RealAlphabet / GoogleAuthentificatorCLinks
C implementation of TOTP to generate 2FA code like Google Authentificator.
☆21Updated 4 years ago
Alternatives and similar repositories for GoogleAuthentificatorC
Users that are interested in GoogleAuthentificatorC are comparing it to the libraries listed below
Sorting:
- RISC-V Virtual Machine☆253Updated 4 months ago
- uefi diskless persistence technique + OVMF secureboot bypass☆94Updated last year
- Unlicensed tiny / small portable implementation of 128/256-bit AES encryption in C, x86, AMD64, ARM32 and ARM64 assembly☆131Updated last month
- Simple x86/x64 Assembler/Disassembler/Emulator☆186Updated last year
- Reverse engineering winapi function loadlibrary.☆220Updated 2 years ago
- vulnerability in zam64.sys, zam32.sys allowing ring 0 code execution. CVE-2021-31727 and CVE-2021-31728 public reference.☆91Updated 4 years ago
- Process Injection using Thread Name☆282Updated 6 months ago
- Single header version of System Informer's phnt library.☆230Updated last week
- The Definitive Guide To Process Cloning on Windows☆521Updated last year
- ☆265Updated 2 years ago
- A small x64 library to load dll's into memory.☆448Updated last year
- Metamorphic cross-compilation of C++ & C-code to PIC, BOF & EXE.☆548Updated last month
- Simple, fast and lightweight Header-Only C++ Assembler Library☆128Updated 2 months ago
- Admin to Kernel code execution using the KSecDD driver☆258Updated last year
- Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel.☆241Updated 2 years ago
- The best theme for x64dbg!☆89Updated 3 years ago
- Integration of Microsoft Warbird with the MSVC compiler☆113Updated 2 years ago
- This novel way of using NtQueueApcThreadEx by abusing the ApcRoutine and SystemArgument[0-3] parameters by passing a random pop r32; ret …☆257Updated 2 years ago
- LLVM plugin to transparently apply stack spoofing and indirect syscalls to Windows x64 native calls at compile time.☆315Updated last year
- simple user-mode Rootkit☆107Updated 3 years ago
- bypassing intel txt's tboot integrity checks via coreboot shim☆83Updated 7 months ago
- An x86-64 Code Virtualizer☆286Updated last year
- Finding Truth in the Shadows☆115Updated 2 years ago
- [ARCHIVED] Early work on Abyss (Windows UEFI Bootkit).☆44Updated 2 months ago
- Hooking KPRCB IdlePreselect function to gain execution inside PID 0.☆73Updated 6 months ago
- Intel 64/Windows low-level experiments☆62Updated 2 months ago
- Obfusk8: lightweight Obfuscation library based on C++17 / Header Only for windows binaries☆352Updated 5 months ago
- PoC Anti-Rootkit/Anti-Cheat Driver.☆223Updated 6 months ago
- Rewrite and obfuscate code in compiled binaries☆261Updated last week
- Various Process Injection Techniques☆158Updated 3 years ago