AberFray / how-to-make-game-cheats-and-anticheatsLinks
Edubox: An open-source learning resource for client side video game cheats and anti-cheats [This resource is only meant for educational purposes]
☆56Updated 2 years ago
Alternatives and similar repositories for how-to-make-game-cheats-and-anticheats
Users that are interested in how-to-make-game-cheats-and-anticheats are comparing it to the libraries listed below
Sorting:
- Unofficial Rust SDK for VMProtect☆94Updated 2 months ago
- Binary Ninja plugin for automating VMProtect analysis☆63Updated 2 years ago
- The tool can be used to eliminate redundant instructions in a basic block.☆80Updated 2 years ago
- Instrumenting a binary without source code to bypass anti-debug checks☆36Updated 4 years ago
- Intel Hardware Trace Library - Kernel Space Componment☆72Updated 3 weeks ago
- ☆37Updated 2 years ago
- Tiny dynamic binary rewriter fox x86.☆51Updated 3 years ago
- Mixed Boolean-Arithmetic in Rust for WebAssembly☆30Updated 4 months ago
- Binary Ninja plugin that can be used to apply Triton's dead store eliminitation pass on basic blocks or functions.☆64Updated last year
- Simple library to Read and Write Memory of a Linux Process through custom Kernel Module☆52Updated 5 years ago
- Symbolic executor for Binary Ninja's MLIL☆26Updated last year
- Plugin on Python; Create signatures for rust binaries☆18Updated 2 years ago
- Obfuscator based on logic-bombs☆67Updated 5 years ago
- A library that provides methods to inline hook binary codes in x86 and x86_64 architecture☆94Updated last week
- vmp2.x devirtualization☆84Updated last year
- LLDB based debugger for Linux Kernel☆27Updated 7 months ago
- ☆53Updated 3 months ago
- Cross-platform library for binary debugging and memory hacking written in Rust☆105Updated last year
- Code virtualizer☆25Updated 9 years ago
- Deobfuscation of Semi-Linear Mixed Boolean-Arithmetic Expressions☆72Updated last month
- In-memory ELF shared library loading☆43Updated 2 years ago
- IDA Database Parser for Rust☆25Updated last year
- WIP☆14Updated 3 years ago
- an obfuscator based on LLVM which can obfuscate the program execution trajectory☆106Updated 4 years ago
- Emulate Drivers in RING3 with self context mapping or unicorn☆20Updated 10 months ago
- LLVM pass that obfuscates against symbolic execution☆75Updated 7 years ago
- User-friendly reference finder in IDA☆38Updated 2 years ago
- Exemplary LLVM function pass implementing Control Flow Flattening.☆17Updated 7 years ago
- Reverse engineered API for Microsoft's Time Travel Debugger☆35Updated last year
- Playing with LLVM passes☆37Updated 2 years ago