{"id":19932448,"url":"https://github.com/apchavan/infopuller","last_synced_at":"2026-04-14T15:33:40.422Z","repository":{"id":40988802,"uuid":"375402702","full_name":"apchavan/InfoPuller","owner":"apchavan","description":"Helpful CLI application to fetch useful details about website domains or local machine, using the core Windows OS functions.","archived":false,"fork":false,"pushed_at":"2021-09-02T12:32:55.000Z","size":1878,"stargazers_count":3,"open_issues_count":0,"forks_count":0,"subscribers_count":1,"default_branch":"main","last_synced_at":"2025-03-01T11:33:00.139Z","etag":null,"topics":["autostart","c","cli-app","cpp","file-api","ipv4","ipv6","mac-address","malware-research","operating-system","persistence","registry-hacks","robots-txt","threat","win32-cpp","windows","windows-registry","winsock2"],"latest_commit_sha":null,"homepage":"","language":null,"has_issues":false,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/apchavan.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null}},"created_at":"2021-06-09T15:24:56.000Z","updated_at":"2024-01-12T22:46:59.000Z","dependencies_parsed_at":"2022-09-14T23:35:03.174Z","dependency_job_id":null,"html_url":"https://github.com/apchavan/InfoPuller","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/apchavan/InfoPuller","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/apchavan%2FInfoPuller","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/apchavan%2FInfoPuller/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/apchavan%2FInfoPuller/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/apchavan%2FInfoPuller/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/apchavan","download_url":"https://codeload.github.com/apchavan/InfoPuller/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/apchavan%2FInfoPuller/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":31803489,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-04-14T11:13:53.975Z","status":"ssl_error","status_checked_at":"2026-04-14T11:13:53.299Z","response_time":153,"last_error":"SSL_connect returned=1 errno=0 peeraddr=140.82.121.5:443 state=error: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["autostart","c","cli-app","cpp","file-api","ipv4","ipv6","mac-address","malware-research","operating-system","persistence","registry-hacks","robots-txt","threat","win32-cpp","windows","windows-registry","winsock2"],"created_at":"2024-11-12T23:10:12.131Z","updated_at":"2026-04-14T15:33:40.407Z","avatar_url":"https://github.com/apchavan.png","language":null,"readme":"# InfoPuller\nMenu driven \u003ca href=\"https://en.wikipedia.org/wiki/Command-line_interface\"\u003eCLI\u003c/a\u003e application that can get basic details for given website domain or local machine. It also has basic persistence similar to malware or threat. It's a personal project to get familiarity of Windows core functionalities... 🙂\n\n\u003ch2\u003e\u003cu\u003eFeatures overview\u003c/u\u003e :\u003c/h2\u003e\n\n\u003cu\u003e\u003ci\u003eVisible\u003c/i\u003e\u003c/u\u003e key features : \u003cBR /\u003e\n\n- Extract all of the available \u003ca href=\"https://en.wikipedia.org/wiki/IPv4\"\u003eIPv4\u003c/a\u003e and \u003ca href=\"https://en.wikipedia.org/wiki/IPv6\"\u003eIPv6\u003c/a\u003e addresses for given website.\n- Fetch response \u003ca href=\"https://developers.google.com/search/docs/advanced/robots/intro\"\u003erobots.txt\u003c/a\u003e for given website, then save and/or show.\n- Extract local machine's available IPv4 and IPv6 addresses.\n- Extract \u003ca href=\"https://en.wikipedia.org/wiki/MAC_address\"\u003eMedia Access Control (MAC)\u003c/a\u003e details for local machine, either in \u003ci\u003ebasic\u003c/i\u003e or in \u003ci\u003edetailed\u003c/i\u003e form.\n\n\u003cu\u003e\u003ci\u003eHidden\u003c/i\u003e\u003c/u\u003e key features : \u003cBR /\u003e\n\n- The application copies itself to other place and becomes hidden.\n- Makes changes in Windows registry to autostart things after every system startup.\n\n- [x] Also make sure to read post on \u003ca href=\"https://apchavan.medium.com/a67f28791e0b\"\u003e\u003ci\u003e\u003cb\u003eMedium.com\u003c/b\u003e\u003c/i\u003e\u003c/a\u003e which explains the \u003ci\u003ehidden\u003c/i\u003e (or sort of malicious) features in more detail.\n\n\u003ch2\u003e\u003cu\u003e\u003ca href=\"https://docs.microsoft.com/en-us/windows/win32/api/\"\u003eWin32\u003c/a\u003e API headers\u003c/u\u003e :\u003c/h2\u003e\n\n\u003col\u003e\n    \u003cli\u003e\n        \u003ca href=\"https://en.wikipedia.org/wiki/Windows.h\"\u003eWindows.h\u003c/a\u003e - A Windows-specific header file for the C and C++ programming languages which contains declarations for all of the functions in the Windows API.\n    \u003c/li\u003e\n    \u003cli\u003e\n        \u003ca href=\"https://en.wikipedia.org/wiki/C_file_input/output\"\u003estdio.h\u003c/a\u003e - Provides many standard library functions for input and output.\n    \u003c/li\u003e\n    \u003cli\u003e\n        \u003ca href=\"https://en.wikipedia.org/wiki/C_standard_library\"\u003estdlib.h\u003c/a\u003e - Provides macros, type definitions and functions for tasks such as string handling, mathematical computations, input/output processing, memory management, and several other operating system services.\n    \u003c/li\u003e\n    \u003cli\u003e\n        \u003ca href=\"https://docs.microsoft.com/en-us/windows/win32/api/fileapi/\"\u003efileapi.h\u003c/a\u003e - Used for Data Access and Storage.\n    \u003c/li\u003e\n    \u003cli\u003e\n        \u003ca href=\"https://docs.microsoft.com/en-us/windows/win32/api/winsock2/\"\u003eWinSock2.h\u003c/a\u003e - Provides useful functions for network programming such as sockets, IP addresses and so on. It is used by \u003ca href=\"https://docs.microsoft.com/en-us/windows/win32/api/_qos/\"\u003eQuality of Service (QOS)\u003c/a\u003e.\n    \u003c/li\u003e\n    \u003cli\u003e\n        \u003ca href=\"https://docs.microsoft.com/en-us/windows/win32/api/wininet/\"\u003eWinInet.h\u003c/a\u003e - To handle files over FTP/HTTP URL.\n    \u003c/li\u003e\n    \u003cli\u003e\n        \u003ca href=\"https://docs.microsoft.com/en-us/windows/win32/api/ws2tcpip/\"\u003eWS2tcpip.h\u003c/a\u003e - WinSock2 Protocol-Specific Annex document for TCP/IP that includes newer functions and structures used to retrieve IP addresses.\n    \u003c/li\u003e\n    \u003cli\u003e\n        \u003ca href=\"https://docs.microsoft.com/en-us/windows/win32/api/iphlpapi/\"\u003eiphlpapi.h\u003c/a\u003e - Provides functions to get \u003ca href=https://en.wikipedia.org/wiki/MAC_address\"\u003eMAC address\u003c/a\u003e details.\n    \u003c/li\u003e\n\u003c/ol\u003e\n\n\u003ch2\u003e\u003cu\u003eFeatures in detail\u003c/u\u003e :\u003c/h2\u003e\n\n\u003ch3\u003e{🌟} \u003cu\u003e\u003ci\u003eVisible\u003c/i\u003e\u003c/u\u003e key features : \u003c/h3\u003e\n\n  \u003ch3\u003e\u003cb\u003e1. Set website domain :\u003c/b\u003e\u003c/h3\u003e\n  \u003cul\u003e \n    \u003cli\u003e\n        When application is launched, the console window will opened and gets auto-maximized containing some fancy text representing the name of application with few numbered menu options to choose from : \u003cBR /\u003e\n        \u003cp align=\"center\"\u003e\u003cimg src=\"AppScreens/Launch.png\" /\u003e\u003c/p\u003e\n    \u003c/li\u003e\n    \u003cli\u003e\n        To get information about website, first set the domain using option '\u003cb\u003e1\u003c/b\u003e' (the domain should be in form of \u003ci\u003e\u003ca href=\"http://www.example.com/\"\u003ewww.example.com\u003c/a\u003e\u003c/i\u003e or \u003ci\u003e\u003ca href=\"http://www.example.com/\"\u003eexample.com\u003c/a\u003e\u003c/i\u003e) : \u003cBR /\u003e\n        \u003cp align=\"center\"\u003e\u003cimg src=\"AppScreens/ToSetWebsiteDomain.png\" /\u003e\u003c/p\u003e\n    \u003c/li\u003e\n    \u003cli\u003e\n        Now the website domain is all set; the other related menu options also get reflected : \u003cBR /\u003e\n        \u003cp align=\"center\"\u003e\u003cimg src=\"AppScreens/AfterWebsiteDomainSet.png\" /\u003e\u003c/p\u003e\n    \u003c/li\u003e\n    \u003cli\u003e\n        Setting the website domain is essential to get results otherwise one can not use menu options '\u003cb\u003e2\u003c/b\u003e' and '\u003cb\u003e3\u003c/b\u003e' related to website domains : \u003cBR /\u003e\n        \u003cp align=\"center\"\u003e\u003cimg src=\"AppScreens/TriedWithoutDomain.png\" /\u003e\u003c/p\u003e\n    \u003c/li\u003e\n    \u003cli\u003e\n        Providing \u003ci\u003eempty\u003c/i\u003e input will clear the domain that is set previously : \u003cBR /\u003e\n        \u003cp align=\"center\"\u003e\u003cimg src=\"AppScreens/EmptyInput_1.png\" /\u003e\u003c/p\u003e\n        \u003cp align=\"center\"\u003e\u003cimg src=\"AppScreens/EmptyInput_2.png\" /\u003e\u003c/p\u003e\n    \u003c/li\u003e\n  \u003c/ul\u003e\n\n  \u003ch3\u003e\u003cb\u003e2. Extract IP details :\u003c/b\u003e\u003c/h3\u003e\n  \u003cul\u003e\n    \u003cli\u003e\n        If the website domain set properly, program will list of all available IPv4 and IPv6 addresses : \u003cBR /\u003e\n        \u003cp align=\"center\"\u003e\u003cimg src=\"AppScreens/ListDomainIP.png\" /\u003e\u003c/p\u003e\n    \u003c/li\u003e\n    \u003cli\u003e\n        If any of IPv4 or IPv6 is not available, then useful message with related error code is returned : \u003cBR /\u003e\n        \u003cp align=\"center\"\u003e\u003cimg src=\"AppScreens/IPNotAvailable.png\" /\u003e\u003c/p\u003e\n        - Functions used : \u003cBR /\u003e\n        \u003ca href=\"https://docs.microsoft.com/en-us/windows/win32/api/ws2tcpip/nf-ws2tcpip-getaddrinfo\"\u003egetaddrinfo()\u003c/a\u003e,\n        \u003ca href=\"https://docs.microsoft.com/en-us/windows/win32/api/ws2tcpip/nf-ws2tcpip-inet_ntop\"\u003einet_ntop()\u003c/a\u003e.\n    \u003c/li\u003e\n  \u003c/ul\u003e\n\n  \u003ch3\u003e\u003cb\u003e3. Fetch 'robots.txt' :\u003c/b\u003e\u003c/h3\u003e\n  \u003cul\u003e\n    \u003cli\u003e\n        Based on the website domain, the program will try to get contents of 'robots.txt' and will ask user to choose either save (S) or print (p) : \u003cBR /\u003e\n        \u003cp align=\"center\"\u003e\u003cimg src=\"AppScreens/RobotsTxtInput.png\" /\u003e\u003c/p\u003e\n    \u003c/li\u003e\n    \u003cli\u003e\n        If user opted to save (S), program will save the response content in uniquely generated TEMP file and again will ask whether to view saved file in notepad (by creating separate process) : \u003cBR /\u003e\n        \u003cp align=\"center\"\u003e\u003cimg src=\"AppScreens/RobotsTxtAskToOpen.png\" /\u003e\u003c/p\u003e\n        \u003cp align=\"center\"\u003e\u003cimg src=\"AppScreens/RobotsTxtAfterOpen.png\" /\u003e\u003c/p\u003e\n        \u003cp align=\"center\"\u003e\u003ci\u003eThe file opened in notepad as a separate process.\u003c/i\u003e\u003c/p\u003e\n    \u003c/li\u003e\n    \u003cli\u003e\n        If user opted to print (p), program will print the response content in console : \u003cBR /\u003e\n        \u003cp align=\"center\"\u003e\u003cimg src=\"AppScreens/RobotsTxtPrint.png\" /\u003e\u003c/p\u003e\n        - Functions used : \u003cBR /\u003e\n        \u003ca href=\"https://docs.microsoft.com/en-us/windows/win32/api/wininet/nf-wininet-internetopena\"\u003eInternetOpenA()\u003c/a\u003e,\n        \u003ca href=\"https://docs.microsoft.com/en-us/windows/win32/api/wininet/nf-wininet-internetopenurla\"\u003eInternetOpenUrlA()\u003c/a\u003e,\n        \u003ca href=\"https://docs.microsoft.com/en-us/windows/win32/api/wininet/nf-wininet-internetclosehandle\"\u003eInternetCloseHandle()\u003c/a\u003e,\n        \u003ca href=\"https://docs.microsoft.com/en-us/windows/win32/api/fileapi/nf-fileapi-gettemppatha\"\u003eGetTempPathA()\u003c/a\u003e,\n        \u003ca href=\"https://docs.microsoft.com/en-us/windows/win32/api/fileapi/nf-fileapi-gettempfilenamea\"\u003eGetTempFileNameA()\u003c/a\u003e,\n        \u003ca href=\"https://docs.microsoft.com/en-us/windows/win32/api/fileapi/nf-fileapi-createfilea\"\u003eCreateFileA()\u003c/a\u003e,\n        \u003ca href=\"https://docs.microsoft.com/en-us/windows/win32/api/wininet/nf-wininet-internetreadfile\"\u003eInternetReadFile()\u003c/a\u003e,\n        \u003ca href=\"https://docs.microsoft.com/en-us/windows/win32/api/fileapi/nf-fileapi-writefile\"\u003eWriteFile()\u003c/a\u003e,\n        \u003ca href=\"https://docs.microsoft.com/en-us/windows/win32/api/handleapi/nf-handleapi-closehandle\"\u003eCloseHandle()\u003c/a\u003e,\n        \u003ca href=\"https://docs.microsoft.com/en-us/windows/win32/api/wininet/nf-wininet-internetclosehandle\"\u003eInternetCloseHandle()\u003c/a\u003e,\n        \u003ca href=\"https://docs.microsoft.com/en-us/windows/win32/api/processthreadsapi/nf-processthreadsapi-createprocessa\"\u003eCreateProcessA()\u003c/a\u003e.\n    \u003c/li\u003e\n  \u003c/ul\u003e\n\n  \u003ch3\u003e\u003cb\u003e4. My machine's IP :\u003c/b\u003e\u003c/h3\u003e\n  \u003cul\u003e\n    \u003cli\u003e\n        Shows the available IPv4 and IPv6 for the local machine. Here the IP addresses mostly contain collection of local and global addresses : \u003cBR /\u003e\n        \u003cp align=\"center\"\u003e\u003cimg src=\"AppScreens/MyMachinesIP.png\" /\u003e\u003c/p\u003e\n        - Functions used : \u003cBR /\u003e\n        \u003ca href=\"https://docs.microsoft.com/en-us/windows/win32/api/ws2tcpip/nf-ws2tcpip-getaddrinfo\"\u003egetaddrinfo()\u003c/a\u003e,\n        \u003ca href=\"https://docs.microsoft.com/en-us/windows/win32/api/ws2tcpip/nf-ws2tcpip-inet_ntop\"\u003einet_ntop()\u003c/a\u003e.\n    \u003c/li\u003e\n  \u003c/ul\u003e\n\n  \u003ch3\u003e\u003cb\u003e5. My Media Access Control (MAC) details :\u003c/b\u003e\u003c/h3\u003e\n  \u003cul\u003e\n    \u003cli\u003e\n        Shows the \u003ca href=\"https://en.wikipedia.org/wiki/MAC_address\"\u003eMedia Access Control (MAC)\u003c/a\u003e details for local machine. It offers to choose either basic (B) or detailed (d). \u003cBR /\u003e \n        The \u003ci\u003ebasic mode\u003c/i\u003e is similar to the command \u003cb\u003e\u003ci\u003e\u003cu\u003eipconfig /all\u003c/u\u003e\u003c/i\u003e\u003c/b\u003e and the detailed mode performs extensive searching and provide hardware details including the adapters created by virtualization softwares : \u003cBR /\u003e\n        \u003cp align=\"center\"\u003e\u003cimg src=\"AppScreens/MacDetailsBasicInput.png\" /\u003e\u003c/p\u003e\n        \u003cp align=\"center\"\u003e\u003cimg src=\"AppScreens/MacDetailsBasicResult.png\" /\u003e\u003c/p\u003e\n        \u003cp align=\"center\"\u003e\u003cimg src=\"AppScreens/MacDetailsDetailedInput.png\" /\u003e\u003c/p\u003e\n        \u003cp align=\"center\"\u003e\u003cimg src=\"AppScreens/MacDetailsDetailedResult.png\" /\u003e\u003c/p\u003e\n        - Functions used : \u003cBR /\u003e\n        \u003ca href=\"https://docs.microsoft.com/en-us/windows/win32/api/heapapi/nf-heapapi-heapalloc\"\u003eHeapAlloc()\u003c/a\u003e,\n        \u003ca href=\"https://docs.microsoft.com/en-us/windows/win32/api/iphlpapi/nf-iphlpapi-getadaptersaddresses\"\u003eGetAdaptersAddresses()\u003c/a\u003e,\n        \u003ca href=\"https://docs.microsoft.com/en-us/windows/win32/api/heapapi/nf-heapapi-heapfree\"\u003eHeapFree()\u003c/a\u003e,\n        \u003ca href=\"https://docs.microsoft.com/en-us/windows/win32/api/heapapi/nf-heapapi-getprocessheap\"\u003eGetProcessHeap()\u003c/a\u003e.\n    \u003c/li\u003e\n  \u003c/ul\u003e\n\n  \u003ch3\u003e\u003cb\u003e Help :\u003c/b\u003e\u003c/h3\u003e\n  Provides the usage information about the application. \u003cBR /\u003e\n  \u003cp align=\"center\"\u003e\u003cimg src=\"AppScreens/ShowHelpInput.png\" /\u003e\u003c/p\u003e\n  \u003cp align=\"center\"\u003e\u003cimg src=\"AppScreens/ShowHelpResult.png\" /\u003e\u003c/p\u003e\n  \u003cBR /\u003e\n\n\u003ch3\u003e{🌟} \u003cu\u003e\u003ci\u003eHidden\u003c/i\u003e\u003c/u\u003e key features : \u003c/h3\u003e\n\n  \u003ch3\u003e\u003cb\u003e1. Copy application and make hidden :\u003c/b\u003e\u003c/h3\u003e\n  \u003cul\u003e\n    \u003cli\u003e\n        As soon as the application launched, it checks and creates a copy of itself at TEMP path and make it hidden in order to keep a persistence :\n        \u003cp align=\"center\"\u003e\u003cimg src=\"AppScreens/CopyAndHidden.png\" /\u003e\u003c/p\u003e\n        - Functions used : \u003cBR /\u003e\n        \u003ca href=\"https://docs.microsoft.com/en-us/windows/win32/api/fileapi/nf-fileapi-gettemppatha\"\u003eGetTempPathA()\u003c/a\u003e,\n        \u003ca href=\"https://docs.microsoft.com/en-us/windows/win32/api/winbase/nf-winbase-copyfilea\"\u003eCopyFileA()\u003c/a\u003e,\n        \u003ca href=\"https://docs.microsoft.com/en-us/windows/win32/api/fileapi/nf-fileapi-getfileattributesa\"\u003eGetFileAttributesA()\u003c/a\u003e,\n        \u003ca href=\"https://docs.microsoft.com/en-us/windows/win32/api/fileapi/nf-fileapi-setfileattributesa\"\u003eSetFileAttributesA()\u003c/a\u003e.\n    \u003c/li\u003e\n  \u003c/ul\u003e\n\n  \u003ch3\u003e\u003cb\u003e2. Change Windows registry for autostart :\u003c/b\u003e\u003c/h3\u003e\n  \u003cul\u003e\n    \u003cli\u003e\n        Application adds some entries in Windows registry to autostart itself alongwith calculator and a text file saved as hidden at TEMP location : \u003cBR /\u003e\n        \u003cp align=\"center\"\u003e\u003cimg src=\"AppScreens/RegistryAutoStartEntries.png\" /\u003e\u003c/p\u003e\n        \u003cp align=\"center\"\u003e\u003cimg src=\"AppScreens/AutoStartedStuff.png\" /\u003e\u003c/p\u003e\n        - Functions used : \u003cBR /\u003e\n        \u003ca href=\"https://docs.microsoft.com/en-us/windows/win32/api/winreg/nf-winreg-regopencurrentuser\"\u003eRegOpenCurrentUser()\u003c/a\u003e,\n        \u003ca href=\"https://docs.microsoft.com/en-us/windows/win32/api/winreg/nf-winreg-regsetkeyvaluea\"\u003eRegSetKeyValueA()\u003c/a\u003e,\n        \u003ca href=\"https://docs.microsoft.com/en-us/windows/win32/api/fileapi/nf-fileapi-gettemppatha\"\u003eGetTempPathA()\u003c/a\u003e,\n        \u003ca href=\"https://docs.microsoft.com/en-us/windows/win32/api/fileapi/nf-fileapi-createfilea\"\u003eCreateFileA()\u003c/a\u003e,\n        \u003ca href=\"https://docs.microsoft.com/en-us/windows/win32/api/fileapi/nf-fileapi-writefile\"\u003eWriteFile()\u003c/a\u003e,\n        \u003ca href=\"https://docs.microsoft.com/en-us/windows/win32/api/handleapi/nf-handleapi-closehandle\"\u003eCloseHandle()\u003c/a\u003e,\n        \u003ca href=\"https://docs.microsoft.com/en-us/windows/win32/api/winreg/nf-winreg-regclosekey\"\u003eRegCloseKey()\u003c/a\u003e.\n    \u003c/li\u003e\n  \u003c/ul\u003e\n\n\u003cBR /\u003e\n- Other functions used : \u003cBR /\u003e\n\u003ca href=\"https://docs.microsoft.com/en-us/windows/win32/api/winsock2/nf-winsock2-wsastartup\"\u003eWSAStartup()\u003c/a\u003e,\n\u003ca href=\"https://docs.microsoft.com/en-us/windows/win32/api/winsock2/nf-winsock2-wsacleanup\"\u003eWSACleanup()\u003c/a\u003e,\n\u003ca href=\"https://docs.microsoft.com/en-us/windows/console/setconsoletitle\"\u003eSetConsoleTitleA()\u003c/a\u003e,\n\u003ca href=\"https://docs.microsoft.com/en-us/windows-hardware/drivers/ddi/wdm/nf-wdm-rtlsecurezeromemory\"\u003eSecureZeroMemory() (or RtlSecureZeroMemory())\u003c/a\u003e,\n\u003ca href=\"https://docs.microsoft.com/en-us/windows/win32/api/winuser/nf-winuser-findwindowa\"\u003eFindWindowA()\u003c/a\u003e,\n\u003ca href=\"https://docs.microsoft.com/en-us/windows/win32/api/winuser/nf-winuser-showwindow\"\u003eShowWindow()\u003c/a\u003e,\n\u003ca href=\"https://docs.microsoft.com/en-us/windows/win32/api/winuser/nf-winuser-setforegroundwindow\"\u003eSetForegroundWindow()\u003c/a\u003e.\n\n\n\u003cBR /\u003e\n\u003ch2\u003e\u003cu\u003eNOTE\u003c/u\u003e :\u003c/h2\u003e\nAs listed in \u003ci\u003ehidden features\u003c/i\u003e above, application uses core Windows OS headers and to avoid its use for malicious purposes, the code is not open sourced; instead the executable is provided if some one wants to see in action. 🙂\n\u003cBR /\u003e\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fapchavan%2Finfopuller","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fapchavan%2Finfopuller","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fapchavan%2Finfopuller/lists"}