cardpayportal / sourceLinks
☆12Updated 4 years ago
Alternatives and similar repositories for source
Users that are interested in source are comparing it to the libraries listed below
Sorting:
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated 2 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 3 years ago
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆22Updated 2 years ago
- A way to use fonts to obfuscate text.☆47Updated 2 years ago
- Sources Codes of many MSIL malwares☆24Updated 3 years ago
- Показывает пароли во всех Хромах, включая версии 80 и выше.☆12Updated 5 years ago
- VK bot для сноса бесед☆12Updated 4 years ago
- POC for scanning ProxyShell(CVE-2021-34523,CVE-2021-34473,CVE-2021-31207)☆17Updated 3 years ago
- Tool to extract contents from the memory of Windows systems.☆14Updated 2 years ago
- Deobfuscator for : https://github.com/Blank-c/BlankOBF☆16Updated 2 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆12Updated 5 years ago
- Process injection via KernelCallbackTable☆14Updated 3 years ago
- Debugger checks in 3 ways☆19Updated 7 years ago
- ☆47Updated 3 years ago
- A python app using kivy and pynput to log and upload mouse dynamics.☆28Updated 3 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆24Updated 3 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Updated 4 years ago
- Overwrite MBR and add own custom message☆16Updated 5 years ago
- Silent Monero (XMR) CPU miner☆23Updated 7 years ago
- Source Code of MSIL Ransom☆14Updated 2 years ago
- Example of C# heap injector for x64 and x86 shellcodes☆14Updated 2 years ago
- Infects PE files with a shellcode☆19Updated 6 years ago
- A wrapper around Windows, calls explicitly the lowest possible calls☆14Updated 2 years ago
- what the fuck is this shit☆25Updated 9 years ago
- Basic disassembly technique to slow down disasm process☆11Updated 5 years ago
- Some ELF Malwares☆10Updated 3 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆27Updated 7 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆22Updated 10 months ago
- 🚀 Builder of Malware Loader☆15Updated 4 years ago
- Taking advantage of CRT initialization, to get away with hooking protected applications☆47Updated 2 years ago