ARandomPerson7 / G-Presto-Anti-Cheat-Reverse-EngineeredLinks
G-Presto Anti-Cheat Reverse Engineered.
☆23Updated 3 years ago
Alternatives and similar repositories for G-Presto-Anti-Cheat-Reverse-Engineered
Users that are interested in G-Presto-Anti-Cheat-Reverse-Engineered are comparing it to the libraries listed below
Sorting:
- ☆22Updated 3 years ago
- pointer obfuscation☆26Updated 7 years ago
- Libraries written in inline assembly☆19Updated last year
- ☆36Updated 3 years ago
- ☆13Updated 2 years ago
- ☆10Updated 3 years ago
- My Personal Kernel-Mode Process dumper☆13Updated last year
- Disable threat tracing from the kernel..☆13Updated 3 years ago
- Nightshade is a Windows Memory Manipluation library specifically for injecting DLLs and Game Hacking☆14Updated 2 years ago
- ☆28Updated 3 years ago
- it's a driver injector or driver loader header lib(Windows)☆12Updated last year
- IDA Map File Symbol Renamer☆22Updated 3 months ago
- ☆40Updated 2 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆44Updated 2 years ago
- Implementation of a LLVM Compiler Plugin for C++ Obfuscation☆42Updated 2 years ago
- A simple example how to decrypt kernel debugger data block☆29Updated 4 years ago
- ☆27Updated last year
- A project on the Unicorn emulator to emulate the code of Pe files in windows☆26Updated 10 months ago
- A helper class for hardware breakpoints☆12Updated 5 years ago
- ☆20Updated 2 years ago
- ☆30Updated 3 years ago
- ☆16Updated 2 years ago
- single-header pointer/value encryption☆18Updated last year
- Code virtualizer☆25Updated 9 years ago
- 巨硬☆16Updated last year
- ☆15Updated 4 years ago
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆29Updated 3 years ago
- neat way to detect memory read using nt layer function.☆14Updated last year
- Fix VMProtect 3.xx (tested 3.0.9 to 3.5.0)☆17Updated 3 years ago
- pdb's function and global vars to offset☆10Updated 2 years ago