com/members/broihon.49430/) for Guided Hacking. +It features five injection methods, six shellcode execution methods and various additional options. +Session separation can be bypassed with all methods. -**1. Open PowerShell as administrator** +If you want to use this library with a GUI check out the [GH Injector GUI](https://github.com/guided-hacking/GH-Injector-GUI). -**2. Install [PS2EXE](https://www.advancedinstaller.com/convert-powershell-to-exe)** +Release Downloads: [Download DLL Injector Here](https://guidedhacking.com/resources/guided-hacking-dll-injector.4/) + +![image](https://github.com/guided-hacking/GH-Injector-Library/assets/15186628/d5c6670c-538f-4a48-a565-bb277e4dc46e) +![image](https://github.com/guided-hacking/GH-Injector-Library/assets/15186628/3ca83e0f-0e8b-4bc9-a101-0bb28e105698)![image](https://github.com/guided-hacking/GH-Injector-Library/assets/15186628/d070f0f0-8469-48f1-9744-6b199f0d1b73) + +[### Contributing - Pull Requests] + +PRs are welcome. + +1. If making a PR to add a new site, confirm your changes actually bypass the paywall. +2. At a minimum these files need to be updated: `README.md`, `manifest-ff.json`, `src/js/sites.js`, and possibly `src/js/background.js`, and/or `src/js/contentScript.js`. +3. Follow existing code-style and use camelCase. +4. Use [JavaScript Semi-Standard Style linter](https://github.com/standard/semistandard). Don't need to follow it exactly. There will be some errors (e.g., do not use it on `sites.js`). + +[### Show your support] + +- Follow me on Twitter [@iamadamdev][https://twitter.com/iamadamdev] for updates. + +* I do not ask for donations, all I ask is that you star this repo. + +### Disclaimer + +- This software is provided for educational purposes only and + is provided "AS IS", without warranty of any kind, express or + implied, including but not limited to the warranties of merchantability, + fitness for a particular purpose and noninfringement. in no event shall the + authors or copyright holders be liable for any claim, damages or other + liability, whether in an action of contract, tort or otherwise, arising from, + out of or in connection with the software or the use or other dealings in the + software. + +# Troubleshooting Issues with the .NET Install Tool + +## Install Script Timeouts + +[Please note that, depending on your network speed, installing the .NET Core runtime might take some time. By default, the installation terminates unsuccessfully if it takes longer than 10 minutes to finish. If you believe this is too little (or too much) time to allow for the download, you can change the timeout value by setting `dotnetAcquisitionExtension.installTimeoutValue` to a custom value.] + +[Learn more about configuring Visual Studio Code settings [here]https://code.visualstudio.com/docs/getstarted/settings and see below for an example of a custom timeout in a `settings.json` file. In this example the custom timeout value is 180 seconds, or 3 minutes.] + +```json +{ + "dotnetAcquisitionExtension.installTimeoutValue": 180 +} +``` - ```powershell - Install-Module ps2exe - ``` +## Windows 7 Failures -**3. Open the GUI** +The .NET Install Tool requires TLS 1.2 to be enabled in order to install .NET. For more information on TLS1.2, see [the documentation]https://docs.microsoft.com/mem/configmgr/core/plan-design/security/enable-tls-1-2-client). - ```powershell - win-ps2exe - ``` +## Manually Installing .NET -> [!IMPORTANT] -> #### Once the script has been converted to an ".exe" file, it can be flagged as: -> * [**Trojan:Win32/AgentTesla!ml**](https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?name=Trojan%3AWin32%2FAgentTesla!ml&threatid=2147760503) -> * [**Trojan:Win32/Bearfoos.A!ml**](https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?name=Trojan%3AWin32%2FBearfoos.A!ml&threatid=2147731250) -> * [**Trojan:Win32/Wacatac.B!ml**](https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?name=Trojan%3AWin32%2FWacatac.H!ml&threatid=2147814523) +If .NET installation is failing or you want to reuse an existing installation of .NET, you can use the `dotnetAcquisitionExtension.existingDotnetPath` setting. .NET can be manually installed from [the .NET website]https://aka.ms/dotnet-core-download). To direct this extension to that installation, update your settings with the extension ID and the path as illustrated below. -
+#### Windows -> [!TIP] -> ### If you executed the script, you can also run the `Enable.reg` file to repair the damage it caused. -> And also open cmd as administrator then run this commmand to enable WinRE: -```bash -reagentc /enable +//```json + "dotnetAcquisitionExtension.existingDotnetPath": [ + {"extensionId": "msazurermtools.azurerm-vscode-tools", "path": "C:\\Program Files\\dotnet\\dotnet.exe"} + ] ``` -## Contributing +#### Mac + +```json + "dotnetAcquisitionExtension.existingDotnetPath": [ + {"extensionId": "msazurermtools.azurerm-vscode-tools", "path": "/usr/local/share/dotnet/dotnet"} + ] +``` + +## Other Issues + +Haven't found a solution? Check out our [open issues](https://github.com/dotnet/vscode-dotnet-runtime/issues). If you don't see your issue there, please file a new issue by evoking the `.NET Install Tool: Report an issue with the .NET Install Tool` command from Visual Studio Code. + +[##Extension Directory Structure + +## **Bypass AV/EDR Profile - Content Breakdown** + +**_1. Dropper_** + +- Dunger +- Donut (memory-based loader) +- SysWOW64 techniques +- [Inspect tool](https://port-forward-site/tools/Inspect) (H) +- Process injection methods +- Various evasion techniques for initial payload delivery + +### **2. Manual Obfuscation** + +- **_Webpage obfuscation_** + - Edit source code obfuscation + - String encoding for payloads + - JavaScript obfuscation + - Various encoding methods +- **_Code obfuscation tools_** + - Multiple encoding schemes + - Custom packers + - String manipulation + +### **3. Process Injection** + +- Various injection techniques +- CreateRemoteThread +- Process hollowing/doppelganging +- Shellcode injection methods +- Thread hijacking +- [Tool repositories](https://tool-repositories/collections) + +### **4. Automatic Obfuscation** + +- **Invoke-Obfuscation** (PowerShell) +- Automated string obfuscation +- AMSI bypass techniques +- Runtime obfuscation +- Command-line obfuscation tools + +### **5. Detect Virtual Machine** + +- VM detection techniques +- Sandbox evasion +- Environment checks +- Hardware fingerprinting +- Timing-based detection +- Registry/file-based checks + +### **6. From Alive Beacon** + +- C2 communication methods +- Beacon manipulation +- Traffic obfuscation +- Command and control techniques +- Encrypted communications + +### **7. Credits** + +- Security researchers +- Tool developers +- Various security resources and references + +### **8. Extension** + +This is a Chrome/Firefox extension that bypasses paywalls on news and media sites, with theme customization and per-site control.] + +[- manifest.json] +[- README.md] +[- build.sh] +[- content_script.js] +[- background.js] +[- config.json] +[- preview.json] +[- package.json] +[- popup.html] +[- popup.js] +[- popup.css] +[- Final.sh] +[- /icons] +[- icon16.png] +```` + +## Visual Studio Code devcontainer Command Line Interface + +## Deprecation + +This CLI is deprecated. Please update to the replacement at https://www.npmjs.com/package/@devcontainers/cli. + +## Description + +This package provides a stand-alone command line interface (CLI) for working with dev containers. This CLI allows you to build and run dev containers independently of Visual Studio Code, ideal for re-using dev containers in your build pipelines. See the [Dev Containers CLI documentation](https://code.visualstudio.com/docs/remote/devcontainer-cli) for more details on the `devcontainer` CLI. + +## License -I would really like to add an Escape-VM feature to this script, but it's a really complicated thing, soo if you wanna help me you can open a pull request :) +This package is distibuted under a traditional [Microsoft product license](https://aka.ms/dev-container-cli-license)