Have a vendor executable with unknown command-line options? Don’t want to reverse-engineer? Brute force in Windows shell! :: Extract strings from program strings.exe program.exe >> strings.txt :: Run each string as program argument for /f %a IN (strings.txt) DO “program.exe” %a
-
-
These may seem like stupid edge-case internal flags, but several I’ve discovered have been integrated into a support script I use to “kick” Defender when it’s being initialized for the first time to make it go faster.
Prikaži ovu nit -
Oh no I just realized the nightmare Microsoft customer is me
Prikaži ovu nit -
Please don’t actually do this and call Microsoft for help. They told me they’ll turn off my Xbox if I ever post their real secrets.
Prikaži ovu nit
Kraj razgovora
Novi razgovor -
-
-
Somewhere a Microsoft PM is having an aneurysm
- Još 1 odgovor
Novi razgovor -
-
-
How did you capture this output that the command line argument did something?
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
your Microsoft MVP is not being renewed
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
SOS: Finds undocumented flags in Microsoft's Windows Defender Also SOS: Films screen with phone like a savage instead of taking a screenshot
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
-
-
Undocumented in what way? WDEnable is (was, currently deprecated) used by the Windows API to enable (or disable) Windows Defender. BuildSfc also has something to do with their cache, it used to be documented. /me shrugs
- Još 1 odgovor
Novi razgovor -
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.