-
Notifications
You must be signed in to change notification settings - Fork 1
Bisleri06/WindowsApiMalware
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
I assume no responsibility or liability for any errors or misuse of the contents of this respository. Index: appendfile.cpp: program to append to a file using windows api asyncio.cpp: async file read write features of windows api encrypted_shellcode.cpp: decrypts cmd.exe payload with xor encryption and executes it fuck_debugger.cpp: basic POC to show how to prevent your program from being debugged by others keylogger.cpp: basic keylogger using windows api print_doc.cpp: prints a message on A4 size paper through an HP printer readfile.cpp: reads a text file using windows api shellcode_exec.cpp: shows shellcode execution methods using function pointers and threads in windows shellcode_exec_page_hunt.cpp: hijacks a process and executes shellcode in any one of its existing eligible pages in memory shellcode_exec_remote_process.cpp: allocates memory in any eligible process and executes shellcode from there worm.cpp: A simple worm in c++ which copies itself to every new storage media that is attached to a windows computer
About
Contains malwares made while exploring the windows API
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published