# Proof-of-Concepts

- ["Jeff", COM-only keylogger](https://malwaresourcecode.com/home/my-projects/proof-of-concepts/jeff-com-only-keylogger.md)
- ["Russian Doll", Recursive file loader](https://malwaresourcecode.com/home/my-projects/proof-of-concepts/russian-doll-recursive-file-loader.md)
- ["Branchy", Branchless keylogger](https://malwaresourcecode.com/home/my-projects/proof-of-concepts/branchy-branchless-keylogger.md)
- ["Fever Dream" - Code executing when the Windows machine is locked](https://malwaresourcecode.com/home/my-projects/proof-of-concepts/fever-dream-code-executing-when-the-windows-machine-is-locked.md)
- [Creating "Ransomware" Using WinRT](https://malwaresourcecode.com/home/my-projects/proof-of-concepts/creating-ransomware-using-winrt.md)
- [Getting Clipboard History in C++](https://malwaresourcecode.com/home/my-projects/proof-of-concepts/getting-clipboard-history-in-c++.md)
- [Hiding data in GPU VRAM using Direct3D 11](https://malwaresourcecode.com/home/my-projects/proof-of-concepts/hiding-data-in-gpu-vram-using-direct3d-11.md)
- [OCRMe, dumping OneDrive Business OCR Data](https://malwaresourcecode.com/home/my-projects/proof-of-concepts/ocrme-dumping-onedrive-business-ocr-data.md)
- [Meow Meow Kitty Cat Meow Meow](https://malwaresourcecode.com/home/my-projects/proof-of-concepts/meow-meow-kitty-cat-meow-meow.md)
- [MMKCMM Insert](https://malwaresourcecode.com/home/my-projects/proof-of-concepts/meow-meow-kitty-cat-meow-meow/mmkcmm-insert.md)
- [MMKCMM Pspsps](https://malwaresourcecode.com/home/my-projects/proof-of-concepts/meow-meow-kitty-cat-meow-meow/mmkcmm-pspsps.md)
- [MMKCMM Loader](https://malwaresourcecode.com/home/my-projects/proof-of-concepts/meow-meow-kitty-cat-meow-meow/mmkcmm-loader.md)
- [Syscall Trampoline](https://malwaresourcecode.com/home/my-projects/proof-of-concepts/meow-meow-kitty-cat-meow-meow/mmkcmm-loader/syscall-trampoline.md)
- [MMKCMM Loader](https://malwaresourcecode.com/home/my-projects/proof-of-concepts/meow-meow-kitty-cat-meow-meow/mmkcmm-loader/mmkcmm-loader.md)
- [No Need COM WMI](https://malwaresourcecode.com/home/my-projects/proof-of-concepts/no-need-com-wmi.md)
- [Disabling Bitlocker Encryption using undocumented COM objects](https://malwaresourcecode.com/home/my-projects/proof-of-concepts/disabling-bitlocker-encryption-using-undocumented-com-objects.md)
- [Stupid callbacks for malware evasion](https://malwaresourcecode.com/home/my-projects/proof-of-concepts/stupid-callbacks-for-malware-evasion.md)
- [Microsoft Copilot, Copilot my payload](https://malwaresourcecode.com/home/my-projects/proof-of-concepts/microsoft-copilot-copilot-my-payload.md)
- [HTTPS TLS with AFD.sys, WinSocks not necessary](https://malwaresourcecode.com/home/my-projects/proof-of-concepts/https-tls-with-afd.sys-winsocks-not-necessary.md)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://malwaresourcecode.com/home/my-projects/proof-of-concepts.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
