{"id":160,"date":"2021-10-30T15:51:24","date_gmt":"2021-10-30T15:51:24","guid":{"rendered":"https:\/\/news4hacker.com\/?p=160"},"modified":"2023-04-19T13:28:05","modified_gmt":"2023-04-19T13:28:05","slug":"how-to-use-mfilebinder","status":"publish","type":"post","link":"https:\/\/reconcybersecurity.com\/blogs\/how-to-use-mfilebinder\/","title":{"rendered":"How to use mFileBinder | Recon Cyber Security"},"content":{"rendered":"\n<p class=\"has-text-align-center\"><em> How to change icon of any software or we should say a virus or batch file. mFileBinder do the same if you don&#8217;t know what mFileBinder is. It is used to change icon of any file. So we can use it in hacking right because when we can change icon of our virus no one could say that it is virus. So let&#8217;s start!<\/em><\/p>\n\n\n\n<p class=\"has-text-align-left\"><br>\u2981 So 1st you have to download mFilebinder you can download it from this link\u2026<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2021\/10\/h2-1-1024x355.png\" alt=\"\" class=\"wp-image-162\"\/><\/figure>\n\n\n\n<p>(<a href=\"https:\/\/sourceforge.net\/projects\/mfilebinder\/\" target=\"_blank\" rel=\"noopener\"> https:\/\/sourceforge.net\/projects\/mfilebinder\/<\/a> )<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong><br>CHANGING ICON<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>After downloading open your mFileBinder software and click on browse file and select your file which you have to change after that click on add file\u2026<\/li>\n<\/ol>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2021\/10\/Untitled-1-1024x480.png\" alt=\"\" class=\"wp-image-163\"\/><\/figure>\n\n\n\n<p>2. <span style=\"font-size: revert; color: initial;\">Now you have to click on the set icon and select your icon Note you have to download your icon on (.ico) form\u2026<\/span><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2021\/10\/2-1024x500.png\" alt=\"\" class=\"wp-image-164\"\/><\/figure>\n\n\n\n<p>3. Now you have to click on Build\/Bind Files after that your file icon is changed\u2026<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2021\/10\/Untitled-ff-1024x497.png\" alt=\"\" class=\"wp-image-165\"\/><\/figure>\n\n\n\n<p class=\"has-text-align-center\"><strong>If you have any problem with our blog so you can comment us we will try to fix it.<\/strong><\/p>\n\n\n\n<script async=\"\" src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-1444558604485828\" crossorigin=\"anonymous\"><\/script>\n","protected":false},"excerpt":{"rendered":"How to change icon of any software or we should say a virus or batch file. mFileBinder do&hellip;\n","protected":false},"author":1,"featured_media":10942,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[55,18,24],"tags":[27,28,29,30,31],"class_list":{"0":"post-160","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-hacking-tools","8":"category-installations","9":"category-tricks","10":"tag-change-icon","11":"tag-change-icon-of-software","12":"tag-how-to-change-icon-of-software","13":"tag-how-to-use-mfilebinder","14":"tag-mfilebinder"},"_links":{"self":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/160","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/comments?post=160"}],"version-history":[{"count":1,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/160\/revisions"}],"predecessor-version":[{"id":10943,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/160\/revisions\/10943"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media\/10942"}],"wp:attachment":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media?parent=160"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/categories?post=160"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/tags?post=160"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}