BitCrackers / version-proxy
DLL proxy for Windows versioning API for injecting code into target processes in both x86 and x64 without having to use an injector.
☆39Updated 3 years ago
Alternatives and similar repositories for version-proxy:
Users that are interested in version-proxy are comparing it to the libraries listed below
- Disables virtualprotect checks/hooks so you can modify memory and change memory protection in binaries protected by VMProtect.☆125Updated 3 years ago
- dumps il2cpp dummy dlls during runtime☆98Updated 3 years ago
- Just a simple C++ version of CE's Speed Hack.☆39Updated 4 years ago
- VMProtect, VMP, Devirter, 3,5☆106Updated 2 years ago
- Various IDA scripts I've created for Reverse engineering.☆83Updated 4 months ago
- ☆50Updated 3 weeks ago
- BattlEye compatible injector, done completely from user-mode.☆54Updated last year
- DX11 BaseHook with Dear ImGUI Implementation through rdbo/libmem☆110Updated 4 years ago
- External Il2Cpp Framework☆58Updated 3 years ago
- game dumper☆44Updated 4 years ago
- Simple DLL that spoofs EasyAntiCheat on most games☆120Updated 10 months ago
- C++ Framework for external cheats☆68Updated 7 months ago
- A mini anti-anti debug hooking library for Windows.☆106Updated 4 years ago
- Intercept ProcessEvent calls on any game object (Unreal Engine 4)☆47Updated 2 years ago
- Iterate FUObjectArray->ObjObjects & FNamePool->Entries☆38Updated 2 years ago
- undetected eac mapper☆164Updated 2 years ago
- bypass vmp virtual machine detect☆128Updated 2 years ago
- VMP 3.X decrypt iat☆23Updated 7 months ago
- DirectX 9 EndScene Hook with Dear ImGUI implementation through rdbo/libmem☆67Updated 4 years ago
- Simple internal base using CheatGear SDK`s or Dumper-7☆36Updated last year
- Simple IDA Pro plugin to download Unity debug symbols from their symbol server☆60Updated 11 months ago
- This tool Decrypt and Extract the files from the EAC☆63Updated last year
- A kernel injector for EAC and BE☆95Updated 10 months ago
- Scans all modules in target process for jmp/int3 hooks dissassembles then and follows jmps to destination.☆75Updated last year
- Archive R/W into any protected process by changing the value of KTHREAD->PreviousMode☆153Updated 2 years ago
- kernel mode spoofer disk and smbios, socket communication☆159Updated 2 years ago
- ☆139Updated last year
- A simple EasyAntiCheat x64 emulator.☆47Updated 5 years ago
- Attempts to decrypt JM Xorstr in some x64 binaries☆52Updated 2 years ago
- Using ReadDirectoryChangesW to detect CheatEngine☆48Updated 2 years ago