Azvanzed / vilspyLinks
a simple obfuscator
☆1Updated last year
Alternatives and similar repositories for vilspy
Users that are interested in vilspy are comparing it to the libraries listed below
Sorting:
- Achieving code execution through abusing vectored exception handling☆17Updated 2 years ago
- communicate with kernel using a image on disk☆16Updated last year
- ☆26Updated last year
- ☆41Updated 2 years ago
- PAGE_GUARD based hooking library☆47Updated 3 years ago
- Extracts eac's payload which is injected into the game at runtime.☆30Updated 3 months ago
- UM-KM Communication using registry callbacks☆40Updated 5 years ago
- ☆32Updated 3 years ago
- Mapping your code on a 0x1000 size page☆72Updated 3 years ago
- ☆42Updated 3 years ago
- Stealing signatures from pe files☆17Updated 4 months ago
- Allows for same-file KernelMode function execution using Encrypted addresses of Functions☆43Updated 9 months ago
- Virtual and physical memory hacking library using gigabyte vulnerable driver☆71Updated 2 years ago
- A lightweight BattlEye emulator of the launcher☆61Updated 2 years ago
- ☆39Updated 2 years ago
- Bypass using kernel driver (not finish).☆21Updated 2 years ago
- PE Header (.rdata,.data,.text) obsfucation☆37Updated 3 years ago
- POC kernel driver with hidden system thread☆14Updated last year
- Extracts eac's driver at runtime without it touching the disk.☆34Updated 4 months ago
- ☆46Updated 3 years ago
- A simple present scene, kernel allocation injector.☆24Updated 3 years ago
- ☆53Updated 2 years ago
- ☆19Updated 2 years ago
- Old way for blocking NMI interrupts☆27Updated 2 years ago
- Made by scammer so i leak for free ! have fun☆56Updated 2 years ago
- A simple MmCopyMemory hook.☆37Updated 3 years ago
- Hijack NotifyRoutine for a kernelmode thread☆42Updated 3 years ago
- Hardware ID☆50Updated 3 years ago
- Had this laying around on my Disk☆17Updated 2 years ago
- Allows you to find the use of ScyllaHide, if your program will debug and restore hooking functions bytes.☆26Updated 6 years ago