The main purpose of this repository is to explain the internal Overwatch functions of the Blizzard-Device-Identification system.
☆38Jul 21, 2022Updated 3 years ago
Alternatives and similar repositories for Blizzard-Device-Identification-Explained
Users that are interested in Blizzard-Device-Identification-Explained are comparing it to the libraries listed below
Sorting:
- Overwatch Anti-Flag☆109Dec 7, 2023Updated 2 years ago
- overwatch2 tope external☆26Jun 18, 2024Updated last year
- Overwatch 2 Tool which shows Players through walls.☆13Feb 9, 2024Updated 2 years ago
- ☆27Jun 24, 2022Updated 3 years ago
- patch eft functions to allow for offline matches without battleye running☆60Mar 18, 2023Updated 2 years ago
- Had this laying around on my Disk☆16Oct 27, 2022Updated 3 years ago
- hook KeyboardClassServiceCallback to prevent messing up sistema☆26Nov 14, 2023Updated 2 years ago
- ☆25Aug 7, 2023Updated 2 years ago
- A tool for parsing Blizzard Battle.net product.db on your system.☆11Feb 17, 2022Updated 4 years ago
- A deobfuscator for overwatch's obfuscation.☆39Dec 27, 2020Updated 5 years ago
- Self-hosting binary instrumentation framework for security research☆12Apr 10, 2023Updated 2 years ago
- My Personal Kernel-Mode Process dumper☆13Feb 18, 2024Updated 2 years ago
- A simple example how to decrypt kernel debugger data block☆32Feb 8, 2021Updated 5 years ago
- ☆42Jul 1, 2022Updated 3 years ago
- BlizzTrack monorepo, this contains all the systems that drive the website☆24Jun 10, 2022Updated 3 years ago
- Mapping your code on a 0x1000 size page☆71May 20, 2022Updated 3 years ago
- Using CVE-2021-40449 to manual map kernel mode driver☆104Mar 5, 2022Updated 3 years ago
- A minimal CR3 protection PoC (KdpTrap hook)☆15Jan 25, 2025Updated last year
- ☆15Sep 24, 2012Updated 13 years ago
- Medal.tv Hook / D3D Present & ResizeBuffers Hook☆22Oct 3, 2022Updated 3 years ago
- A clean, simple, c++14, Entity Component System like Overwatch ECS architecture☆54Mar 24, 2020Updated 5 years ago
- A PoC for requesting HWIDs directly from hardware, skipping any potential hooks or OS support.☆89Mar 16, 2021Updated 4 years ago
- POC for your p2c "unique loader build"☆13Jun 28, 2024Updated last year
- Single header code that sets any section's page to No Access☆11Feb 15, 2022Updated 4 years ago
- Decode the values sent in Ubisoft's dmx.upc.ubisoft.com API. Part of my work to reverse engineer Ubisoft Connect's APIs.☆14Jul 4, 2022Updated 3 years ago
- ☆13Sep 25, 2023Updated 2 years ago
- ☆18Jan 11, 2026Updated last month
- This driver hooks a device object for ioctl and uses mdls to allocate physical pages and manually injects an entry into a process's page …☆15Feb 14, 2023Updated 3 years ago
- ☆59Jun 8, 2022Updated 3 years ago
- This is the PoC of a dynamic lifter and deobfuscator with collecting trace.☆37Oct 11, 2023Updated 2 years ago
- Made by scammer so i leak for free ! have fun☆56Feb 26, 2023Updated 3 years ago
- Neutralize KEPServerEX anti-debugging techniques☆33Feb 15, 2023Updated 3 years ago
- A lightweight x86/x64 VM☆18Feb 7, 2021Updated 5 years ago
- recovers and reconstructs fragmented Evtx files from disk images, memory dumps, pagefiles and unallocated space☆13Feb 3, 2015Updated 11 years ago
- undetected cheat engine 7.2☆12Dec 28, 2020Updated 5 years ago
- LPC (Local Procedure Call) is a portion of Windows NT kernel, used for fast communication between threads or processes. It can be also us…☆15Mar 21, 2021Updated 4 years ago
- ☆34Mar 3, 2024Updated 2 years ago
- Library to manipulate drivers that expose a physical memory read/write primitive.☆41Sep 4, 2023Updated 2 years ago
- An API Monitor based on Instrumentation☆43Dec 19, 2017Updated 8 years ago