External Il2Cpp Framework
☆63Jul 6, 2021Updated 4 years ago
Alternatives and similar repositories for external-il2cpp
Users that are interested in external-il2cpp are comparing it to the libraries listed below
Sorting:
- Mapping your code on a 0x1000 size page☆71May 20, 2022Updated 3 years ago
- [Reworking] A run-time API resolver for IL2CPP Unity(External).☆67Apr 11, 2025Updated 11 months ago
- ☆47Nov 26, 2020Updated 5 years ago
- Disable threat tracing from the kernel..☆14Apr 8, 2022Updated 3 years ago
- hooks gServerHandlers xxxEventWndProc☆13May 1, 2022Updated 3 years ago
- A run-time API resolver for IL2CPP Unity.☆450Jul 30, 2024Updated last year
- Using CVE-2021-40449 to manual map kernel mode driver☆104Mar 5, 2022Updated 4 years ago
- undetected eac mapper☆170May 3, 2022Updated 3 years ago
- ☆23Oct 18, 2021Updated 4 years ago
- Hygieia, a vulnerable driver traces scanner written in C++ as an x64 Windows kernel driver.☆151Feb 12, 2022Updated 4 years ago
- pdb's function and global vars to offset☆10Apr 11, 2023Updated 2 years ago
- IL2CppResolve by NixButterPlay(It's Not My Code, It's SneakyEvil's Code)☆11Nov 17, 2022Updated 3 years ago
- Bypassing EasyAntiCheat.sys self-integrity by abusing call hierarchy☆83Oct 6, 2022Updated 3 years ago
- An x64 page table iterator written in C++ as a kernel mode windows driver.☆119May 25, 2021Updated 4 years ago
- A way to detect DBI frameworks, Debuggers and VMs.☆24Nov 17, 2020Updated 5 years ago
- windows kernelmode driver to inject dll into each and every process and perform systemwide function hooking☆53Aug 28, 2022Updated 3 years ago
- A simple OOP rust cheat base made by me☆41Sep 4, 2022Updated 3 years ago
- Old way for blocking NMI interrupts☆29Sep 6, 2022Updated 3 years ago
- Easy Anti PatchGuard☆223Apr 9, 2021Updated 4 years ago
- ☆47Feb 27, 2022Updated 4 years ago
- ☆158May 21, 2024Updated last year
- ☆224May 10, 2022Updated 3 years ago
- ☆31Jan 12, 2022Updated 4 years ago
- ☆147Jan 24, 2024Updated 2 years ago
- Windows system spy for Mouse, Keyboard and Gamepad(Joystick).☆15Jul 6, 2022Updated 3 years ago
- ☆72Jun 27, 2023Updated 2 years ago
- usermode driver mapper that forcefully loads any signed kernel driver (legit cert) with a big enough section (example: .data, .rdata) to …☆475Jan 3, 2022Updated 4 years ago
- EQU8 User-Mode Bypass and Injector☆11Aug 13, 2021Updated 4 years ago
- C++ JSON parser and stringify☆26Jul 29, 2022Updated 3 years ago
- BattlEye kernel module bypass☆177Oct 1, 2022Updated 3 years ago
- base for testing☆187Sep 28, 2024Updated last year
- ☆24Sep 17, 2023Updated 2 years ago
- A simple x86_64 AMD-v hypervisor type-2 Programmed with C++, with soon to be added syscall hooks. [W.I.P]☆104Aug 3, 2023Updated 2 years ago
- Stealthy UM <-> KM communication system without creating any system threads, permanent hooks, driver objects, section objects or device o…☆382Mar 15, 2024Updated 2 years ago
- ☆10Aug 26, 2021Updated 4 years ago
- Allows you to communicate with the kernel mode to manipulate memory in a stealthy way to avoid kernel anticheats.☆172May 8, 2022Updated 3 years ago
- A kernelmode driver swapping a .data pointer in the kernel to perform communication between the kernel and usermode.☆142Oct 20, 2020Updated 5 years ago
- Loads a signed kernel driver which allows you to map any driver to kernel mode without any traces of the signed / mapped driver.☆389Aug 8, 2021Updated 4 years ago
- Figuring out the cause of a handle downgrade☆24Dec 13, 2022Updated 3 years ago