FakeAim / D3D-Model-RecognitionLinks
D3D/DirectX Model recognition values for multiple games, used to create wallhack or chams
☆24Updated 8 years ago
Alternatives and similar repositories for D3D-Model-Recognition
Users that are interested in D3D-Model-Recognition are comparing it to the libraries listed below
Sorting:
- by others☆38Updated 7 years ago
- Spoof Windows Test Signing Mode☆29Updated 6 years ago
- ☆27Updated 7 years ago
- My take on the capcom driver vulnerability☆28Updated 7 years ago
- ice9 - is anticheat based on usermode tricks and undocumented methods , builded as dll for loading trought the shibari framework☆22Updated 4 months ago
- An ark tool's driver☆40Updated 8 years ago
- Players' Unknown Battleground Vulnerabilities Test PoC☆18Updated 6 years ago
- Wrapper for VMProtect Library (only MSVC)☆35Updated 6 years ago
- Modify process handle permissions☆60Updated 8 years ago
- ☆26Updated 8 years ago
- Mouse emulation driver for Windows 10 x64☆31Updated 7 years ago
- Some garbage drivers written for getting started☆65Updated 5 years ago
- Full H1Z1 internal, done with detour and D3D11 hooks☆20Updated 6 years ago
- Analyze PatchGuard☆58Updated 6 years ago
- ☆23Updated 7 years ago
- Use the Cheat Engine driver in your own process!☆23Updated 6 years ago
- Wow64 syscall hook☆40Updated 8 years ago
- Another method to anti ThreadHideFromDebugger☆36Updated 6 years ago
- Demo List cm/ps/ob/minifilter callback And Patch/Bypass it☆28Updated 7 years ago
- A User Mode (UM) Framework which can be used to make anything. From cheats, to anti cheats or even a normal program. The framework will s…☆29Updated 4 years ago
- viewing page boundaries of pages with PAGE_NOACCESS protection reveals the presence of x64dbg.☆23Updated 8 years ago
- x64dbg plugin - AttachHelper☆21Updated 8 years ago
- NT reversal☆25Updated 6 years ago
- map driver to memory☆26Updated 6 years ago
- A Windows game hacking framework☆43Updated 8 years ago
- External cheat base with DirectX overlay☆20Updated 6 years ago
- ☆38Updated 8 years ago
- A simple kernel mode driver that hooks some values at the KUSER_SHARED_DATA structure.☆26Updated 5 years ago
- Code injection by hijacking threads in Windows 32-bit applications☆43Updated 6 years ago
- PoC of BOOST-ed _EPROCESS.VadRoot iterating☆25Updated 11 years ago