dsasmblr / YouTube-Tutorial-FilesLinks
Files related to video tutorials from my YouTube channel!
☆12Updated 6 years ago
Alternatives and similar repositories for YouTube-Tutorial-Files
Users that are interested in YouTube-Tutorial-Files are comparing it to the libraries listed below
Sorting:
- Tool to extract contents from the memory of Windows systems.☆14Updated 2 years ago
- Deobfuscator for : https://github.com/Blank-c/BlankOBF☆15Updated 2 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆27Updated 6 years ago
- A platform independent C++ code obfuscator.☆13Updated 6 years ago
- Silent Monero (XMR) CPU miner☆23Updated 7 years ago
- A tool to show the method info at runtime☆13Updated 6 years ago
- x64dbg scripts for finding OEP of packers☆15Updated 7 years ago
- Hash Checker Bypass and Process Hacker☆17Updated 3 years ago
- HideToolz 2.2 w/ support Windows 7 (7601) http://fyyre.ru/vault/hidetoolz.7z☆14Updated 4 years ago
- UAC Bypass for windows☆38Updated 5 years ago
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆24Updated 2 years ago
- Exploits I've authored☆60Updated 6 years ago
- Monitor Files and Folders for Changes in Real Time .☆11Updated 6 years ago
- Windows system repair tool☆18Updated 4 years ago
- DLL and API hooking example to hide running in a Terminal Session☆20Updated 5 years ago
- Debugger checks in 3 ways☆19Updated 7 years ago
- Windows x86 Hardware Breakpoint class for Windows >Vista☆23Updated 9 years ago
- CPU-Z Exploit Proof of Concept☆31Updated 6 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Updated 7 years ago
- Windows system spy for Mouse, Keyboard and Gamepad(Joystick).☆14Updated 3 years ago
- Similar to server sided variables and used to download files without giving away a direct download URL.☆16Updated 4 years ago
- This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script…☆14Updated 2 years ago
- Basic disassembly technique to slow down disasm process☆11Updated 6 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Updated 6 years ago
- Generate Code-Signing Certificates by clicking only one button.☆32Updated 6 years ago
- two types (external/internal) cheat examples, and game to test on.☆15Updated 3 years ago
- Hides Process From Task Manager Using NT API Hooking (NtQuerySystemInformation)☆80Updated 2 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Updated 5 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆12Updated 6 years ago
- Joker Botnet Source LEAKED☆11Updated 4 years ago