Discord Server Red Security Twitter Donation to Red Security Red Security Youtube Channel Red Security Tumblr Profile
Windscribe
Login or Register to Hide ads and Accessing all features on the forum
Welcome, Guest
You have to register before you can post on our site.

Username
  

Password
  





Search Forums

(Advanced Search)

Forum Statistics
» Members: 2,399
» Latest member: Mosgorkabelgot
» Forum threads: 1,141
» Forum posts: 2,111

Full Statistics

Online Users
There are currently 24 online users.
» 0 Member(s) | 21 Guest(s)
Google, SEMrush, Yandex

Latest Threads
Download Privacy Microsof...
Forum: General
Last Post: JJAskiz
5 hours ago
» Replies: 0
» Views: 10
How to use three VPN/ Pro...
Forum: General
Last Post: JJAskiz
12-07-2020, 01:08 PM
» Replies: 0
» Views: 470
Good Heavens! 10M Impacte...
Forum: News
Last Post: News
11-21-2020, 04:21 AM
» Replies: 0
» Views: 318
Iowa Hospital Alerts 60K ...
Forum: News
Last Post: News
11-20-2020, 02:36 AM
» Replies: 0
» Views: 138
What is a Crypter
Forum: Help
Last Post: Mr.Kurd
11-18-2020, 07:56 AM
» Replies: 1
» Views: 383
Microsoft releases Chromi...
Forum: Operating Systems
Last Post: ZDNet Linux
11-17-2020, 05:24 PM
» Replies: 0
» Views: 350
How to address inefficien...
Forum: News
Last Post: News
11-16-2020, 12:46 AM
» Replies: 0
» Views: 175
Data of 27 Million Texas ...
Forum: News
Last Post: News
11-15-2020, 11:41 AM
» Replies: 0
» Views: 156
ASUS TM-AC1900 Arbitrary ...
Forum: News
Last Post: News
11-14-2020, 04:40 AM
» Replies: 0
» Views: 184
vb.net php database login
Forum: Visual Basic & .NET Framework
Last Post: viruss
11-12-2020, 02:30 PM
» Replies: 0
» Views: 348

 
Brick Download Privacy Microsoft Windows 10 OS with no spying Telemetry bull shite in it.
Posted by: JJAskiz - 5 hours ago - Forum: General - No Replies

I have looked far and wide on the Clear Net for The Microsoft Windows 10 OS with no spying bull shite Programs/ Software bull shite in it and I have finally found it, Thanks to Linus Tech Tips, Enjoy everyone.

Smile

https://www.youtube.com/watch?v=nwkiU6GG-YU

https://ameliorated.info/

https://git.ameliorated.info/malte/scripts

https://wiki.ameliorated.info/documentation_2004

Extra information.

Default login credentials:
Username: user
Password: malte

Thank you section.

A big thank you Linus Tech Tips for helping us finally find the Microsoft Windows 10 OS with no spying Programs/ Software bull shite in it.

Smile

Please support LinusTechTips by subscribing to their YouTube Channel.

Smile

https://www.youtube.com/channel/UCXuqSBl...-yeJA0Tunw

Also, I big thank you to Ameliorated for editing the Microsoft Windows 10 OS and getting rid of all the spying Programs/ Software bull shite in it, Keep up the great work.

Smile

Print this item

Brick How to use three VPN/ Proxy Programs/ Software all at the same time.
Posted by: JJAskiz - 12-07-2020, 01:08 PM - Forum: General - No Replies

Hi everyone,

I just figured out another way to stay safe online so I decided to post it here on the Red Security Forum for everyone else to do as well to stay safe online too. So this is how to use three VPN/ Proxy Programs/ Software all at once without them interfering with each other method.

Please note: This method is for normal privacy use, Not for illegal use, I don't think it will be safe to use for illegal use but it will be safe to use for normal privacy use.

Step one, First, Run your main VPN Program/ Software first, For example, ExpressVPN, NordVPN, MullvardVPN, ProtonVPN, CyberGhost VPN Program/ Software, Or whatever other main VPN Program/ Software that you use.

Then step 2. Run the Psiphon3 VPN/ Proxy Program/ Software.

Step 3. Run the Opera Web Browser VPN Program/ Software.

And done, You are now running three VPN Programs/Softwares at the same time. (The Opera Web Browser VPN Program/ Software is optional, You can just use two VPN/ Proxy Programs/ Software if you want but that is up to you).

Please note: This was only tested on the Microsoft Windows 10 Pro OS, I am not sure if it will work on the Linux Distros/ OS since the Psiphon3 Program/ Software only works on Microsoft Windows 10 OS (For now). You can try doing this on the Linux Distros/ OS too with another VPN/ Proxy Program/ Software similar to the Psiphon3 VPN/ Proxy Program/ Software and see if it works or not, Then you can come back here and let us know.

Please also note: The Psiphon3 VPN/ Proxy Program/ Software and the Opera VPN/ Proxy Program/ Software may log IP Addresses so never use them alone without activating your main VPN Program/ Software that logs no IP Addresses and etc... First, So you are completely safe online.

Enjoy,

Smile

JJAskiz.



Attached Files Thumbnail(s)
   
Print this item

Star Good Heavens! 10M Impacted in Pray.com Data Exposure
Posted by: News - 11-21-2020, 04:21 AM - Forum: News - No Replies

Good Heavens! 10M Impacted in Pray.com Data Exposure

The information exposed in a public cloud bucket included PII, church-donation information, photos and users' contact lists.


https://threatpost.com/10m-impacted-pray...ure/161459

Print this item

Star Iowa Hospital Alerts 60K Individuals Affected by June Data Breach
Posted by: News - 11-20-2020, 02:36 AM - Forum: News - No Replies

Iowa Hospital Alerts 60K Individuals Affected by June Data Breach

The data breach began with a compromised employee email account.


https://www.darkreading.com/attacks-brea...id/1339497

Print this item

Brick Microsoft releases Chromium-based Edge preview for Linux
Posted by: ZDNet Linux - 11-17-2020, 05:24 PM - Forum: Operating Systems - No Replies

Microsoft releases Chromium-based Edge preview for Linux

Microsoft is releasing its promised first preview of its new Edge browser for Linux. Here's how to kick the tires.


https://www.zdnet.com/article/microsoft-...RSSbaffb68

Print this item

  What is a Crypter
Posted by: RipSky - 11-16-2020, 10:48 AM - Forum: Help - Replies (1)

What is a crypter?
A Crypter is a software used to hide our viruses, keyloggers or any RAT tool
from antiviruses so that they are not detected and deleted by antiviruses.
Thus, a crypter is a program that allows users to crypt the source code of their program.
Generally, antivirus work by splitting source code of application and then search for
certain string within source code. If antivirus detects any certain malicious strings,
it either stops the scan or deletes the file as virus from system.
Thus a crypter basically makes an infected file FUD or UD by encrypting it.

What does UD and FUD mean?
UD means undetectable, so only a few antivirus programs detect it.
FUD is acronym for Fully UnDetectable, so no antivirus detect it. I reccomend to scan all the
files you crypt on  .Also make sure you check the box
"Do not distribute sample"

Also as a headsup please DO NOT scan your crypted servers on "Virus Total" as they
send over all the infected files to the antivirus companies,thus spelling doom for the
"FUDness" of your crypter.

What does a crypter really do?
A Crypter simply assigns hidden values to each individual code within source code. Thus,
the source code becomes hidden. Hence, our sent crypted trojan and virus bypass antivirus
detection and our purpose of hacking them is fulfilled without any AV (Anti Virus) hindrance.
Not only does this crypter hide source code, it will unpack the encryption once the program is
executed.

How does a crypter really work?
As some of you must be wondering,how does a crypter do the wonderful job of hiding your
infected servers,away from the preying eyes of the antiviruses?
Well, the basic working of a crypter is explained below.

The Crypter takes the original binary file of you exe and applies many encryptions on it
and stores on the end of file(EOF).So a new crypted executable file is created.


The new exe is not detected by antiviruses because its code is scrambled by the crypter.
When executed the new .exe file decrypts the binary file into small data small pieces
at a time and injects them into another already existing process or a new empty one,
OR it drops the code into multiple chunks in alternative data streams(not scanned by most a/v)
then executes it as a .txt or .mp3 file.

Can I hide my crypted files in another program?
The simple answer to this is yes.For this we can make the use of file binders.Some crypters come
inbuilt with binders,some are not,but we can easily use a binder program to meet our purpose.
A file binder is very self explanatory.It binds,or puts two files together as one,hence when one
opens this "binded" file,two files will execute at once. A binder makes a server look even more stealthy,
than just a simply crypted file.

What are the parts of a crypter?
Generally a crypter has two parts

°A client,
°A stub.

The client is the interface where we may upload our file and use the options it brings,
according to the programmer that made the crypter and crypt our files.

The stub is an executable file(.exe) or a. Dll some times.
This file is used as a filter for files that are uploaded to the client crypter

What are the types of crypters?
Well crypters can be broadly classified into the following types:
Types of Crypter

° External Stub
° Internal Stub
° Runtime
° Scantime

External Stub : Well most of you have downloaded a public crypter by now and when you open the
folder you have seen 2 things:

1.Client.exe and 2.Stub.exe

These type of crypters are called External Crypter in which the functionality of the crypter pretty
much depends on the external stub.
You delete the stub and the crypter is useless.

Internal Stub : The crypters that contain only Client.exe fall under this category.
In this the stub is coded within the crypter.

Print this item

Star How to address inefficiencies of using multiple cybersecurity systems
Posted by: News - 11-16-2020, 12:46 AM - Forum: News - No Replies

How to address inefficiencies of using multiple cybersecurity systems

Like us on Facebook @ /HackRead


https://www.hackread.com/address-ineffic...ty-systems

Print this item

Star Data of 27 Million Texas Drivers Compromised in Breach
Posted by: News - 11-15-2020, 11:41 AM - Forum: News - No Replies

Data of 27 Million Texas Drivers Compromised in Breach

An unauthorized person appears to have gained entry to insurance software firm Vertafore and compromised the driver's license information of over 27 million Texas


https://www.bankinfosecurity.com/data-27...ch-a-15367

Print this item

Star ASUS TM-AC1900 Arbitrary Command Execution - CXSecurity.com
Posted by: News - 11-14-2020, 04:40 AM - Forum: News - No Replies

ASUS TM-AC1900 Arbitrary Command Execution - CXSecurity.com

b1ack0wl has realised a new security note ASUS TM-AC1900 Arbitrary Command Execution


https://cxsecurity.com/issue/WLB-2020110103

Print this item

  vb.net php database login
Posted by: viruss - 11-12-2020, 02:30 PM - Forum: Visual Basic & .NET Framework - No Replies

Code:
<?php

/* Connent Database */
$con = new mysqli('localhost', 'dbuser', 'db password', 'dbname');
$con->set_charset('utf-8');
if ($con->connect_error) {
    die($con->connect_error);
}

$action = ($_GET['action'] != null) ? $_GET['action'] : null;
$username = ($_GET['username'] != null) ? $_GET['username'] : null;
$password = ($_GET['password'] != null) ? $_GET['password'] : null;



if ($action != '' && $username != '' && $password != '') {
    switch ($action) {
        case 'register':
            $result = $con->query("SELECT * FROM member WHERE username='{$username}'");
            if ($result->num_rows == 0) {
                $con->query("INSERT INTO make_your_table_name (username,password) VALUES ('{$username}','{$password}')");
                echo 'success';
            } else {
                echo 'Plase Try Again.';
            }
            break;
        case 'login':
            $result = $con->query("SELECT * FROM grabinfo WHERE username='{$username}' AND password='{$password}'");
            if ($result->num_rows > 0) {
                echo 'success';
            } else {
                echo 'incorrect';
            }
            break;

        default:
            echo 'invalid action';
            break;
    }


}

vb.net code
2 textboxes 2 buttons
button1 text reg_user
button2 name login_user
textbox1.text
textbox2.text
form1.vb

Code:
Public Class Form1

    Private Sub Button1_Click(sender As Object, e As EventArgs) Handles Button1.Click
        Dim webbrowser1 As New WebBrowser
        webbrowser1.Navigate("https://haxcore.net/try10/reg_user.php?action=register&username=" & TextBox1.Text & "&password=" & TextBox2.Text)

        Do While webbrowser1.ReadyState <> WebBrowserReadyState.Complete
            Application.DoEvents()
        Loop
        If webbrowser1.DocumentText.Contains("success") Then
            MessageBox.Show("User successfully registered, you can now log in", "E-mail / username already exists", MessageBoxButtons.OK, MessageBoxIcon.Error)

            ' Me.Hide()
        ElseIf webbrowser1.DocumentText.Contains("FINISHED") Then
            MessageBox.Show("This e-mail and / or the username already exists in our database!", "Registration successful", MessageBoxButtons.OK, MessageBoxIcon.Information)
        End If
    End Sub

    Private Sub Button2_Click(sender As Object, e As EventArgs) Handles Button2.Click
        Dim wClient As New System.Net.WebClient
        Dim result As String = wClient.DownloadString("https://haxcore.net/try10/reg_user.php?action=login&username=" + TextBox1.Text + "&password=" + TextBox2.Text)
        If result = "success" Then
            MessageBox.Show("Login Success", "", MessageBoxButtons.OK, MessageBoxIcon.Information)
        Else
            MessageBox.Show("Username And Password Incorrect.", "", MessageBoxButtons.OK, MessageBoxIcon.Warning)
        End If
    End Sub
End Class

reg_user output
   

login_user output
   

got to line number 24 in form1.vb hit enter use arrow key up then add form2.show

Print this item