First of all, why a command-line binder? Automation. Instead of sitting there binding individual, or even groups of files yourself, you can easily automate the binding process by using a batch file or shell script. Saves time and opens up your options. Here’s how this one works:

1. We’ll be using open-source software called NSIS, which creates Windows installers. You can find it here:

http://nsis.sourceforge.net

. For those of you who use Linux, this is already available in base repositories, so you can just type “apt-get install nsis” or “yum install -y nsis” depending on your package manager.

2. You can use absolute paths to refer to files, but in this example we’ll put notepad.exe and calc.exe in the same directory. Now put the following into a file called bind.nsi:

OutFile "binded.exe"
SilentInstall silent

Section "Install"
File /oname=$TEMP\notepad.exe "notepad.exe"
File /oname=$TEMP\calc.exe "calc.exe"

Exec '"$TEMP\notepad.exe"'
Exec '"$TEMP\calc.exe"'

Sectionend

3. In order to create binded.exe, you need to call “makensis bind.nsi”

4. The above example puts notepad and calc into a file called binded.exe. When you run binded.exe, notepad and calc get extracted to the windows temp directory and are silently run simultaneously. You can bind any number of files quickly, easily, and automatically using this technique.

credit : vdm

Explore More

LFI Scanner By GlaDiaT0R

#!/usr/bin/perl #LFI Scanner By GlaDiaT0R #My Mail: the_gl4di4t0r[AT]hotmail[DOT]com #Home Page: DarkGh0st.Com #Greetz To Boomrang_victim, Marwen_Neo & All Tunisian Hackers #www.darkgh0st.net #www.tunisian-power.net More Info http://www.planetcreator.net/planetcreator/perls.php?id=37

Critical SQL Injection in Myanmar Calendar

PlanetCreator‘s Security Team Researcher Infofreakzzz reported another Critical SQL injection (vulnerability) on Myanmar Calendar URL : http://www.myanmarcalendar.org/ SQL injection is a code injection technique that exploits a security vulnerability occurring

Critical XSS Vulnerability in http://shwephonecard.com registered parent company is “MMM Network L.L.C.”

PlanetCreator.Net’s Security Team Member Info Freakzz <infofreakzzz(at)gmail.com> has reported another critical XSS vulnerability on http://www.shwephonecard.com  registered parent company is “MMM Network L.L.C.” These are some information from Vulneral Site http://www.shwephonecard.com: