dsasmblr / YouTube-Tutorial-FilesLinks
Files related to video tutorials from my YouTube channel!
☆12Updated 6 years ago
Alternatives and similar repositories for YouTube-Tutorial-Files
Users that are interested in YouTube-Tutorial-Files are comparing it to the libraries listed below
Sorting:
- Collection of IDA helpers☆16Updated 2 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆12Updated 5 years ago
- An Assembly x86 code that shows Windows MessageBox kept as simple as possible.☆11Updated 2 years ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆16Updated 7 years ago
- All the latest releases and files for x64dbg...☆12Updated 4 years ago
- TaskMgr Volatile Environment LPE☆13Updated 6 months ago
- ☆16Updated 2 years ago
- A tool to show the method info at runtime☆13Updated 5 years ago
- Tool to extract contents from the memory of Windows systems.☆14Updated last year
- working injector bp (BE EAC & VANGUARD)☆4Updated 4 years ago
- Process injection via KernelCallbackTable☆14Updated 3 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. Use it to copy SY…☆15Updated 8 years ago
- Fully undetectable UAC Bypass exploit - https://youtu.be/KfOPW0XI99s☆17Updated 3 years ago
- A windows kernel-mode rootkit with remote control☆12Updated 2 years ago
- Silent Monero (XMR) CPU miner☆23Updated 6 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Updated 4 years ago
- A very weird RAT☆19Updated 2 years ago
- Deobfuscator for : https://github.com/Blank-c/BlankOBF☆14Updated last year
- Multiple Password Generator - Unique Characters, Unique Sequences, Numbers, Uppercase, Lowercase, Symbols, Multiple Generator☆13Updated 7 years ago
- Make more then 100k r/s with HTTP Sockets☆11Updated 5 years ago
- ☆11Updated 6 years ago
- A small utility to run raw code chunks in the executable memory area.☆14Updated 10 years ago
- Debugger checks in 3 ways☆19Updated 7 years ago
- Monitor Files and Folders for Changes in Real Time .☆10Updated 6 years ago
- Enter Product Key Volatile Environment LPE☆12Updated 6 months ago
- Finder Predator The Thief botnet panel☆7Updated 5 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆24Updated 4 years ago
- Simple AutoIt crypter.☆11Updated 8 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 6 years ago
- DLL and API hooking example to hide running in a Terminal Session☆19Updated 5 years ago