CoolOppo / ReClassLinks
A tool for reconstructing data types based on memory - [Outdated; use ReClassEx]
☆125Updated 11 years ago
Alternatives and similar repositories for ReClass
Users that are interested in ReClass are comparing it to the libraries listed below
Sorting:
- A port of DrunkenCheetah's Project to x64☆76Updated 11 years ago
- Open-source user-mode Anti-Anti-Debug plugin for x64dbg & cheatengine.☆214Updated 8 years ago
- A memory scanner plugin for x64dbg, inspired by Cheat Engine.☆311Updated 3 years ago
- ☆248Updated 11 years ago
- Simple benchmark for findpattern implementations.☆164Updated 11 months ago
- x64dbg plugin which removes anti-dumping and obfuscation techniques from the popular FPS game Overwatch.☆250Updated 4 years ago
- ClassInformer backported for IDA Pro 7.0☆354Updated 5 years ago
- NoBastian - Universal Ring3 IPC based BattlEye/EAC/FaceIt/ESEA/MRAC bypass☆147Updated 7 years ago
- Open source memory scanner written in C++☆356Updated 5 years ago
- PE permutation library☆276Updated 2 years ago
- Simple VM based x86 PE (portable exectuable) protector.☆365Updated 10 years ago
- x64 usermode rootkit☆210Updated 7 years ago
- Windows IME-based DLL injection. Able to inject a DLL without OpenProcess or a process handle being necessary..☆185Updated 11 years ago
- Reverse engineering tool for virtualization wrappers☆145Updated 2 years ago
- driver mapper / capcom wrapper☆225Updated 6 years ago
- x64 manualmapper with kernel elevation and thread hijacking capabilities☆417Updated 5 years ago
- ☆105Updated 3 years ago
- A collection of x64dbg scripts. Feel free to submit a pull request to add your script.☆534Updated last year
- Imports Reconstructor☆98Updated 3 years ago
- ReClassEx☆915Updated 4 years ago
- IDA Pro 7 and up compatible SigMaker plugin☆562Updated 3 years ago
- x64dbg utility for linker map files, diff files, PEiD/IDA signatures, and code signature generation.☆307Updated 5 years ago
- BattlEye BEClient<->BEService usermode emulator☆82Updated 6 years ago
- RootKit & Cheat Scanner - Windows☆224Updated 6 years ago
- An usermode BE Rootkit Bypass☆239Updated 6 years ago
- Consonance, a dark color scheme for IDA.☆264Updated 12 years ago
- Import address table (IAT) hooking is a well documented technique for intercepting calls to imported functions.☆224Updated 7 years ago
- This DKOM exploit enables any app in usermode to access physical memory directly☆227Updated 8 years ago
- The ultimate hooking library☆276Updated 4 years ago
- MouClassInputInjection implements a kernel interface for injecting mouse input data packets into the input data stream of HID USB mouse d…☆367Updated 5 years ago