VIP User from Exetools forum Posts Jihadi Videos on Youtube

It is sad that VIP users on the once popular EXETOOLS forum post Jihadi videos on Youtube in a blatant manner.

Today we have that same user who uses the nicknames chants, progman and now as biorpg try to spoil my business in these difficult COVID times by claiming that my blog is fake 🙁

The real name of that criminal terrorist is of course Gregory Morse (aka Abdul Muid) and much has been written about him on various online blogs.

Just do these 3 steps please:

STEP 1: I ask you all to check out only ONE VIDEO of his on youtube:

STEP 2: SAME PERSON as the one in youtube video. You can check his face from his picture on his GITHUB PAGE:

STEP 3: Proof that the Github account belongs to this Jihadi:

Or, you can see the archive page here:

This is his picture:

Gregory Morse aka Abdul Muid

Password Protect PDF v7.1 [KEYGEN]

Magic a.k.a MagicByte…
You NEVER should have made that negative threatening posts in B4All…
See the CONSEQUENCES now???


Password: Board4All

Contact: magic.byte at

To the staff at B4A who encourage HATE POSTS:

RCS Zetta 5.20 Keygen and Source Code ($50 Only)


Keygen Patcher Source Code:

include \masm32\include\
include \masm32\include\

    SIZEOF_NT_SIGNATURE         equ sizeof DWORD

    DlgProc                 PROTO :DWORD,:DWORD,:DWORD,:DWORD
    GetModuleBaseAddress     PROTO :DWORD

    hWnd                      dd        ?
    hInstance                 dd        ?
    windowhandle             dd        ?
    ProcessID                 dd        ?
    hProcess                 dd        ?
       PEHeader                db        1000 dup (?)
       Chunks                    db        65535 dup (?)
    BaseAddress                dd        ?
    SectionSize                dd        ?
    SectionEnd                dd        ?
    SectionAdress            dd        ?
    sections_count             dd         ?
    sectionHeaderOffset     dd         ?

    process_4        db "Setup - Zetta",0
    patch_title        db "Patching...",0
    patch_success    db "Patched Succesfully",0
    error_1            db "Didn't find the target! You sure you started it??",0
    error_2            db "Couldn't open process...",0
    error_3            db "Couldn't write ...",0
    error_4            db "Error reading PE header",0
    error_5            db "This EXE has no sections",0
    errornobase        db "cannot read base address",0
    about_title        db "About...",0
    about_text        db "TonyWank and his MicroPenis",13,10
                    db "Special Thanks to: Sexual Intercourse",0
    TextSection        db ".text",0
    ChunkSize        dd    65535
    SearchPattern    db    083h,0F8h,00Ch,00Fh,084h,0FFh,0FFh,000h,000h,083h,0F8h,00Ah,00Fh,087h,0FFh,0FFh,000h,000h ;Search pattern in hex add "0" to the front of each digit and "h" to the end
    SearchMask        db       0, 0, 0, 0, 0, 1, 1, 0, 0, 0, 0, 0, 0, 0, 1, 1, 0, 0   ;(1=Ignore Byte)
    ReplacePattern    db    083h,0F8h,00Ch,00Fh,084h,0FFh,0FFh,000h,000h,083h,0F8h,00Ah,090h,0E9h,0FFh,0FFh,000h,000h ;Replace Pattern in hex add "0" to the front of each digit and "h" to the end
    ReplaceMask        db       0, 0, 0, 0, 0, 1, 1, 0, 0, 0, 0, 0, 0, 0, 1, 1, 0, 0  ;(1=Ignore Byte)

; €€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€

        mov hInstance, FUNC(GetModuleHandle,NULL)
        call main
        invoke ExitProcess,eax

; €€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€

main proc

    Dialog "RCS Zetta Installers Mem Patcher", \
           "Courier New",8, \
            WS_OVERLAPPED or WS_SYSMENU or DS_CENTER, \     ; dialog window style
            4, \                                            ; number of controls
            50,50,192,95, \
    DlgButton "Patch",WS_TABSTOP,10,60,50,13,IDOK
    DlgButton "About...",WS_TABSTOP,70,60,50,13,IDCONTINUE
    DlgButton "Exit",WS_TABSTOP,130,60,50,13,IDCANCEL
    DlgStatic "This patcher works with ZettaDB2008_x86_Setup_2.0.1.exe, ZettaDB2008_x64_Setup_2.0.1.exe, RCSDatabase_64bit_Setup_2012.1.exe, Zetta_5.20.1.768.exe and probably newer versions too.",SS_CENTER,0,5,180,50,100
    CallModalDialog hInstance,0,DlgProc,NULL

main endp

; €€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€€

DlgProc proc hWin:DWORD,uMsg:DWORD,wParam:DWORD,lParam:DWORD

    Switch uMsg
        Case WM_INITDIALOG
            m2m hWnd, hWin

        Case WM_COMMAND
            Switch wParam
            Case IDOK
                mov hInstance,eax
                invoke FindWindow,NULL,addr process_4
                invoke GetWindowThreadProcessId,eax,addr ProcessID
                invoke OpenProcess,PROCESS_ALL_ACCESS,FALSE,ProcessID
                test al,al
                jz error2
                mov hProcess,eax
                Invoke GetModuleBaseAddress, ProcessID
                mov BaseAddress, eax
                invoke ReadProcessMemory,dword ptr[hProcess], eax, addr PEHeader, 1000, NULL
                test al,al
                jz error2
                ;DOS HEADER EXTRACTION
                lea edi, PEHeader
                assume edi: ptr IMAGE_DOS_HEADER
                ;Check if the file is a DOS file
                cmp [edi].e_magic, IMAGE_DOS_SIGNATURE
                jne error4
                ; DOS Header
                mov edx, [edi].e_lfanew
                ;Check if the file is a PE file
                add edi, edx ;address of the PE Header
                assume edi: ptr IMAGE_NT_HEADERS
                cmp [edi].Signature, IMAGE_NT_SIGNATURE
                jne error4
                ; PE Header
                mov edx, [edi].Signature
                add edi, SIZEOF_NT_SIGNATURE
                assume edi: ptr IMAGE_FILE_HEADER
                movzx edx, [edi].NumberOfSections
                push edx
                pop sections_count
                ; Optional Header
                add edi, SIZEOF_IMAGE_FILE_HEADER
                assume edi: ptr IMAGE_OPTIONAL_HEADER
                ; ImageBase
                lea edi, PEHeader
                add edi, sizeof IMAGE_OPTIONAL_HEADER
                assume edi: ptr IMAGE_SECTION_HEADER
                mov sectionHeaderOffset, edi
                mov ebx, sections_count
                cmp ebx, 0
                je error5
                    sub ebx, 1
                    push edi
                    mov esi, edi
                    lea edi, TextSection
                    mov ecx, 5  ; selects the  of the first string as maximum for comparison
                    repe cmpsb         ; comparison of ECX number of bytes
                    jne continue_scan
                    pop edi
                    mov edx, dword ptr [edi + 8h]
                    mov SectionSize, edx
                    mov edx, [edi].VirtualAddress
                    add edx, BaseAddress             ;adds baseaddress + section address
                    mov ebx, edx
                    add edx, SectionSize
                    mov SectionEnd, edx
                    xor edi, edi
                    jmp scan
                    pop edi
                    add edi, 28h
                    jmp sections
                    ; Use ebx for pointer count, ReadProcessMemory replace eax, ecx and edx
                    invoke ReadProcessMemory,dword ptr[hProcess], ebx, addr Chunks, ChunkSize, NULL
                    push 1
                    sub ChunkSize, sizeof SearchPattern
                    push ChunkSize
                    push sizeof SearchPattern
                    push offset SearchMask
                    push offset SearchPattern
                    push offset Chunks
                    call SearchAndReturn
                cmp eax, 1
                je patch
                cmp ebx, SectionEnd
                jnle fin
                add ebx, ChunkSize
                sub ebx, sizeof SearchPattern
                jmp scan
                    COMMENT *
                    Didn't do anything here, just copied code
                    invoke WriteProcessMemory,dword ptr[hProcess],ecx,addr writebuf_1,1,NULL

                    mov esi,_replacepattern
                    mov edx,_replacemask
                    xor ecx,ecx
                    .while ecx!=ebx            ;ebx=patternsize
                        cmp byte ptr[edx],1
                        je @ignore
                        lodsb            ;load replacebyte to al from esi & inc esi
                        stosb            ;mov byte ptr[edi],al & inc edi
                        jmp @nextbyte
                        inc edi            ;targetadress
                        inc esi            ;replacepattern
                        inc edx            ;replacemask
                        inc ecx            ;counter
                    mov local_returnvalue,1        ;yes, something was patched
                    invoke MessageBoxA,NULL,addr error_1,NULL,MB_ICONSTOP
                    jmp fin
                    invoke MessageBoxA,NULL,addr error_2,NULL,MB_ICONSTOP
                    jmp fin
                    invoke MessageBoxA,NULL,addr error_3,NULL,MB_ICONSTOP
                    jmp fin
                    invoke MessageBoxA,NULL,addr error_4,NULL,MB_ICONSTOP
                    jmp fin
                    invoke MessageBoxA,NULL,addr error_5,NULL,MB_ICONSTOP
                    sub ecx, offset Chunks
                    add ebx, ecx
                    invoke MessageBoxA,NULL,hex$(ebx),addr patch_title,MB_ICONINFORMATION
                    invoke CloseHandle,hProcess

            Case IDCONTINUE
                invoke MessageBoxA,NULL,addr about_text,addr about_title,NULL

            Case IDCANCEL
                invoke ExitProcess,1
        Case WM_CLOSE
            invoke ExitProcess,1
    return 0

DlgProc endp

GetModuleBaseAddress proc iProcID:DWORD

    invoke CreateToolhelp32Snapshot, TH32CS_SNAPMODULE, iProcID
    mov hSnap,eax
    mov xModule.dwSize, sizeof xModule
    invoke Module32First, hSnap, addr xModule
    invoke CloseHandle,hSnap
    test eax, eax
    jnz getaddr
    mov eax, 0
        mov eax, xModule.modBaseAddr
GetModuleBaseAddress endp

SearchAndReturn proc     _targetadress:dword,_searchpattern:dword,_searchmask:dword,_patternsize:dword,_searchsize:dword
    LOCAL local_returnvalue    :dword     ;returns if something was patched
    LOCAL local_match    :dword    ;counts how many matches
    mov local_returnvalue,0
    mov local_match,0
    mov edi,_targetadress
    mov esi,_searchpattern
    mov edx,_searchmask
    mov ebx,_patternsize
    xor ecx,ecx
    .while ecx!=_searchsize
        ;---check if pattern exceed memory---
        mov eax,ecx        ;ecx=raw offset
        add eax,ebx        ;raw offset + patternsize
        cmp eax,_searchsize
        ja @return        ;if (raw offset + patternsize) > searchsize then bad!
        push ecx        ;counter
        push esi        ;searchpattern
        push edi        ;targetaddress
        push edx        ;searchmask
        mov ecx,ebx        ;ebx=patternsize
        test ecx,ecx
        je @pattern_found
        cmp byte ptr[edx],1    ;searchmask
        je @ignore
        lodsb            ;load searchbyte to al & inc esi
        scasb            ;cmp al,targetadressbyte & inc edi
        jne @skip
        inc edx            ;searchmask
        dec ecx            ;patternsize
        jmp @cmp_mask
        inc edi            ;targetadress
        inc esi            ;searchpattern
        inc edx            ;searchmask
        dec ecx            ;patternsize
        jmp @cmp_mask
        pop edx
        pop edi            ;targetadress
        pop esi            ;searchpattern
        pop ecx
        inc edi            ;targetadress
        inc ecx            ;counter
    ;---scanned whole memory size---
    jmp @return   

    inc local_match
    pop edx
    pop edi                ;targetadress
    pop esi
    mov local_returnvalue,edi
    cmp local_match,eax
    je @return
    pop ecx                ;counter
    inc edi                ;targetadress
    jmp @search_again
    mov eax,local_match
    mov ecx,local_returnvalue
SearchAndReturn endp

end start

Sentinel dongle emulator for windows 10 64-bit ($50 only)

You can download it here:

Follow the instructions on this page:

You cannot directly use the dump!
After dumping you need to pay me and then send the dump to me. I will create the dongle and then send you. You need to pay $50 in Bitcoin, as usual:

TonyWeb: Upgraded Myself as Mr.Eax09 alias FaktiMaan!

I have UPGRADED myself now and this is my new avatar as mr.eax09. I am not afraid of anyone! You can call me FAKTIMAAN! 😀

Yes, as the Fatkimaan/Shaktimaan Avatar lol 😀

By the way I also updated the link for the BoilSoft Keygen

I am just trying to earn a little money selling porn and cracks in these difficult COVID times!

Take a hint! Don’t feed that Cachito’s smug pockets with your “donations”. He lives in a lawless country where anything goes.

He reads EVERY DM that you send out and also has no ethics nor concept of fairness. He bans whoever he wants on his whim! Say a BIG F*ck you to him and leave.

The forum is not secure in the least!

TSRh is Already Compromised (Proof Included)


Let me summarize this for all the F*CKTARDS (yes, using that same term that my geriatric lover de! used) like de! out there:

TSRh Forum was compromised LONG AGO! ANYTHING you post in the forum, whether it be in the private sections (LIKE HOW I STILL FOOLISHLY DID YESTERDAY) or through DMs (like how de! foolishly kept giving out the password to her BoilSoft Keygen: ALL of them get leaked in S-S-SECONDS as the hackers can access the COMPLETE DATABASE of the forum!

@de! If you want the password to your file just make a comment below in this post and I will post the password! It was out of PITY for your hard work that I did not post the password as a free for all yesterday!

Cachito smugly sits in his lawless country Argentina and posts sniggers but who ACTUALLY suffers? It is WE, who suffer, those who live in the EU or in the US! What does Cachito have to lose? NOTHING

Cachito merely pockets the “donations” in bitcoin and encourages everyone to visit the forum so that more and more people would be encouraged to donate, right into his greedy pockets! It is fools like us who take the risk and fill his pockets!

I crack software and film young girls taking ALL the risk and I cannot even sell it in peace on my own blog. Sorry X-Ray that on the TSRh forum today I needed to claim that this blog did not belong to me. But what to do? Everyone would have TORN me apart had I confessed that I needed money and that I resorted to selling the porn and the cracked software

I had already posted this before and it has adequate proof in it, proof of the whole DATABASE COMPROMISE with screenshots:

Who finally suffers in the end?
Our German Brother Sascha Szalata, Indrajit Chakraborty and Dr Davidson Jr
I already posted this as well last month:

Rooster1: You landed into this mess since you decided to take part in the sh*tfest on the TSRh chatbox 2 months ago when I needed to make some comments to save this blog, my sole and only source of income in these COVID times!

Boilsoft Video Splitter 8.1.4 KEYGEN for Sale ($20)

It was out of PITY for de!’s hard work that I did not post the password. I did not forget it! de! IF YOU DARE, make a comment in this blog challenging me to post your PW and I will do so! For ALL to see.

TSRh is HACKED and its security TOTALLY COMPROMISED but you fail to see it. See my
today’s post where I posted the proof!


Neotys NetLoad v7.7 For Sale ($50)

NEWS FLASH: de! my granny-fetish lover, thinks that posting in the private sections at TSRh is going to stop the sellers. The foolish Bitch! 😀

Try the most automated performance testing platform for the Enterprise .

No credit card required. Up and running in 5 minutes.

  • Support what you test: web, mobile, APIs, SAP, Citrix
  • Integrations with CI servers for Agile and DevOps, APM tools for code-level diagnostics, and functional testing tools for end-user experience metrics
  • Code-less for faster design of complex tests
  • As code for tests within automated pipelines
  • Script maintenance in as little as 1/10 of the original design time
  • Actionable insights from high-level dashboards and detailed metrics

Gartner Peer Insights Awarded


As always, you can pay me for the crack and get it: