DestroyerDarkNess / StrelyCleanerLinks
The Swiss Army Knife for your system, portable and lightweight. Only for 5mb!!
☆14Updated last year
Alternatives and similar repositories for StrelyCleaner
Users that are interested in StrelyCleaner are comparing it to the libraries listed below
Sorting:
- codecave hook reverse engineering toolkit.☆37Updated last year
- Hardware ID☆48Updated 3 years ago
- WinApi Patcher is a straightforward tool leveraging windows API hooking to patch and modify certain behaviors in a targeted environment.☆42Updated 9 months ago
- stop any process from looking into your process by hooking.☆19Updated last year
- A kernel injector for EAC and BE☆110Updated last year
- abusing signed pdfwkrnl.sys for kernel function calling from usermode.☆11Updated 3 weeks ago
- A Dynamic Study Vmprotect 1.x-1.9X Unpacking Toolkit, Recovery OEP, FIX PE, IAT and bypass protection with custom Loader and interceptor …☆33Updated last year
- A windows kernel mode driver that spoofs serial numbers when mapped and executes a malicious payload (FULLY from kernel!!!)☆32Updated 8 months ago
- Decrypt VMProtect (.NET) obfuscated strings. Made by Cabbo with love.☆25Updated 2 years ago
- Just keyauth server emulator made in python☆29Updated last year
- C++ Program used to dump Themida and VMProtect.☆26Updated last year
- TS-Changer - Forces the machine in/out of TestSigning Mode at runtime.☆65Updated last year
- ☆26Updated last year
- PoC kernel to usermode injection☆87Updated last year
- A simple and stable deobfuscator for ZenFuscator☆17Updated last year
- Allows for same-file KernelMode function execution using Encrypted addresses of Functions☆38Updated 8 months ago
- a always updated and undetected temp spoof driver☆24Updated 3 months ago
- ☆25Updated 8 months ago
- process dumper☆11Updated last year
- ☆34Updated last year
- This is an EfiGuard BootLoader that can boot EfiGuard from Usermode with no USB or Setup as a Single Executable with automatic File Dumpi…☆54Updated 9 months ago
- A PoC PE dumper designed to pull (potentially malicious) extra binaries stored in programs.☆15Updated 4 years ago
- Bypassing kernel patch protection runtime☆20Updated 2 years ago
- The sequel to Voyager☆65Updated 10 months ago
- Fortnite External Leak Undetected EasyAntiCheat 2024 blabla black people☆40Updated 10 months ago
- My EAC & BE Rady CR3 Reading & Writing source that I use for my KM Drivers.☆64Updated 9 months ago
- Undetected DLL Injection Method☆36Updated 2 years ago
- a simple kernelmode spoofer that changes all your serialnumbers to any value set from usermode using my own communication method.☆12Updated last year
- proof of concept of user-mode anti-breakpoint technique☆15Updated last year
- Using ioctl major function swaps to "spoof" the ARP table☆16Updated 9 months ago