XShar / Fuck_Chrome_CLinks
Показывает пароли во всех Хромах, включая версии 80 и выше.
☆12Updated 5 years ago
Alternatives and similar repositories for Fuck_Chrome_C
Users that are interested in Fuck_Chrome_C are comparing it to the libraries listed below
Sorting:
- Скрытие Win API☆27Updated 6 years ago
- Скрытие процессов и файлов в user mode☆23Updated 5 years ago
- Криптор с антиэмуляцией и полиморфизмом для x64☆17Updated 6 years ago
- Software Protector☆19Updated 5 years ago
- Фреймворк криптора/протектора с антиэмуляцией☆31Updated 6 years ago
- XssBot-Модульный резидентный бот с супер админкой☆11Updated 2 years ago
- Мутация PE x86☆16Updated 6 years ago
- Скрытие строки от отладчиков и декомпиляторов☆51Updated 6 years ago
- Infects PE files with a shellcode☆22Updated 7 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆15Updated 6 years ago
- Small class to help perform syscalls.☆21Updated 6 months ago
- Simple PE Packer Which Encrypts .text Section☆50Updated 8 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆27Updated 6 years ago
- Rootkit loader for your rootkit dll, x86/x64 system wide DLL injection (+appinit_dlls registry create) uses heavens gate☆21Updated 4 years ago
- Reverse Windows shell over TLS☆19Updated 9 years ago
- A Simple AES Command Line Crypter☆38Updated 2 years ago
- Windows Kernel Programming (Обзорный перевод книги)☆58Updated 4 years ago
- ☆15Updated 5 years ago
- simple WMI Viewer☆21Updated 5 years ago
- ☣️ Necro Stealer + Web Panel☆10Updated 5 years ago
- Simple driver loader for windows☆17Updated 5 years ago
- ☆13Updated 8 years ago
- A simple Windows kernel rootkit.☆94Updated 7 months ago
- Inject dll to explorer.exe and hide file from process.☆22Updated 4 years ago
- Simple tool to check visual studio project files for Exec, PreBuildEvent and PostBuildEvent☆12Updated 5 years ago
- A packed & protected Module Loader and more, for 64-bit Windows☆27Updated 4 years ago
- Process Hollowing demonstration & explanation☆34Updated 4 years ago
- Bypass UAC by abusing shell protocol handlers☆14Updated 4 years ago
- Injects position-dependent code into a code cave in an executable file, and applies relocations.☆24Updated 2 years ago
- My (OLD) RE Take On The Faux Green Petya Ransomware Builder & Client.☆21Updated 4 years ago