12 skills found
mity / MctrlC library providing set of additional user interface controls for Windows, intended to be complementary to standard Win32API controls from USER32.DLL and COMCTL32.DLL.
jamesmoriarty / GohackExperimental Go language CSGO exploit.
KiExitDispatcher / Nyx Full Dll Unhook(EDR) Dll Unhooking = kernel32.dll, kernelbase.dll, ntdll.dll, user32.dll, apphelp.dll, msvcrt.dll.
Venryx / Windows FfiNodeJS wrappers around Windows p-invoke/dll functions in user32, gdi32, etc. (based on node-ffi-napi)
55-AA / Fetch SyscallsAn IdaPython tool for getting syscall's ID and function name from ntdll.dll, user32.dll, and so on.
Byulbram / WinInputWindows input system for Unity3D using GetAsyncKeyState() from Windows user32.dll to avoid not-english IME problems in Unity3D Input.GetKey() function.
etfovac / WinAPI LVLabVIEW LIB & examples that use custom WinAPI.dll (InteropAssembly that wrapps user32 and shell32 functions)
oxfemale / Fake User32Fake user32.dll
o5h / WinapiGolang wrapper for Windows API
6yx1n / ModuleStomp模块践踏:ModuleStomp(模块覆盖)是一种通过覆盖合法模块内存空间实现shellcode注入的技术,其核心优势在于利用系统可信模块(如user32.dll)的内存区域隐藏恶意代码,规避传统内存检测机制。与进程注入、线程注入等传统技术相比,ModuleStomp以“借壳合法实体、精简执行链路”为核心设计,成为恶意软件领域的进阶隐蔽技术。本文将结合技术实现代码,从技术原理、代码拆解、技术优势、检测防御四个维度,全面剖析ModuleStomp的底层逻辑与应用特点。
etfovac / WinAPISelected subset of Win (user32, shell32) API function calls for Window, Taskbar, etc handling, conveniently organized and wrapped in a C# DLL
stephen-fox / User32utilPackage user32util provides helper functionality for working with Windows' user32 library.