101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

487
active users

#autohotkey

0 posts0 participants0 posts today

Having to use #Autohotkey to input data into a legacy form 2000 times. Sitting here watching my PC type the same data in, row by row by row...

I had to put in a half-second delay in between each line or else the system locked up, so my computer is useless for 16 minutes.

Replied in thread

... To #MSWindows11 [Copilot] key do nothing at all via #AutoHotkey, in "neuter-copilot.ahk" file ...

#Requires AutoHotkey v2.0

InstallKeybdHook

; Does not disable [Copilot] key.
;#C::Return

; Scancode does not work.
;SC0x000100003100::Return

; Works: Does nothing.
#<+F23::Return

; Send [Ctrl]? Does not work: "Ctrl+R" does not reload the Firefox tab.
;#<+F23::^

DarkGate Malware Switches to AutoHotkey for Advanced Evasion Techniques

Date: June 2024
CVE: CVE-2023-36025, CVE-2024-21412
Vulnerability Type: Remote Code Execution, Information Disclosure
CWE: [[CWE-22]], [[CWE-427]]
Sources: McAfee , Trend Micro, The Hacker News

Synopsis

DarkGate malware, known for its stealth and versatility, has recently transitioned from using AutoIt to AutoHotkey for its attack scripts. This shift enhances its evasion capabilities against security software, posing a renewed threat to targeted systems.

Issue Summary

The DarkGate malware has been active since 2018, offering a range of malicious functions including remote access, keylogging, and data theft. In its latest iteration, observed in March 2024, the malware has switched from AutoIt to AutoHotkey scripts to bypass detection mechanisms such as Microsoft Defender SmartScreen. The malware is distributed through phishing emails containing malicious HTML or Excel attachments.

Technical Key Findings

DarkGate initiates its attack via a phishing email, tricking users into opening a malicious HTML or Excel file. This file exploits security flaws in Microsoft Defender SmartScreen, allowing a Visual Basic Script to execute PowerShell commands that launch an AutoHotkey script. This script then downloads and executes the DarkGate payload.

Vulnerable Products

  • Microsoft Windows systems running outdated or unpatched versions of Microsoft Defender SmartScreen
  • Any systems susceptible to phishing attacks via email clients

Impact Assessment

When exploited, DarkGate can provide attackers with full remote access to compromised systems. This includes capabilities for credential theft, keylogging, screen capturing, and installing additional malware, significantly jeopardizing the integrity and security of affected systems.

Patches or Workarounds

N.A.

Tags

#DarkGate #Malware #CVE-2023-36025 #CVE-2024-21412 #AutoHotkey #RemoteAccessTrojan #Phishing #MicrosoftDefender #CyberSecurity #threatintelligence

If you're a windows user and often find yourself typing out the current date in ISO8601 format, may you find this #autohotkey script helpful:

------------------------------------
#singleinstance force

typeDate()
{
Send %A_YYYY%-%A_MM%-%A_DD%
}

^!d:: typeDate()
------------------------------------

Put that into an ahk file, right click, compile to exe, then pop it in "shell:startup". Now you can type 2024-04-08 by pressing "ctrl-alt-d".

2024-04-082024-04-082024-04-082024-04-08 whee!

CC @ubernauten

Meine (nicht-öffentliche) Nextcloud und bald bestimmt mehr ist auf (A)steroiden, cause proudly hosted by uberspace.de. (Steroide sind natürlich nur für Maschinen OK, und auch nur so lange, wie sie sich nicht gewerkschaftlich organisieren, wie bei Stanislav Lem.)

Außerdem nutze ich @Codeberg,@cryptpad,@duckduckgo, @mxlinux,@keepassxc,#vnc+#ssh,@git,#gittfs,#gitcrypt,@libreoffice,@thunderbird,#chromiumungoogled*#chrlauncher,@fdroidorg,@libretube,@AntennaPod,#opencamera,@anysoftkeyboard,#quickdic,#transportr,@torproject,@signalapp,#jitsi,@Tusky,#mgit,#markor,#PilfershushJammer,#fosswarn,#vlc,#doublecmd,#powershell,#autohotkey,#xca,#openssl,#zapp,@privacybrowser,#UntrackMe,@veracrypt,#AuthPass,@newpipe,#radiodroid,#edslite,#SecScanQR,#sqlitedbbrowser,#avnc,@k9mail,u.V.m., überhaupt privat fast nur und im Job so viel wie geht #floss , im Netz und lokal.

–––

Warum FLOSS? U.A. deshalb:

KI – Macht – Ungleichheit. media.ccc.de/v/ce4743cc-50ad-4

In MS #Office you can quickly switch between ribbon tabs with your mousewheel. 🖱️

In
@libreoffice
you can't. 🤬 Users have wanted this since at least 9 years ago.¹

☝️ Today I managed to hack together a really dirty little #AutoHotkey/#AHK_X11 script for Windows and GNU/Linux that makes this possible! 🥳 🍾🥂

You can find it here:
🌐 codeberg.org/metaphil/ahk-libr

Hope it helps someone!

_____
¹ bugs.documentfoundation.org/sh

#libreoffice #lifehack #script #fürWenigerNervImLeben
#feature #hack #annoyances

💡 #TIL there's another effort going on to bring inglorious

#AutoHotkey to 🐧 GNU/‬#Linux!
(#X11, that is.)

Meet #AHK_X11 🥳

🌐 github.com/phil294/AHK_X11
📖 phil294.github.io/AHK_X11

☝️ Caveat: It only supports legacy #AHK 1.1 syntax and does not aim for 100% feature parity/compatibility, but should enable you to use most of your #hotkeys and #hotstrings #crossplattform! (Sync on your own).

#introduction Checking/figuring this out for the first time.

I'm a techie, outdoorsy (Hiking in the mountains), booky, gamey nerd. I'm a Windows SysAdmin, I like scripting (#AutoHotkey, PowerShell) and writing applications (AHK), also Learning Linux.

Been reading a lot of Stephen King in self-isolation (Dark Tower, Institute, Shining, Doctor Sleep)

I'll probably sit back and watch until I get the hang of this :)