CoolOppo / Counter-Strike-HacksLinks
The code for various Counter-Strike: Global Offensive hacks
☆16Updated 11 years ago
Alternatives and similar repositories for Counter-Strike-Hacks
Users that are interested in Counter-Strike-Hacks are comparing it to the libraries listed below
Sorting:
- C++ game hack for Counter-Strike: Source. It was coded for the "Orange Box" update.☆15Updated 11 years ago
- Converts IDA Pro signatures to C++ Detours☆13Updated 9 years ago
- ☆11Updated 9 years ago
- WIP - Play with Intel VM Extensions☆23Updated 8 years ago
- Windows memory hacking library☆21Updated 9 years ago
- The dll that can hide itself and then delete itselft.☆32Updated 12 years ago
- Decompresses and compresses the Windows bootmgr (Vista, 7, and 8)☆24Updated 10 years ago
- deprecated☆27Updated 6 years ago
- A c++, QT gui based memory engine☆13Updated 7 years ago
- A small tool to produce a dummy pdb for an executable with symbols at addresses from a file☆40Updated 8 years ago
- User-mode kernel callback framework☆10Updated 12 years ago
- Hides a DLL and associated files based on a FILE_TAG as a user-mode injected DLL.☆21Updated 12 years ago
- Tool to automatically make Cheat Engine attach to a process via the command line.☆29Updated 8 years ago
- ☆14Updated 7 years ago
- Open source Anti Debug methods to use for your games. This uses SAC as an example. Will be sure to update it and / or add new features in…☆18Updated 5 years ago
- ☆12Updated 11 years ago
- x86_x64 emulator☆16Updated 10 years ago
- After Process monitor, execute Themida☆15Updated 8 years ago
- A future hobby OS kernel☆11Updated 5 years ago
- Kinject - kernel dll injector, currently available in x86 version, will be updated to x64 soon.☆32Updated 10 years ago
- Reversed C++ source code from the CAPCOM.SYS driver☆15Updated 9 years ago
- An analytical debugger programmed in C++, using Qt.☆22Updated 13 years ago
- Handy WMI query tool.☆12Updated 9 years ago
- A trainer engine template used in gamehacking and cheating.☆14Updated 11 years ago
- MIR-Engine☆24Updated 8 years ago
- Decompile an x86 exe, and read PE infos.☆19Updated 7 years ago
- ☆14Updated 8 years ago
- Notes my learning steps about Windows-NT☆23Updated 8 years ago
- The demo on Windows☆21Updated 9 years ago
- Spoof Windows Test Signing Mode☆29Updated 7 years ago