The code for various Counter-Strike: Global Offensive hacks
☆16Jul 7, 2014Updated 11 years ago
Alternatives and similar repositories for Counter-Strike-Hacks
Users that are interested in Counter-Strike-Hacks are comparing it to the libraries listed below
Sorting:
- C++ game hack for Counter-Strike: Source. It was coded for the "Orange Box" update.☆15Sep 5, 2014Updated 11 years ago
- TG 2016 hacking compo repo☆10Mar 31, 2016Updated 9 years ago
- Some of example code that I have collected while learning☆10Sep 25, 2016Updated 9 years ago
- This is a VmProtect integrated debugger, that will essentially allow you to disasm and debug vmp partially virtualized functions at the v…☆47Oct 18, 2016Updated 9 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow Exploit☆32Jan 9, 2017Updated 9 years ago
- My presentation on Cyber Grand Challenge and DEFCON 24 CTF at SHLUG monthly meeting☆13Sep 24, 2016Updated 9 years ago
- ☆12Aug 28, 2017Updated 8 years ago
- Static analysis tools for x86 assembly☆13Mar 3, 2017Updated 9 years ago
- more at http://www.zer0mem.sk/?p=271☆12Jun 11, 2013Updated 12 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Mar 3, 2016Updated 10 years ago
- ☆14Aug 15, 2018Updated 7 years ago
- Simple MIPS32 Emulator (primarily used to run SmallerC compiled for MIPS)☆18Oct 31, 2015Updated 10 years ago
- ☆14Jan 10, 2017Updated 9 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆39Mar 15, 2017Updated 8 years ago
- Collection of tools for the Pin dynamic instrumentation framework☆42Jan 21, 2020Updated 6 years ago
- easy detour-, vftable-, iat- and eathooking☆12Mar 30, 2016Updated 9 years ago
- Windows inject☆16Jun 7, 2018Updated 7 years ago
- A sample on how to inject a DLL from a kernel driver☆61Sep 13, 2016Updated 9 years ago
- An aggregate of tools used in the core of vmp_dbg plus other parsing utils to parse vmp bc.☆16Oct 18, 2016Updated 9 years ago
- Kinject - kernel dll injector, currently available in x86 version, will be updated to x64 soon.☆32Apr 10, 2015Updated 10 years ago
- Bootkits Revisited☆39Jun 3, 2014Updated 11 years ago
- ☆16Apr 24, 2019Updated 6 years ago
- Detours from binaries method entry/exit point to Python scripts (PIN, CPython API)☆31Mar 13, 2013Updated 12 years ago
- Fetch and set configuration values for IDA Plugins☆25Nov 26, 2025Updated 3 months ago
- ☆41Jun 1, 2016Updated 9 years ago
- Use Intel Pin tools to analysis binary.☆38Jul 19, 2015Updated 10 years ago
- metasploit loader with antivirus bypass module☆18Jun 26, 2016Updated 9 years ago
- Decompilation of Motorolas Bootloader with Free Tools☆22Aug 7, 2017Updated 8 years ago
- Packer for PE and ELF, 32 and 64bits.☆22Aug 5, 2013Updated 12 years ago
- This python/jython script is used as plugin to BinNavi tool to analyze a x86 binanry file to find buffer overflow prone functions. Such f…☆29Jan 8, 2013Updated 13 years ago
- IDA Pomidor is a plugin for Hex-Ray's IDA Pro disassembler that will help you retain concentration and productivity during long reversing…☆35Sep 23, 2014Updated 11 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆42Jul 5, 2013Updated 12 years ago
- ☆27Mar 1, 2022Updated 4 years ago
- HackSys Extreme Vulnerable Driver - StackOverflow with Stack Cookie Bypass Exploit☆20Jan 9, 2017Updated 9 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22May 31, 2017Updated 8 years ago
- Notes my learning steps about Windows-NT☆23May 18, 2017Updated 8 years ago
- Cracking and decrypting Android Full Device Encryption☆33May 14, 2014Updated 11 years ago
- Hardware keylogger dongle with built-in Wi-Fi for live keystroke capture/injection and other fun stuff☆21May 13, 2016Updated 9 years ago
- A-Protect Anti Rootkit Tool☆56Jan 21, 2014Updated 12 years ago