You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: Credit.md
+8-2
Original file line number
Diff line number
Diff line change
@@ -4,10 +4,16 @@ This project is built on the shoulders of giants and inspired by the work of man
4
4
5
5
## Bootstrap by twbs
6
6
7
-
We are grateful for the foundational work provided by Bootstrap, a popular open-source toolkit for developing responsive, mobile-first projects on the web. Bootstrap's comprehensive documentation and community support have been invaluable in shaping our project contributing.md and Issue Templates.
7
+
We are grateful for the work provided by Bootstrap, a popular open-source toolkit for developing responsive, mobile-first projects on the web. Bootstrap's comprehensive documentation has been valuable in shaping our project contributing.md and Issue Templates.
We are grateful for the foundational work provided by winPEAS, a perfect open-source tool for scanning dynamic window systems in a responsive, colorful manner. winPEAS's comprehensive documentation has been invaluable in helping indirectly shape our project by allowing escalation and post-exploitation actions.
We would like to extend our sincere thanks to evil3ad for the development and incorporation of Collect-MemoryDump into our main project. This tool has been instrumental in automating the process of memory dump collection, significantly improving our efficiency and effectiveness in forensic investigations.
@@ -16,7 +22,7 @@ We would like to extend our sincere thanks to evil3ad for the development and in
16
22
17
23
## Magnet Forensics
18
24
19
-
Magnet Forensics has been a crucial dependency for our tool, providing essential functionalities that have enriched our capabilities. We are grateful for the following tools from Magnet Forensics that have been integrated into our workflow:
25
+
Magnet Forensics has been a crucial dependency for our tool, providing essential functionalities that have enriched our abilities. We are grateful for the following tools from Magnet Forensics that have been integrated into our workflow:
20
26
21
27
-[MAGNET DumpIt for Windows](https://www.magnetforensics.com/resources/magnet-dumpit-for-windows/)
22
28
-[MAGNET Encrypted Disk Detector](https://www.magnetforensics.com/resources/encrypted-disk-detector/)
This Python script uses the `pyautogui` library to automate the process of enabling the Command Prompt on a Windows system through the Registry Editor. It follows these steps:
4
+
5
+
1.**Wait**: The script starts by waiting for 2 seconds to ensure it's ready to run. This delay can be adjusted based on the system's responsiveness.
6
+
7
+
2.**Open Run Dialog**: It simulates pressing the `Win+R` keys to open the Run dialog box, which is used to execute commands directly from the Windows desktop.
8
+
9
+
3.**Wait for Run Dialog**: After opening the Run dialog, the script waits for 1 second to ensure the dialog is ready to accept input.
10
+
11
+
4.**Type Command**: It then uses `pyautogui.write` to type a command into the Run dialog. This command uses `REG add` to modify the Windows Registry and set the `DisableCMD` value under `HKCU\Software\Policies\Microsoft\Windows\System` to `0`, effectively enabling the Command Prompt. The `/k` switch is used to keep the Command Prompt window open after executing the command.
12
+
13
+
5.**Execute Command**: After typing the command, the script simulates pressing the `Enter` key to execute the command.
14
+
15
+
6.**Wait for Command Execution**: It waits for 5 seconds to allow the command to execute and the Command Prompt window to open. This delay can vary based on system performance and the time it takes for the Registry change to take effect.
16
+
17
+
7.**Close Command Prompt**: Once the Command Prompt window is open, the script simulates pressing `Alt+F4` to close the window.
18
+
19
+
8.**Wait for Window Closure**: Finally, it waits for 2 seconds to ensure the Command Prompt window is closed before proceeding.
20
+
21
+
9.**Print Completion Message**: The script prints a message indicating that the command has been executed to enable the Command Prompt, and the window has been closed.
22
+
23
+
## Usage
24
+
25
+
This script is useful for automating the process of enabling the Command Prompt on a Windows system, which can be particularly helpful in environments where the Command Prompt is disabled by default. It provides a quick and efficient way to re-enable the Command Prompt without manually navigating through the Registry Editor or Group Policy settings.
26
+
27
+
However, it's important to note that modifying the Windows Registry can have significant effects on the system's behavior and security. Therefore, this script should be used with caution and understanding of the implications. Additionally, the use of `pyautogui` for automating keyboard and mouse inputs can be affected by screen resolution, DPI settings, and other factors, so it may require adjustments for different systems or environments.
This batch script is designed to manage the Windows Defender signatures on a Windows system. It checks if Windows Defender signatures are already removed and then either reinstalls them or removes all signature updates, depending on the current state. Here's a detailed breakdown of its functionality:
4
+
5
+
## Script Breakdown
6
+
7
+
### `@echo off`
8
+
9
+
This command turns off the display of commands in the command prompt window, making the output cleaner and easier to read.
10
+
11
+
### `setlocal`
12
+
13
+
This command starts a new local environment for the batch file. Variables and environment changes made within this script will not affect the global environment.
14
+
15
+
### `for /f "tokens=*"`
16
+
17
+
This loop iterates over the output of the command enclosed in parentheses. The `tokens=*` option ensures that the entire line is treated as a single token, allowing the script to work with the full output of the command.
This command runs the Windows Defender `MpCmdRun.exe` utility with the `-ShowSignatureUpdates` option, which checks for available signature updates. The output of this command is processed by the `for` loop.
22
+
23
+
### `if "%%a"=="No signature updates are available."`
24
+
25
+
This conditional statement checks if the output from the `MpCmdRun.exe` command indicates that no signature updates are available. If this condition is true, it means that Windows Defender signatures are already removed.
26
+
27
+
### `echo Signature updates are already removed. Reinstalling now...`
28
+
29
+
If the signatures are already removed, the script echoes a message indicating that it will now reinstall the signatures.
This command runs the `MpCmdRun.exe` utility with the `-RemoveDefinitions -All` options, which removes all signature updates from Windows Defender.
46
+
47
+
### `endlocal`
48
+
49
+
This command ends the local environment started by `setlocal`, returning control to the global environment.
50
+
51
+
## Usage
52
+
53
+
This script is useful for managing Windows Defender signatures, especially in scenarios where you need to ensure that all signature updates are removed or reinstated. It provides a straightforward way to check the current state of Windows Defender signatures and perform the necessary action based on that state.
54
+
55
+
However, it's important to use such scripts with caution, as removing or reinstalling Windows Defender signatures can affect the system's security and functionality. Always ensure that you understand the implications of these actions and consider the security requirements of your system.
Copy file name to clipboardExpand all lines: EXTRA/What Is This.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ All tools are archived, to use them extract them to the same directory... Still
18
18
19
19
3.**Following On-Screen Instructions:** After executing the script, follow the on-screen instructions provided by the tool. This process can take approximately 1 hour to complete, depending on the system's specifications and the amount of data being processed.
20
20
21
-
### God_Mode for Setting manipulation
21
+
### GodMode for Setting manipulation
22
22
23
23
**Tool Description:**`God_Mode.py` by DefinetlyNotAI is a utility designed to automatically open god-mode without leaving traces. It's a powerful tool that can be used for educational purposes to manipulate certain settings usually scattered in the control panel.
Copy file name to clipboardExpand all lines: README.md
+21-5
Original file line number
Diff line number
Diff line change
@@ -2,11 +2,9 @@
2
2
3
3
Welcome to **Logicytics** (Spelled Loj-ee-cit-iks), a powerful tool designed to harvest and collect a wide range of windows system data for forensics, it is a actively worked on project that uses python as its main language, its whole idea is it effectively gathers as much sensitive data as possible and outputs it into a ZIP file. This guide will help you get started with using DataVoyager effectively.
4
4
5
-
This Software is around `32MB` as in version `1.1.2`.
6
-
7
5
## Prerequisites
8
6
9
-
Before running Logicytics, it's recommended to first disable User Account Control (UAC) to ensure smooth operation. You can do this by running the `UACPY.py` script as an administrator in the Command Prompt (cmd). Here's how:
7
+
Before running Logicytics, it's recommended to first disable User Account Control (UAC) to ensure smooth operation as well as enable cmd. You can do this by running the `UACPY.py` script as an administrator in the Command Prompt (cmd). Here's how:
10
8
11
9
1. Open Command Prompt as an administrator. You can do this by searching for `cmd` in the Start menu, right-clicking on it, and selecting "Run as administrator".
12
10
2. Navigate to the directory where `UACPY.py` is located.
@@ -15,7 +13,10 @@ Before running Logicytics, it's recommended to first disable User Account Contro
15
13
```powershell
16
14
python UACPY.py
17
15
```
18
-
16
+
or
17
+
```powershell
18
+
.\UACPY.py
19
+
```
19
20
Please note that this assumes you have Python installed on your system and that the `UACPY.py` script is located in the directory you navigate to in step 2. If Python is not installed or if you encounter any issues, you may need to install Python or adjust the command to point to your Python executable if it's not in your system's PATH.
20
21
21
22
It's also recommended to install all needed libraries, Here is how:
@@ -28,6 +29,13 @@ It's also recommended to install all needed libraries, Here is how:
28
29
pip install -r requirements.txt
29
30
```
30
31
32
+
Finally its recommended to cripple windows defender, you can try to do so by running the following command (Please note it might not always work, and you will need ADMIN to run the script!):
33
+
34
+
```powershell
35
+
.\Window_Defender_Crippler.bat
36
+
```
37
+
38
+
Running it again will re-install those signatures, so after completing your job, re-run this file again.
31
39
## Running Logicytics
32
40
33
41
To run the main program, you need to execute `Logicytics.py` with administrative privileges (Note its not needed to run as admin, but half of it's functionality would be disabled). Follow these steps:
@@ -39,6 +47,10 @@ To run the main program, you need to execute `Logicytics.py` with administrative
39
47
```cmd
40
48
python Logicytics.py
41
49
```
50
+
or
51
+
```powershell
52
+
.\Logicytics.py
53
+
```
42
54
43
55
## Running Debugger
44
56
@@ -52,6 +64,10 @@ To run the debugger program (Still in beta versions), you need to execute `Debug
52
64
```cmd
53
65
python DebugBeta.py
54
66
```
67
+
or
68
+
```powershell
69
+
.\DebugBeta.py
70
+
```
55
71
56
72
Make sure the `.structure` file is present, if you don't have it, redownload the `structure.py` found in the SYSTEM directory of the this repo.
57
73
@@ -76,4 +92,4 @@ Make sure the `.structure` file is present, if you don't have it, redownload the
76
92
77
93
Logicytics is a powerful tool for system data analysis. By following the instructions above, you can ensure a smooth and effective data collection process. Remember, the key to successful data harvesting is patience and adherence to the guidelines provided. Happy data mining!
78
94
79
-
And We are not responsible for any illegal usage of this product.
95
+
We are not responsible for any illegal usage of this product.
0 commit comments