GameHackingAcademy / Call_LoggerLinks
A modified Windows debugger that logs all call instructions executed by a process.
☆16Updated 3 years ago
Alternatives and similar repositories for Call_Logger
Users that are interested in Call_Logger are comparing it to the libraries listed below
Sorting:
- I'm just cleaning up here.☆11Updated 5 years ago
- Helps to find patched modules☆29Updated 4 years ago
- Simple C++ console DLL loader.☆66Updated 6 years ago
- Simple Direct3D11 Test Environment for practicing hooking☆10Updated 2 months ago
- DLL Injector using manual map, written in C++☆45Updated 4 years ago
- A simple EasyAntiCheat x64 emulator.☆47Updated 5 years ago
- Just tried, unusable☆41Updated 8 months ago
- ☆51Updated 3 years ago
- Hide function calls to prevent reverse-engineering☆71Updated 4 years ago
- ☆80Updated 3 years ago
- ☆19Updated 2 years ago
- Aimtux for Windows. Updated 01/08/2021☆58Updated 2 years ago
- Undetected DLL Injection Method☆36Updated 2 years ago
- Library containing Anti-RE and Anti-Debug methods.☆109Updated 2 months ago
- Read and Write process memory with this ioctl driver base. This is great for free cheats and learning kernel.☆106Updated last year
- BottlEye is a usermode emulator for the popular anti-cheat BattlEye☆43Updated 5 years ago
- WIP PoC for license emulation in Oreans products☆40Updated last year
- ☆81Updated 3 years ago
- Simple driver loader for windows☆17Updated 5 years ago
- Hardware ID☆48Updated 3 years ago
- BEClient2.dll Dumper☆21Updated 5 years ago
- Anti-debug library based on al-khaser with ScyllaHide/TitanHide detection.☆59Updated 5 years ago
- small little public internal base/cheat i'm currently working on☆25Updated 5 years ago
- GUI Library injector for Windows and Linux☆18Updated 4 years ago
- Web based GUI app to find offsets in various games. For game hackers <3☆48Updated 2 years ago
- Cheat making base for csgo using hazedumper offsets + few examples☆28Updated 4 years ago
- A documented Windows x64 bit Usermode Injector that works via hooking IAT and hijacking its threads to execute shellcode.☆65Updated last year
- This tool Decrypt and Extract the files from the EAC☆66Updated 2 years ago
- Attempts to decrypt JM Xorstr in some x64 binaries☆55Updated 2 years ago
- Different examples of process hollowing.☆14Updated 5 years ago