Skip to content

Latest commit

 

History

History
5 lines (4 loc) · 234 Bytes

File metadata and controls

5 lines (4 loc) · 234 Bytes

Manual-Syscall-PostMessageA-Example

Some malicious applications intercept user32.dll calls. Check this application so you won't get fooled.

This example sends "t" to notepad by manually doing the Syscall to execute PostMessageA.