ApexLegendsUC / anti-cheat-emulatorLinks
☆185Updated 6 years ago
Alternatives and similar repositories for anti-cheat-emulator
Users that are interested in anti-cheat-emulator are comparing it to the libraries listed below
Sorting:
- ☆73Updated 5 years ago
- driver mapper / capcom wrapper☆220Updated 5 years ago
- Hooking kernel functions by abusing alignment☆243Updated 4 years ago
- Windows kernel samples☆253Updated 6 years ago
- This is a source to a bypass i made for some games, for now this should work f or VAC, BE and EAC. The only downside is that you will nee…☆183Updated 4 years ago
- a more stable & secure read/write virtual memory for kernel mode drivers☆164Updated 5 years ago
- ☆143Updated 4 years ago
- This DKOM exploit enables any app in usermode to access physical memory directly☆223Updated 7 years ago
- ☆153Updated 5 years ago
- ayy debuger☆89Updated last year
- The program draws with win32k gdi functions in the kernel while NtGdiDdDDISubmitCommand is being hooked.☆303Updated 5 years ago
- 09/2021 reversal of EasyAntiCheat driver☆219Updated 3 years ago
- PoC: DX11 overlay over DWM☆156Updated 4 years ago
- Intercepting DeviceControl via WPP☆134Updated 5 years ago
- Hide codes/data in the kernel address space.☆190Updated 4 years ago
- manually map driver for a signed driver memory space☆160Updated 4 years ago
- Just my first IOCTL try☆74Updated 4 years ago
- A kernelmode driver swapping a .data pointer in the kernel to perform communication between the kernel and usermode.☆143Updated 4 years ago
- Module extending manual mapper☆338Updated 5 years ago
- BattlEye x64 usermode injector☆65Updated 6 years ago
- A library to manipulate physical memory from usermode.☆294Updated last year
- Page fault hook use ept (Intel Virtualization Technology)☆188Updated 8 years ago
- Simple mmapper which using UEFI runtime driver.☆81Updated 5 years ago
- BattlEye shellcodes tester☆148Updated 3 years ago
- undetected eac mapper☆166Updated 3 years ago
- ☆99Updated last year
- ☆168Updated 7 years ago
- Detect-KeAttachProcess by iterating through all processes as well as checking the context of the thread.☆113Updated 3 years ago
- External mid-function hooking method to retrieve register data☆90Updated 6 years ago
- Easy Anti PatchGuard☆221Updated 4 years ago