Binklac / BACWindowsLinks
An anti-cheat project that includes kernel mode.
☆39Updated 4 years ago
Alternatives and similar repositories for BACWindows
Users that are interested in BACWindows are comparing it to the libraries listed below
Sorting:
- https://githacks.org/Shawick/goodeye.git☆52Updated 5 years ago
- Windows kernel drivers simple HTTP library for modern C++☆40Updated 7 years ago
- ☆47Updated 5 years ago
- Windows X64 mode use seh in manual mapped dll or manual mapped sys☆80Updated 3 years ago
- Using ReadDirectoryChangesW to detect CheatEngine☆51Updated 3 years ago
- ☆73Updated 3 years ago
- 以前改进的cheat内核通信模块,现在EAC Detected,现在发出来☆55Updated 4 years ago
- Top level overlay drawing for game cheating using dwm.exe☆47Updated 4 years ago
- clearing traces of a loaded driver☆47Updated 3 years ago
- mouseclassservicecallback detection via hook☆52Updated 4 years ago
- Stealing signatures from pe files☆15Updated 10 months ago
- Windows Kernel nt files - To research windows kernel☆15Updated 5 years ago
- 将驱动映射到会话空间☆38Updated 3 years ago
- ☆23Updated 2 years ago
- detect hypervisor with Nmi Callback☆42Updated 3 years ago
- ☆42Updated 3 years ago
- Only for Stress-Testing☆26Updated 3 years ago
- Not mine. Only for saving☆26Updated 3 years ago
- ☆18Updated 3 years ago
- InfinityHookProMax: Make InfinityHook great great again☆52Updated 2 years ago
- ☆35Updated 5 years ago
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchy☆83Updated 3 years ago
- This project will give you an example how you can hook a kernel vtable function that cannot be directly called☆84Updated 4 years ago
- ☆47Updated 3 years ago
- noob hooking dwm for overlay☆84Updated 5 years ago
- ☆18Updated 5 years ago
- Compile-Time Strings and Numbers Encryption for C++20☆58Updated 11 months ago
- Discarded Section Manual Map☆68Updated 5 years ago
- A wrapper class to hide the original calling address of a function☆55Updated 5 years ago
- ☆51Updated 2 years ago