dsasmblr / YouTube-Tutorial-Files
Files related to video tutorials from my YouTube channel!
☆12Updated 6 years ago
Alternatives and similar repositories for YouTube-Tutorial-Files:
Users that are interested in YouTube-Tutorial-Files are comparing it to the libraries listed below
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Updated 4 years ago
- Collection of IDA helpers☆15Updated 2 years ago
- All the latest releases and files for x64dbg...☆12Updated 4 years ago
- Silent Monero (XMR) CPU miner☆23Updated 6 years ago
- Simple AutoIt crypter.☆11Updated 8 years ago
- working injector bp (BE EAC & VANGUARD)☆4Updated 3 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. Use it to copy SY…☆15Updated 7 years ago
- Windows x86 Hardware Breakpoint class for Windows >Vista☆22Updated 8 years ago
- Fully undetectable UAC Bypass exploit - https://youtu.be/KfOPW0XI99s☆17Updated 3 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆27Updated 5 years ago
- ⚙️ Map and execute EXE in memory☆10Updated 2 years ago
- x64dbg python3 plugin☆22Updated last year
- ☆11Updated 6 years ago
- MessageBox files (EXE, DLL) for testing purposes.☆13Updated 6 years ago
- TaskMgr Volatile Environment LPE☆13Updated 4 months ago
- Tool to extract contents from the memory of Windows systems.☆14Updated last year
- Debugger checks in 3 ways☆18Updated 7 years ago
- Small class to help perform syscalls.☆21Updated last year
- Visual Studio Solution Archiver☆17Updated last year
- Similar to server sided variables and used to download files without giving away a direct download URL.☆16Updated 4 years ago
- Hash Checker Bypass and Process Hacker☆17Updated 3 years ago
- JSBatchDeobfuscator but in C#☆9Updated 4 years ago
- A windows kernel-mode rootkit with remote control☆12Updated 2 years ago
- DLL and API hooking example to hide running in a Terminal Session☆18Updated 4 years ago
- Sources Codes of many MSIL malwares☆23Updated 2 years ago
- Undetectable Windows Payload Generation☆10Updated 7 years ago
- Simple way to disable/rename buttons from a task manager☆30Updated 5 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆26Updated 6 years ago
- Inject Metasploit Shell Code in Legitimate Process☆11Updated 4 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 5 years ago