savirsingh / pytocpp
Convert Python Code To C++ Code
☆14Updated last year
Related projects ⓘ
Alternatives and complementary repositories for pytocpp
- A tiny Windows hook library for x86/x64☆11Updated last year
- P.A.C.K.E.R is a simple DRM software that can grant and verify serial keys, encrypt & decrypt [RSA & AES] your software. It also has modu…☆21Updated 3 years ago
- Una interfaz para Jekyll que analiza fuentes C++ para producir y aplicar documentación fuera de línea.☆11Updated 3 months ago
- ☆8Updated last week
- filter driver to hide files and directories☆12Updated 9 months ago
- Signature finder (from PE-bear)☆29Updated 5 months ago
- Malware Development Framework☆9Updated 7 months ago
- StringEncrypt allows you to encrypt strings and files using a randomly generated algorithm, generating a unique decryption code (so-calle…☆20Updated last year
- ☆10Updated 7 months ago
- simple shared memory kernel-driver (its ass)☆11Updated 9 months ago
- stop any process from looking into your process by hooking.☆16Updated 7 months ago
- Debugger checks in 3 ways☆20Updated 6 years ago
- Multifunctional keylogger using WinAPI and libcurl☆16Updated 3 years ago
- IOCTL Dispatch driver to rw mem and more, the last version was used all over the community so i deicded to reamek the usermode (and km ;…☆13Updated last month
- An example of Windows self-replicating malware.☆10Updated last year
- ☆12Updated 3 years ago
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆13Updated 11 months ago
- ☆10Updated 3 years ago
- A manual PE mapping implementation, aka reflective loader☆17Updated 2 years ago
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆18Updated last year
- PE File Code Cave Helper (Backdooring and/or Basic Section Obfuscation)☆21Updated 4 years ago
- Detour hooking IRQ1 ISR through IDT (Interrupt Descriptor Table)☆19Updated last year
- golang String Obfuscate☆9Updated 2 years ago
- Source code on the 1.44MB 3.5 floppy accompanying the Windows NT File System Internals book.☆15Updated 5 years ago
- a simple kernelmode spoofer that changes all your serialnumbers to any value set from usermode using my own communication method.☆11Updated 7 months ago
- Code injection via ZwCreateSection, ZwUnmapViewOfSection. C++ example☆16Updated 2 years ago
- Neutralize KEPServerEX anti-debugging techniques☆31Updated last year
- hyperv-driver-thread-detection-poc☆11Updated 3 years ago
- The sequel to Voyager☆18Updated 3 months ago