ARandomPerson7 / G-Presto-Anti-Cheat-Reverse-EngineeredLinks
G-Presto Anti-Cheat Reverse Engineered.
☆23Updated 3 years ago
Alternatives and similar repositories for G-Presto-Anti-Cheat-Reverse-Engineered
Users that are interested in G-Presto-Anti-Cheat-Reverse-Engineered are comparing it to the libraries listed below
Sorting:
- ☆36Updated 3 years ago
- ☆22Updated 3 years ago
- A simple example how to decrypt kernel debugger data block☆29Updated 4 years ago
- pointer obfuscation☆27Updated 7 years ago
- Nightshade is a Windows Memory Manipluation library specifically for injecting DLLs and Game Hacking☆14Updated 2 years ago
- My Personal Kernel-Mode Process dumper☆13Updated last year
- Implementation of a LLVM Compiler Plugin for C++ Obfuscation☆42Updated 2 years ago
- Code virtualizer☆25Updated 9 years ago
- ☆20Updated 2 years ago
- IDA Map File Symbol Renamer☆22Updated 4 months ago
- pdb's function and global vars to offset☆10Updated 2 years ago
- Experimental disassembler for x86 binaries virtualized by VMProtect 3☆96Updated 2 years ago
- Analysing and defeating PatchGuard universally☆35Updated 4 years ago
- This is a ring -1 header framework in order to simplify the creation of hypervisors on SVM☆26Updated last year
- A project on the Unicorn emulator to emulate the code of Pe files in windows☆27Updated 10 months ago
- ☆28Updated 3 years ago
- UnknownField is a tool based clang that obfuscating the order of fields to protect your C/C++ game or code.☆45Updated 2 years ago
- Fix VMProtect 3.xx (tested 3.0.9 to 3.5.0)☆17Updated 3 years ago
- ☆13Updated 2 years ago
- A simple kernel mode driver that hooks some values at the KUSER_SHARED_DATA structure.☆26Updated 5 years ago
- ☆39Updated 2 years ago
- ☆18Updated 3 years ago
- neat way to detect memory read using nt layer function.☆14Updated 2 years ago
- ☆30Updated 3 years ago
- A lightweight x86/x64 VM☆18Updated 4 years ago
- Open Anti Cheat☆27Updated 3 years ago
- x64 injector using LoadLibrary made in assembler (MASM)☆26Updated 7 years ago
- VEH Redirect & VEH Debugger☆23Updated 5 years ago
- Intraceptor intercept Windows NT API calls and redirect them to a kernel driver to bypass process/threads handle protections.☆29Updated 3 years ago
- x64 assembler library☆31Updated last year