ZeroMemoryEx / AC-External
Simple Assault cube external hack written in C
☆13Updated 4 years ago
Alternatives and similar repositories for AC-External
Users that are interested in AC-External are comparing it to the libraries listed below
Sorting:
- external hack for Among Us (PATCHED)☆37Updated 3 years ago
- Hook system calls on Windows by using Kaspersky's hypervisor☆12Updated 4 months ago
- simple C++ dll injector☆59Updated 3 years ago
- Simple C# malware that steals Discord token from .ldb files and from memory☆60Updated 3 years ago
- Simple x86 Trampoline Hook☆40Updated 2 years ago
- Simple API Hooks detector☆73Updated 2 years ago
- simple shellcode injector☆115Updated 2 years ago
- The Hacking Week☆2Updated 2 years ago
- a collection of elf file infectors☆27Updated 3 years ago
- My attempt to reverse the Discord nitro token generation function.☆29Updated 7 months ago
- Mass exploitation of CVE-2021-24499 unauthenticated upload leading to remote code execution in Workreap theme.☆17Updated 3 years ago
- For 1337 Cyber Security Club introduction☆10Updated 3 years ago
- simple user-mode Rootkit☆104Updated 2 years ago
- Trolling Keyloggers by Forcing them to log Specific Text then freezing them☆20Updated 2 years ago
- SecDojo 23jan CTF writeup.☆14Updated 3 years ago
- POC of a better implementation of GetProcAddress for ntdll using binary search☆109Updated last year
- Bypass Malware Time Delays☆101Updated 2 years ago
- C\C++ Ransomware example using RSA and AES-128 with BCrypt library on Windows☆17Updated 2 years ago
- CVE-2023-38831 winrar exploit generator and get reverse shell☆11Updated last year
- linux debugger☆11Updated last year
- This tool is a versatile implementation of the Affine Cipher, a classical encryption algorithm that combines modular arithmetic and linea…☆23Updated 9 months ago
- A manual PE mapping implementation, aka reflective loader☆19Updated 2 years ago
- A really good cybersec reading materials.☆13Updated 2 years ago
- Spoof the return address of any function call.☆10Updated 9 months ago
- Open Redirect scanner☆18Updated 2 years ago
- Simple encryption tool designed to perform a bitwise XOR operation (XORing) on the contents of files with specific extensions in a given …☆20Updated 9 months ago
- ☆14Updated last year
- The dining philosophers problem is an example problem often used in concurrent algorithm design to illustrate synchronization issues and …☆12Updated 3 years ago
- A tool that encrypt and hide your data inside your images.☆30Updated 3 years ago
- Rootkit for Windows 32-bit☆6Updated 3 years ago