ThreateningYeti
NSudo
ThreateningYeti | NSudo | |
---|---|---|
1 | 8 | |
54 | 1,622 | |
- | - | |
0.0 | 6.1 | |
almost 4 years ago | over 1 year ago | |
C++ | C++ | |
GNU General Public License v3.0 only | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
ThreateningYeti
-
I Did Research On Respondus Lockdown Browser
With this new information, I was interested in seeing if this software is as air-tight as Respondus markets it to be. After all, with all these compromises in privacy, it must offer a secure testing environment, right? Well… Researching for “Lockdown Browser bypass tools” lead to me this archived project by TheateningYeti on GitHub. This software is one of many bypass tools authored with the sole purpose of rending Lockdown Browser useless. It should be noted that to avoid accusations of academic dishonesty I will solely be covering this out project, as an example of a bypass tool, as it is outdated and no longer effective. I will not be providing any existing tools nor will do I endorse the use of such software. This project has since been discontinued as, according to ThreateningYeti, “...cat and mouse game has gone too far to publicly release an open-source bypass.”. In other words, this project was not discounted due to it being impossible to create a bypass tool for Lockdown Browser, but rather because the work did not continue as, to ThreateningYeti, the rewards were not worth the effort. Why is this important then? This project is of vital importance as it demonstrates just how ineffective the Lockdown Browser can be and bypass tools are not the only way of mitigating this software either. The Linux and Unix Users Group at Virginia Tech states on their wiki that
NSudo
-
COD.exe priority set to "Low"
Before you update you could try starting Task Manager with NSudo under the SYSTEM account. Might bypass that access is denied error.
-
Am I out of my mind, or just paranoid? (Ntlite, MSMG Tookit, etc)
NSudo is Open Source
-
Is GenP 2.7 actually ZLoader Campaign malware?
That file is NSudo, an open source sudo-like tool for Windows. If GenP were malicious, it would most likely be the other files, not NSudo.
-
Interested in Windows 11 cuz the UI is beautiful but does it really good than windows 10?
And I have that batch file in the same folder as NSudoLC.exe when extracted from the latest NSudo release from https://github.com/M2Team/NSudo/releases This should also work fine on 10.
-
Ran a script to disable windows defender, i think i fucked up
i looked up the code a bit and it actually disables the defender.. the only red flag here IMO is it disables a lot of protection like network firewalls too, so now you won't get any alert for threats and intrusions, and it downloads(see this and this ) a tool your local machine though, but it is an opensource tool which is used to access high privileged files commonly used by developers to test and debug.. other than that it doesn't send any info from your machine to any external servers.
- NSudo - Series of Admin tools for Windows
-
AWESOME WINDOWS TOOLS
NSudo - A Powerful System Administration Tool.
-
WinDefend Service Deleted
You could always manually re-create the service referencing a clean windows 10 image (services.msc). I should probably note that this service is generally owned by Trusted Installer and should be re-created with the same privileges to avoid any conflicts (or security holes). Worse case scenario run Services.msc with NSUDO https://github.com/M2Team/NSudo
What are some alternatives?
x64dbg - An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
Defeat-Defender-V1.2.0 - Powerful batch script to dismantle complete windows defender protection and even bypass tamper protection ..Disable Windows-Defender Permanently....Hack windows. POC
yuzu - Nintendo Switch emulator
NickelMenu - The easiest way to launch scripts, change settings, and run actions on Kobo e-readers.
CPlusPlusThings - C++那些事
shournal - Log shell-commands and used files. Snapshot executed scripts. Fully automatic.
carbon-lang - Carbon Language's main repository: documents, design, implementation, and related tools. (NOTE: Carbon Language is experimental; see README)
farmhash
NSudo - [Deprecated, work in progress alternative: https://github.com/M2Team/NanaRun] Series of System Administration Tools
ZeroNet - ZeroNet - Decentralized websites using Bitcoin crypto and BitTorrent network
Win-Debloat-Tools - Re-imagining Windows like a minimal OS install, already debloated with minimal impact for most functionality.
WinPriv - WinPriv is a utility that can enable privileges and virtually alter registry settings within a target process, amongst other things.