There is a potential BYTECODE virus in the “OPEN SOURCE” Microsoft products MAASGRAVE activator. Here is how the virus is hidden and created AT RUN TIME!
https://github.com/massgravel/Microsoft-Activation-Scripts
I ran the MASSGRAVE “open source” activator on a virtual machine using VMware Workstation. The “open source” code actually also contains “BYTECODE” sections. WHEN YOU RUN THE “HARMLESS LOOKING open source” script, IT basically constructs several virus exe files during runtime FROM THE BYTECODE SECTION !!
TSforge_Activation.exe" TSforgeCLI.exe LibTSforge.dll
These exe files are what does the activation. It also installs backdoors, and potential malware !!
Can some other developer verify this on a virtual machine?
Please spread this message to more advanced Software engineers who understand “BYTECODE” HIDING and exe construction IN OPENSOURCE SCRIPTS AND HAVE THEM TAKE A LOOK AT IT! Also the first method makes you trust a their website! You don’t know what you are downloading from them!
I tried to post this Redit, but Redit is blocking this!
Ok, so what “back doors” does it install?
Claims without evidence are just that - claims. I see nothing you’ve posted to be evidentiary.
That said, there is potential for malicious behaviour, but let’s not go off half-cocked on this.
I believe chain letter is the word?