Python complex tool ideas?
Do you have any ideas for tools that could be created? I've already suggested a key logger.
Thanks in advance
(just for the knowledge xD)
Do you have any ideas for tools that could be created? I've already suggested a key logger.
Thanks in advance
(just for the knowledge xD)
I've coded a script in Firefox that's supposed to be activated by a button using the onclick event. However, I keep getting the following error message in Firefox: Uncaught ReferenceError: splitString is not defined, onclick file:///C:/Users/user/Desktop/Neues Textdokument.html:1. Everything worked fine in the W3Schools Editor. How can I fix the error? <button onclick="splitString()">button</button> <div id="div"></div> <script>…
I have implemented a linked list myself, with nodes and so on how heavy is stack and queue now
Is there a script that allows a player to write ".Dis" to get kicked? (Studio/Exploiting)
Hello. I want to program a Connect 4 game that can be played over the network using this TCP stuff with a server and client. I've already managed to get a running Connect 4 game, but without creating a server and client, let alone connecting them. Can someone please help me? I've been trying various…
Hello, I'm currently creating a program with C# that inserts data I enter into Excel. To use Excel, I installed the EPPlus NuGet package. There were some issues with access (data protection). Therefore, I wanted to insert the Excel file directly into Visual Studio and edit it directly. To do this, I went to the…
I've developed a website that uses Google icons. The icons display flawlessly when viewed from a desktop browser. If you start the website with Chrome from an Android phone, the display works the same, but on some Android phones the icons are only displayed as rectangles. The icons are only displayed when you explicitly access…
A small ransome product Total OS incl. user data encoded and displays a warning message when the computer is started, where it is important that everything is encrypted.
Since you do not have to bypass anti-malware protection and also do not have to cause the victim to install the malware, this should be possible.