# My Projects

- [Proof-of-Concepts](https://malwaresourcecode.com/home/my-projects/proof-of-concepts.md)
- ["Jeff", COM-only keylogger](https://malwaresourcecode.com/home/my-projects/proof-of-concepts/jeff-com-only-keylogger.md)
- ["Russian Doll", Recursive file loader](https://malwaresourcecode.com/home/my-projects/proof-of-concepts/russian-doll-recursive-file-loader.md)
- ["Branchy", Branchless keylogger](https://malwaresourcecode.com/home/my-projects/proof-of-concepts/branchy-branchless-keylogger.md)
- ["Fever Dream" - Code executing when the Windows machine is locked](https://malwaresourcecode.com/home/my-projects/proof-of-concepts/fever-dream-code-executing-when-the-windows-machine-is-locked.md)
- [Creating "Ransomware" Using WinRT](https://malwaresourcecode.com/home/my-projects/proof-of-concepts/creating-ransomware-using-winrt.md)
- [Getting Clipboard History in C++](https://malwaresourcecode.com/home/my-projects/proof-of-concepts/getting-clipboard-history-in-c++.md)
- [Hiding data in GPU VRAM using Direct3D 11](https://malwaresourcecode.com/home/my-projects/proof-of-concepts/hiding-data-in-gpu-vram-using-direct3d-11.md)
- [OCRMe, dumping OneDrive Business OCR Data](https://malwaresourcecode.com/home/my-projects/proof-of-concepts/ocrme-dumping-onedrive-business-ocr-data.md)
- [Meow Meow Kitty Cat Meow Meow](https://malwaresourcecode.com/home/my-projects/proof-of-concepts/meow-meow-kitty-cat-meow-meow.md)
- [MMKCMM Insert](https://malwaresourcecode.com/home/my-projects/proof-of-concepts/meow-meow-kitty-cat-meow-meow/mmkcmm-insert.md)
- [MMKCMM Pspsps](https://malwaresourcecode.com/home/my-projects/proof-of-concepts/meow-meow-kitty-cat-meow-meow/mmkcmm-pspsps.md)
- [MMKCMM Loader](https://malwaresourcecode.com/home/my-projects/proof-of-concepts/meow-meow-kitty-cat-meow-meow/mmkcmm-loader.md)
- [Syscall Trampoline](https://malwaresourcecode.com/home/my-projects/proof-of-concepts/meow-meow-kitty-cat-meow-meow/mmkcmm-loader/syscall-trampoline.md)
- [MMKCMM Loader](https://malwaresourcecode.com/home/my-projects/proof-of-concepts/meow-meow-kitty-cat-meow-meow/mmkcmm-loader/mmkcmm-loader.md)
- [No Need COM WMI](https://malwaresourcecode.com/home/my-projects/proof-of-concepts/no-need-com-wmi.md)
- [Disabling Bitlocker Encryption using undocumented COM objects](https://malwaresourcecode.com/home/my-projects/proof-of-concepts/disabling-bitlocker-encryption-using-undocumented-com-objects.md)
- [Stupid callbacks for malware evasion](https://malwaresourcecode.com/home/my-projects/proof-of-concepts/stupid-callbacks-for-malware-evasion.md)
- [Microsoft Copilot, Copilot my payload](https://malwaresourcecode.com/home/my-projects/proof-of-concepts/microsoft-copilot-copilot-my-payload.md)
- [HTTPS TLS with AFD.sys, WinSocks not necessary](https://malwaresourcecode.com/home/my-projects/proof-of-concepts/https-tls-with-afd.sys-winsocks-not-necessary.md)
- [Write-ups](https://malwaresourcecode.com/home/my-projects/write-ups.md)
- [A Quick Guide to Defining Malware with $0, Python3, and Windows](https://malwaresourcecode.com/home/my-projects/write-ups/a-quick-guide-to-defining-malware-with-usd0-python3-and-windows.md)
- [Why do video games use kernel-mode anti-cheats?](https://malwaresourcecode.com/home/my-projects/write-ups/why-do-video-games-use-kernel-mode-anti-cheats.md)
- [Fake Lockbit 5.0 silliness and 3 layers of ransomware lasagna](https://malwaresourcecode.com/home/my-projects/write-ups/fake-lockbit-5.0-silliness-and-3-layers-of-ransomware-lasagna.md)
- [Wtf are these Threat Actors doing? XUbuntu malware is dumb and stinky](https://malwaresourcecode.com/home/my-projects/write-ups/wtf-are-these-threat-actors-doing-xubuntu-malware-is-dumb-and-stinky.md)
- [The rise of malware mainstream "acceptance" and "popularity" is thanks to the government](https://malwaresourcecode.com/home/my-projects/write-ups/the-rise-of-malware-mainstream-acceptance-and-popularity-is-thanks-to-the-government.md)
- [Can "adult" websites actually "infect" your computer?](https://malwaresourcecode.com/home/my-projects/write-ups/can-adult-websites-actually-infect-your-computer.md)
- [Free MacOS malware for everyone! Hurry up before Google patches it!](https://malwaresourcecode.com/home/my-projects/write-ups/free-macos-malware-for-everyone-hurry-up-before-google-patches-it.md)
- [Some quick notes on Microsoft Copilot](https://malwaresourcecode.com/home/my-projects/write-ups/some-quick-notes-on-microsoft-copilot.md)
- [r/PiratedGames drama. Is it malware? Yes. Is it cool malware? No](https://malwaresourcecode.com/home/my-projects/write-ups/r-piratedgames-drama.-is-it-malware-yes.-is-it-cool-malware-no.md)
- [MalwareBytes internals (incomplete)](https://malwaresourcecode.com/home/my-projects/write-ups/malwarebytes-internals-incomplete.md)
- [Smokest Stealer, a new malware family? Maybe?](https://malwaresourcecode.com/home/my-projects/write-ups/smokest-stealer-a-new-malware-family-maybe.md)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://malwaresourcecode.com/home/my-projects.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
