root0 38,479 Posted April 13, 2020 VMware Site Recovery Manager Collection Change Log new builds added: +VMware-srm-8.3.0-15928802.exe +VMware-srm-va-8.3.0.4135-15928802.iso and more... Hidden Content Give reaction to this post to see the hidden content. 49 20 1 Quote Share this post Link to post Share on other sites
root0 38,479 Posted May 1, 2020 VMware vCenter Server 6.7U3g Collection Change Log new builds added: VMware-VIM-all-6.7.0-16046470.iso VMware-VCSA-all-6.7.0-16046470.iso VMware-vCenter-Server-Appliance-6.7.0.44000-16046470-updaterepo.zip and more... Hidden Content Give reaction to this post to see the hidden content. 128 42 3 1 Quote Share this post Link to post Share on other sites
1422435664 0 Posted May 8, 2020 d 8217866 ( VMware-VIM-all-6.7.0-8217866.is Quote Share this post Link to post Share on other sites
ccorkrum 112 Posted May 30, 2020 root0, Think you can upload vRLI 8.1.1 to the regular spot? Thanks Quote Share this post Link to post Share on other sites
GTEVER 58 Posted June 14, 2020 On 9/2/2019 at 1:01 AM, ShaRose said: So, a while ago I gave some instructions to crack HyTrust KeyControl. They've since updated it so it now runs linux with 5.0, so someone asked if I could update my instructions a bit. Turns out they made it easier! So here's how you do it. First, you'll need to shut down the VM. Next, you'll need to get root shell on some kind of live CD. Here are instructions on how to do so for the Hytrust 5.0 installer, but any linux distro with chroot, LVM support, and XFS support will work (Which is to say, all of them). Boot the iso. Follow the normal procedure to install Hytrust (I.E. push enter once and let it go) until it has a big warning saying KeyControl is already configured on this VM. Now, instead of selecting something, press alt+F2. You'll get a normal linux login prompt: Log in as root, it won't ask for a password. Now, regardless of what linux distro you are using, the following commands are the same. Hidden Content Give reaction to this post to see the hidden content. log in as root using the password you set run the following: Hidden Content Give reaction to this post to see the hidden content. Now you'll be in a python shell. Edit the first three values as needed (Or the others, if you want! Have fun with it.) and fire it all in the shell. Hidden Content Give reaction to this post to see the hidden content. Ok, congrats! You've now cracked it till 2050. This is a bonus step: Revert the passwords. mv -n /etc/shadow_backup /etc/shadow and log out using 'exit'. All done! EDIT: If anyone is having issues with KMIP not working, log in as root again and run the commands again. I had used 2050 as my expiration date, but apparently they saw that and instead of, you know, fixing the problem, they just enforced a max length limit somewhere. It's changed to 2030, which SEEMS to work everywhere. Now, instead of selecting something, press alt+F2. You'll get a normal linux login prompt: Log in as root, it won't ask for a password. >> here it asks for a password. i am using HyTrust-KeyControl-5.0 and tried both ova and iso with no luck 40 12 1 Quote Share this post Link to post Share on other sites
knightwillhem 20 Posted July 4, 2020 @ShaRose Have you ever thought about hacking the licensing for EMC UnityVSA? They have a community edition with a 4TB limit, but it would be nice if you could get a higher limit and the rest of the features enabled. Let me know what you think. Thanks Quote Share this post Link to post Share on other sites
ahmem7 21 Posted August 3, 2020 Want All in One Key Generator for VMWare Quote Share this post Link to post Share on other sites
flavakid 623 Posted August 28, 2020 does anyone have HCX license? or dlft product hash Quote Share this post Link to post Share on other sites
alireza1023 161 Posted September 24, 2020 do you have hcx? for dlf you need the product Quote Share this post Link to post Share on other sites
bjunip 2 Posted November 7, 2020 (edited) @root0 I am after VMware-NSX-Manager-6.4.8-16724220.ova, can you help please ? thanks in advance Edited November 7, 2020 by bjunip Quote Share this post Link to post Share on other sites
root0 38,479 Posted November 7, 2020 bjunip use NSX-T Quote Share this post Link to post Share on other sites
bjunip 2 Posted December 9, 2020 thanks @root0 but I desperately need NSX for vSphere 6.2.9 Quote Share this post Link to post Share on other sites
bugbear 0 Posted December 9, 2020 (edited) On 2/3/2020 at 11:55 AM, root0 said: CiscoTree really, you can use all known KG from vSphere 6.0 Where can i find this? (i'm newbiee here, sorry) root0 Edited December 9, 2020 by bugbear Quote Share this post Link to post Share on other sites
cherif 0 Posted December 16, 2020 On 4/18/2018 at 3:09 PM, root0 said: VMware vSphere ESXi 6.7.0 build 8169922 ( VMware-VMvisor-Installer-6.7.0-8169922.x86_64.iso ) VMware vSphere ESXi 6.7.0 Upgrade depot build 8169922 ( VMware-ESXi-6.7.0-8169922-depot.zip ) VMware vSphere vCenter for Windows 6.7.0 build 8217866 ( VMware-VIM-all-6.7.0-8217866.iso ) VMware vSphere vCenter Appliance 6.7.0 build 8217866 ( VMware-VCSA-all-6.7.0-8217866.iso ) FIX-MAGNiTUDE thanks Hidden Content magnet:?xt=urn:btih:8B05D625C3F90CF7C9538A608D3F0FDFF05E6CC2&dn=VMware-VMvisor-Installer-6.7.0-8169922.x86_64.iso magnet:?xt=urn:btih:38E64E0EE5F2C81B115A30C786644085DAF664EF&dn=VMware-ESXi-6.7.0-8169922-depot.zip magnet:?xt=urn:btih:7097E58EB5335DA1BF22C957F437E3DDED6CBB48&dn=VMware-VIM-all-6.7.0-8217866.iso magnet:?xt=urn:btih:1CC57A222DD03A400405BF2022141F9C6521AC6D&dn=VMware-VCSA-all-6.7.0-8217866.iso magnet:?xt=urn:btih:B565A9BCC3CB376DD39A694EEBF1DEF31B162035&dn=VMWARE.VCENTER.SERVER.V6.0.CRACKFIX-MAGNiTUDE.zip Quote Share this post Link to post Share on other sites