XShar / Fuck_Chrome_C
Показывает пароли во всех Хромах, включая версии 80 и выше.
☆12Updated 4 years ago
Alternatives and similar repositories for Fuck_Chrome_C
Users that are interested in Fuck_Chrome_C are comparing it to the libraries listed below
Sorting:
- Скрытие Win API☆25Updated 5 years ago
- Скрытие процессов и файлов в user mode☆21Updated 5 years ago
- XssBot-Модульный резидентный бот с супер админкой☆11Updated 2 years ago
- Rootkit loader for your rootkit dll, x86/x64 system wide DLL injection (+appinit_dlls registry create) uses heavens gate☆19Updated 4 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆14Updated 5 years ago
- Мутация PE x86☆15Updated 5 years ago
- Windows Kernel Programming (Обзорный перевод книги)☆58Updated 4 years ago
- Криптор с антиэмуляцией и полиморфизмом для x64☆15Updated 5 years ago
- Rebuild of the original Remote Admin Tool☆9Updated 5 years ago
- Скрытие строки от отладчиков и декомпиляторов☆50Updated 5 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆27Updated 5 years ago
- Allows you to find the use of ScyllaHide, if your program will debug and restore hooking functions bytes.☆25Updated 5 years ago
- manual mapping injector☆27Updated 3 years ago
- PAGE_GUARD based hooking library☆44Updated 2 years ago
- Bypass UAC by abusing shell protocol handlers☆14Updated 3 years ago
- two types (external/internal) cheat examples, and game to test on.☆13Updated 2 years ago
- Compact MBR Bootkit for Windows☆52Updated 3 years ago
- using the Recycle Bin to insure persistence☆12Updated 2 years ago
- Software Protector☆19Updated 4 years ago
- A packed & protected Module Loader and more, for 64-bit Windows☆29Updated 4 years ago
- using gpuz to load driver☆33Updated 6 years ago
- Hijack NotifyRoutine for a kernelmode thread☆42Updated 2 years ago
- Small driver that uses alternative syscalls feature (the project is still under development).☆15Updated last year
- Using SetWindowHookEx for preinjected DLL's☆58Updated 2 years ago
- x64 Windows privilege elevation using anycall☆21Updated 3 years ago
- Protected Process Light Library☆18Updated 4 years ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)☆41Updated 6 years ago
- Detect VM and Hypervisor☆8Updated 3 years ago
- ☆17Updated 3 years ago
- hidden_syscall - syscaller without using syscall instruction in code☆61Updated 2 years ago