CoolOppo / ReClassLinks
A tool for reconstructing data types based on memory - [Outdated; use ReClassEx]
☆125Updated 10 years ago
Alternatives and similar repositories for ReClass
Users that are interested in ReClass are comparing it to the libraries listed below
Sorting:
- A memory scanner plugin for x64dbg, inspired by Cheat Engine.☆307Updated 3 years ago
- Open-source user-mode Anti-Anti-Debug plugin for x64dbg & cheatengine.☆212Updated 8 years ago
- A port of DrunkenCheetah's Project to x64☆76Updated 11 years ago
- ☆244Updated 11 years ago
- Simple benchmark for findpattern implementations.☆161Updated 9 months ago
- x64dbg plugin which removes anti-dumping and obfuscation techniques from the popular FPS game Overwatch.☆248Updated 4 years ago
- PE permutation library☆276Updated 2 years ago
- Open source memory scanner written in C++☆352Updated 5 years ago
- ClassInformer backported for IDA Pro 7.0☆354Updated 5 years ago
- Simple VM based x86 PE (portable exectuable) protector.☆366Updated 10 years ago
- NoBastian - Universal Ring3 IPC based BattlEye/EAC/FaceIt/ESEA/MRAC bypass☆146Updated 7 years ago
- x64dbg utility for linker map files, diff files, PEiD/IDA signatures, and code signature generation.☆300Updated 5 years ago
- x64 usermode rootkit☆209Updated 7 years ago
- A collection of x64dbg scripts. Feel free to submit a pull request to add your script.☆530Updated last year
- x64 manualmapper with kernel elevation and thread hijacking capabilities☆414Updated 5 years ago
- Windows IME-based DLL injection. Able to inject a DLL without OpenProcess or a process handle being necessary..☆185Updated 11 years ago
- ReClassEx☆913Updated 4 years ago
- Reverse engineering tool for virtualization wrappers☆144Updated 2 years ago
- driver mapper / capcom wrapper☆224Updated 6 years ago
- IDA Pro 7 and up compatible SigMaker plugin☆556Updated 3 years ago
- BattlEye BEClient<->BEService usermode emulator☆82Updated 5 years ago
- RootKit & Cheat Scanner - Windows☆220Updated 6 years ago
- This DKOM exploit enables any app in usermode to access physical memory directly☆224Updated 7 years ago
- VivienneVMM is a stealthy debugging framework implemented via an Intel VT-x hypervisor.☆811Updated 5 years ago
- ☆105Updated 3 years ago
- An usermode BE Rootkit Bypass☆238Updated 6 years ago
- Import address table (IAT) hooking is a well documented technique for intercepting calls to imported functions.