Happy new year together and I hope you had a great transition. A new blogger year is coming up and I try to sweeten you this with refreshing rarities. At the start now: Damned Damned Damned, the debut album by London's The Damned and it was released by Stiff Records and allows me a short info from wiki: In a contemporary review, NME praised the group's musical ability, opining that the Damned have "all the residual skills needed for the actual performance of exhausting modern music", stating that James was the most effective powerhouse guitarist since Pete Townshend and concluding that the album as a whole was "a highly professional production and is much more convincing than some other new wave bands I've heard on record." BBC's retrospective review praised the album's energy, pop satire and general humour, commenting, "Each track featured the hammering toms of Rat Scabies & Captain Sensible's bass-as-guitar propelling Brian James' exhilarating machine gun axe into your living room". The American press has also favored the album. Ned Raggett of AllMusic gave it their highest rating of five stars, calling it "a stone classic of rock & roll fire" and declaring that "Damned Damned Damned is and remains rock at its messy, wonderful best." Pitchfork also positively assessed the album in a negative review of the Damned's 2001 album Grave Disorder, stating, "I won't lie to you: the Damned's new album isn't very good. In fact, the Damned have only ever recorded a few albums that were - for instance, their debut or 1979's Machine Gun Etiquette". Okay, now I'm looking into my treasure chest which album will be my first rip 2019.
Thursday, 3 January 2019
How to install Window 10
There is no doubt that Microsoft Window is the most prevalent among the young people in the office or at the same reason because it comes with a simple interface which is easy to execute but if we talk about window installation Some people here are very upset about this because they think that this is not an easy task and they are afraid of doing this kind of work but today I'll teach how to install window 10 to and believe me it is very easy. So, let's start.
![]() |
| window 10 |
Windows 10 is a series of personal computer operating systems that are manufactured by Microsoft as part of its Windows NT family operating system. It is the successor of Windows 8.1, and was released for manufacturing on July 15, 2015, and was released for sale on July 29, 2015. [8] Windows 10 receives a new build on an ongoing basis, which is available to users at no extra cost.
So, here is the steps to install Window 10
1. Make sure your window 10 installation media is connected.
In order for you to install window 10 your window installation file must be loaded onto your disc or flash drive, and the disc or flash drive must me inserted into your computer.
* If you install from flash drive you must be booted pen drive.
2. Start or Restart your System.
3. Enter in BIOS
This key may also be different key- most computer will display a message on startup that says "press(key) to enter setup" or something similar, so far this, message when your computer restart to confirm the key you should press to access the BIOS.
4. Navigate to the Tab "Boot"
You'll use the arrow keys to select it.
* The boot tab can say boot option instead of the manufacturer of your computer.
5. Select a device from which to boot.
You have a couple of option here:-
a. For a USB flash drive,
Select the Removable devices option.
b. For a disc installation,
Select the CD-ROM drive option.
6. Press the (+) key until boot option first.
Once either Removable device or CD-ROM drive is at the top of the list, your computer will select your choice as its default boot option.
* On some computers you'll press one of the function keys(e.g., F5) to navigate an option up to the top of the menu. The key will be showed on the right side of the screen.
7. Save your Setting.
You Should see a key prompt (e.g.,F10) at the bottom of the screen that correlates to "Save and Exit", pressing it should save your setting and restart your computer.
* You may need to press "ENTER" to save the changes.
8. Wait for computer to restart.
Once your computer finishes restarting. you'll see a window here with your geographical information. you're now ready to begin setting up your Window 10 installation.
9. Part two of two installing.
Click 'Next' when prompted. you can also change the options on this page (like:- the setup language) before continuing if need be.
10. Click "Install Now"
It's in the middle of the window.
11. Enter your window 10 key, then click.
If you don't have a window 10 key, instead click skip in the bottom - right corner of the screen.
12. Click the "Accept" box and click "Next".
This will indicate that you accept the term of use.
13. Click "Upgrade"
At the top it's shows "what type of installation do you want?" window.This option installs window 10 while preserving your files, apps, and setting.
* You can click "Custom" instead to clean install window 10 on your computer. Doing so will prompt you to select partition to format before continuing.
14. Wait for Window 10 to install.
Based on your computer's previous operating system and processing speed, this process can be anywhere from half an hour to several hours.
Based on your computer's previous operating system and processing speed, this process can be anywhere from half an hour to several hours.
* If you are prompted to press the key to boot from the CD, do not press the key.
15. Follow the on-screen setup information.
![]() |
| window 10 select option |
Once window 10 has been installed on your computer, you'll be able to customize it's setting (like, your region, your language, location,etc). once you finished this process, you will be taken to your computer's desktop.
* You can also click express setting to set-up window 10 with the recommended settings.
**Keep Sharing**
Labels:forex, iqoption, pubg Hacked
how to,
PC maintenance,
window 10
Wednesday, 2 January 2019
Badminton League Mod v3.52.3935 Apk Unlimited Money

| Free Download Game Badminton League v3.52.3935 Mod Apk Terbaru Unlimited Money – Kali ini admim akan membagikan game bulutangkis android yang bisa sobat mainkan untuk mengisi waktu luang yaitu Badminton League. Olahraga bulutangkis adalah salah satu olah raga yang populer di dunia setelah sepak bola terutama di Indonesia. Cara bermain game ini juga terbilang cukup gampang dan sama percis seperti olahraga yang aslinya.
Kalian harus mengantisipasi pukulan dan servis yang diberikan oleh lawan dan harus mengalahkan mereka agar dapat memenagnakan pertandingan. Pengembang game android Badminton League adalah RedFish Games.
Dan disini admin akan membagikan versi MOD APK Badminton League secara gratis. Ok langsung saja sobat Download Badminton League 3D Mod Apk Unlimited Gold For Android.
Badminton League Informasi Game Android
- Nama : Badminton League
- Version :3.31.391
- Ukuran : 30 MB
- Android : 4.1 +
- Mode : Offline
- Genre : Balapan
- Upload : 24 September 2018
- Info Lengkap : Playstore
- Hack Modded : Unlimited Money
Fitur:
- Mudah untuk mengontrol, menantang untuk menang
- Sederhana dan elegan desain UI
- Mode permainan multiple menyambut pemain dari semua tingkat
- Cool stunts dan realistis memukul shuttlecock pengalaman
- Berbagai peralatan cantik Bulutangkis, meng-upgrade kemampuan peran
Cara Instal :
- Download Badminton League Mod Apk nya
- Masuk ke Setting / Security / Centang Unknown Source
- Instal File apk nya sampai selesai
- Mainkan Game nya
Download Badminton League Mod v3.52.3935 Server Google Drive:
Video Badminton League Mod Apk:
Metasploit Filesystem and Libraries | Metasploit Tutorials
Understanding the Metasploit Framework Architecture
One can more easily understand the Metasploit architecture by taking a look under its hood. In learning how to use Metasploit, take some time to make yourself familiar with its filesystem and libraries. In Kali Linux and other distros (like Parrot Security OS), Metasploit is provided in the metasploit-framework package and is installed in the /usr/share/metasploit-framework directory.
Metasploit Framework Filesystem
The Metasploit Framework filesystem is laid out in an intuitive manner and is organized by directory. Some of the more important directories are briefly outlined below.
data directory: The data directory contains editable files used by Metasploit to store binaries required for certain exploits, wordlists, images, and more.
![]() |
| data |
![]() |
| documentation |
![]() |
| lib |
![]() |
| modules |
![]() |
| plugins |
![]() |
| scripts |
![]() |
| tools |
There are a number of MSF libraries that allow us to run our exploits without having to write additional code for rudimentary tasks, such as HTTP requests or encoding of payloads. Some of the most important libraries are outlined below.
Rex
* The basic library for most tasks.
* Handles sockets, protocols, text transformations, and others.
* SSL, SMB, HTTP, XOR, Base64, Unicode.
Msf::Core
* Provides the ‘basic’ API.
* Defines the Metasploit Framework.
Msf::Base
* Provides the ‘friendly’ API.
* Provides simplified APIs for use in the Framework.
From Offensive Security
Labels:forex, iqoption, pubg Hacked
Guide,
Metasploit Tutorials
Monday, 31 December 2018
Al-Khaser - Public Malware Techniques used in the Wild: Virtual Machine, Emulation, Debuggers, Sandbox detection
Introduction about Al-Khaser
Al-Khaser is a PoC "malware" application with good intentions that aims to stress your anti-malware system. It performs a bunch of common malware tricks with the goal of seeing if you stay under the radar.
Download Al-Khaser: You can DOWNLOAD and RUN DIRECTLY the latest release here: for Windows 32-bit and 64-bit.
Possible uses:
* You are making an anti-debug plugin and you want to check its effectiveness.
* You want to ensure that your sandbox solution is hidden enough.
* Or you want to ensure that your malware analysis environment is well hidden.
Please, if you encounter any of the anti-analysis tricks which you have seen in a malware, don't hesitate to contribute.
Features of Al-Khaser
Anti-debugging attacks:
* IsDebuggerPresent
* CheckRemoteDebuggerPresent
* Process Environment Block (BeingDebugged)
* Process Environment Block (NtGlobalFlag)
* ProcessHeap (Flags)
* ProcessHeap (ForceFlags)
* NtQueryInformationProcess (ProcessDebugPort)
* NtQueryInformationProcess (ProcessDebugFlags)
* NtQueryInformationProcess (ProcessDebugObject)
* WudfIsAnyDebuggerPresent
* WudfIsKernelDebuggerPresent
* WudfIsUserDebuggerPresent
* NtSetInformationThread (HideThreadFromDebugger)
* NtQueryObject (ObjectTypeInformation)
* NtQueryObject (ObjectAllTypesInformation)
* CloseHanlde (NtClose) Invalide Handle
* SetHandleInformation (Protected Handle)
* UnhandledExceptionFilter
* OutputDebugString (GetLastError())
* Hardware Breakpoints (SEH / GetThreadContext)
* Software Breakpoints (INT3 / 0xCC)
* Memory Breakpoints (PAGE_GUARD)
* Interrupt 0x2d
* Interrupt 1
* Parent Process (Explorer.exe)
* SeDebugPrivilege (Csrss.exe)
* NtYieldExecution / SwitchToThread
* TLS callbacks
* Process jobs
* Memory write watching
* Page exception breakpoint detection
* API hook detection (module bounds based)
Anti-injection:
* Enumerate modules with EnumProcessModulesEx (32-bit, 64-bit, and all options)
* Enumerate modules with ToolHelp32
* Enumerate the process LDR structures with
* LdrEnumerateLoadedModules
* Enumerate the process LDR structures directly
* Walk memory with GetModuleInformation
* Walk memory for hidden modules
Anti-Dumping: Erase PE header from memory and SizeOfImage.
Timing Attacks [Anti-Sandbox]:
* RDTSC (with CPUID to force a VM Exit)
* RDTSC (Locky version with GetProcessHeap & CloseHandle)
* Sleep -> SleepEx -> NtDelayExecution
* Sleep (in a loop a small delay)
* Sleep and check if time was accelerated (GetTickCount)
* SetTimer (Standard Windows Timers) timeSetEvent (Multimedia Timers)
* WaitForSingleObject -> WaitForSingleObjectEx -> NtWaitForSingleObject
* WaitForMultipleObjects -> WaitForMultipleObjectsEx -> NtWaitForMultipleObjects (todo)
* IcmpSendEcho (CCleaner Malware)
* CreateWaitableTimer
* CreateTimerQueueTimer
* Big crypto loops (todo)
Human Interaction / Generic [Anti-Sandbox]:
* Mouse movement
* Total Physical memory (GlobalMemoryStatusEx)
* Disk size using DeviceIoControl (IOCTL_DISK_GET_LENGTH_INFO)
* Disk size using GetDiskFreeSpaceEx (TotalNumberOfBytes)
* Mouse (Single click / Double click) (todo)
* DialogBox (todo)
* Scrolling (todo)
* Execution after reboot (todo)
* Count of processors (Win32/Tinba - Win32/Dyre)
* Sandbox known product IDs (todo)
* Color of background pixel (todo)
* Keyboard layout (Win32/Banload) (todo)
Anti-Virtualization / Full-System Emulation:
* Registry key value artifacts
+ HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0 (Identifier) (VBOX)
+ HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0 (Identifier) (QEMU)
+ HARDWARE\Description\System (SystemBiosVersion) (VBOX)
+ HARDWARE\Description\System (SystemBiosVersion) (QEMU)
+ HARDWARE\Description\System (VideoBiosVersion) (VIRTUALBOX)
+ HARDWARE\Description\System (SystemBiosDate) (06/23/99)
+ HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0 (Identifier) (VMWARE)
+ HARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0 (Identifier) (VMWARE)
+ HARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0 (Identifier) (VMWARE)
+ SYSTEM\ControlSet001\Control\SystemInformation (SystemManufacturer) (VMWARE)
+ SYSTEM\ControlSet001\Control\SystemInformation (SystemProductName) (VMWARE)
* Registry Keys artifacts
+ HARDWARE\ACPI\DSDT\VBOX__ (VBOX)
+ HARDWARE\ACPI\FADT\VBOX__ (VBOX)
+ HARDWARE\ACPI\RSDT\VBOX__ (VBOX)
+ SOFTWARE\Oracle\VirtualBox Guest Additions (VBOX)
+ SYSTEM\ControlSet001\Services\VBoxGuest (VBOX)
+ SYSTEM\ControlSet001\Services\VBoxMouse (VBOX)
+ SYSTEM\ControlSet001\Services\VBoxService (VBOX)
+ SYSTEM\ControlSet001\Services\VBoxSF (VBOX)
+ SYSTEM\ControlSet001\Services\VBoxVideo (VBOX)
+ SOFTWARE\VMware, Inc.\VMware Tools (VMWARE)
+ SOFTWARE\Wine (WINE)
+ SOFTWARE\Microsoft\Virtual Machine\Guest\Parameters (HYPER-V)
...And more. You can read details in here.
Contributors
* mrexodia: Main developer of x64dbg
* Mattiwatti: Matthijs Lavrijsen
* gsuberland: Graham Sutherland
References:
* An Anti-Reverse Engineering Guide By Josh Jackson.
* Anti-Unpacker Tricks By Peter Ferrie.
* The Art Of Unpacking By Mark Vincent Yason.
* Walied Assar's blog.
* Pafish tool.
* PafishMacro by JoeSecurity.
Labels:forex, iqoption, pubg Hacked
windows
Subscribe to:
Comments (Atom)



















