wekillpeople / hotspot-windowsLinks
Turn your Windows PC into a WiFi Hotspot with C!
☆39Updated 9 years ago
Alternatives and similar repositories for hotspot-windows
Users that are interested in hotspot-windows are comparing it to the libraries listed below
Sorting:
- Contains some tricks to detect Sandboxes and gradually completed☆44Updated 8 years ago
- Windows hard shutdown shellcode. Don't need administrator rights.☆14Updated 9 years ago
- A Win32 PE/Executable Crypter that employs on the fly encryption & decryption of memory☆33Updated 11 years ago
- anti-virtualmachine with C!☆23Updated 9 years ago
- MSTSC Packet Dump Utility☆29Updated 3 years ago
- C++☆80Updated 9 years ago
- PE Infector/Cryptor source code☆21Updated 3 years ago
- GetHooks is a program designed for the passive detection and monitoring of hooks from a limited user account.☆61Updated 4 years ago
- windows create process with a dll load first time via LdrHook☆31Updated 9 years ago
- Anti-AV compilation☆44Updated 12 years ago
- Dump Windows PE file information in C☆24Updated 10 years ago
- User-mode hook bypassing method☆33Updated 9 years ago
- ☆34Updated 7 years ago
- Bypass antivirus with dynamic import. Hide the api(s) used.☆28Updated 9 years ago
- simple PE packer written in C++☆55Updated 7 years ago
- PoC executable packer using resources☆31Updated 9 years ago
- DiskCryptor - Open source partition encryption solution☆42Updated 11 years ago
- Examples for detection of hidden processes on windows☆35Updated 11 years ago
- A session-0 capable dll injection utility☆76Updated 7 years ago
- ☆31Updated 10 years ago
- ☆39Updated 8 years ago
- Bootkit for Windows 7☆27Updated 11 years ago
- Library for binary signature scanning.☆28Updated last year
- A simple rootkit to hide a process☆47Updated 11 years ago
- Samples about Microsoft RPC and native API calls in Windows C☆62Updated 9 years ago
- Protects deletion of files with a specified extension using a kernel-mode driver.☆76Updated 7 years ago
- Code Injection technique written in cpp language☆33Updated 7 years ago
- Two tools used during our analysis of the Microsoft binary injection mitigation implemented in Edge TH2.☆53Updated 8 years ago
- Code Injector Using Code Caves☆15Updated 10 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Updated 10 years ago