GrandpaGameHacker / BadToothLinks
Python Game Cheat Framework
☆19Updated 2 years ago
Alternatives and similar repositories for BadTooth
Users that are interested in BadTooth are comparing it to the libraries listed below
Sorting:
- Exploits I've authored☆60Updated 5 years ago
- A documented Windows x64 bit Usermode Injector that works via hooking IAT and hijacking its threads to execute shellcode.☆64Updated last year
- I'm going to be dropping code from the XC3 Driver (result of reversing the driver)☆70Updated 5 years ago
- My Proof of Concept code for different publicly disclosed vulnerabilities☆47Updated last year
- ☆47Updated 3 years ago
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.☆19Updated 2 years ago
- Code Injection technique written in cpp language☆31Updated 7 years ago
- Learning Various Process Injection Techniques☆21Updated 6 years ago
- Sample project for kernel debugging automation with Vagrant☆59Updated 5 years ago
- (DEPRECATED) A simple anti-anti debug library for Windows☆29Updated 4 years ago
- Exploit MsIo vulnerable driver☆104Updated 3 years ago
- hyperv-driver-thread-detection-poc☆11Updated 4 years ago
- LSASS INJECTOR☆35Updated 6 years ago
- Stealth DLL injector☆86Updated 10 months ago
- Dump system call codes, names, and offsets from Ntdll.dll☆78Updated last year
- Inject a Dll from memory☆42Updated 5 years ago
- PoC for hiding PE exports☆66Updated 4 years ago
- A sample on how to inject a DLL from a kernel driver☆62Updated 8 years ago
- Add an empty section to a PE file☆51Updated 7 years ago
- Kernel mode driver loader, injecting into the windows kernel, Rootkit. Driver injections.☆47Updated 10 years ago
- Process Hollowing Detection on a live system☆13Updated 7 years ago
- Allows you to find the use of ScyllaHide, if your program will debug and restore hooking functions bytes.☆26Updated 5 years ago
- Simple PE Packer Which Encrypts .text Section☆51Updated 8 years ago
- Parser for a custom executable format from Hidden Bee malware (first stage)☆43Updated 8 months ago
- Weaponizing Gigabyte driver for priv escalation and bypass PPL☆68Updated 5 years ago
- My personal cheat sheet for the x64dbg python plugin.☆26Updated 5 years ago
- ☆48Updated 6 years ago
- A template to hijack version.dll.☆30Updated 8 years ago
- A ready-made template for a project based on libpeconv.☆48Updated 3 months ago
- Скрытие строки от отладчиков и декомпиляторов☆50Updated 5 years ago